2016 19th International Conference on Computer and Information Technology (ICCIT) 2016
DOI: 10.1109/iccitechn.2016.7860210
|View full text |Cite
|
Sign up to set email alerts
|

Comparative security analysis of software defined wireless networking (SDWN)-BGP and NETCONF protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 12 publications
0
3
0
1
Order By: Relevance
“…Employing Microsoft security threat model, Swapna, et al [46] analyzed frequently utilized strategies for Software-Defined Wireless Networking (SDWN) to underlay cloud or data center environment. This study proposes a framework for minimizing the void in SDWN protocols for on-demand security research.…”
Section: B Security Enhancing Frameworkmentioning
confidence: 99%
“…Employing Microsoft security threat model, Swapna, et al [46] analyzed frequently utilized strategies for Software-Defined Wireless Networking (SDWN) to underlay cloud or data center environment. This study proposes a framework for minimizing the void in SDWN protocols for on-demand security research.…”
Section: B Security Enhancing Frameworkmentioning
confidence: 99%
“…Una variante de las redes SDN son las Wireless Software Defined Networking o por sus siglas WSDN, las cuales también tienen su fundamento en el software, pero introducen un número de nuevos elementos como, el medio inalámbrico, la funcionalidad de expandir el plano de datos y una estructura altamente dinámica [3]. WSDN asegura una simple y escalable arquitectura de red y una efectiva gestión de movilidad para áreas geográficamente extensas y un servicio estándar de proveedor de red [5]. Existen muchos requerimientos que debe satisfacer una red WSDN como la necesidad de soportar la movilidad de nodos y los cambios en una topología de red, o de solucionar la falta de disponibilidad característica de los enlaces inalámbricos [6].…”
Section: Redes Inalámbricas Definidas Por Software (Wsdn)unclassified
“…In [14], the authors reviewed and classified the security threats in software defined mobile networking (SDMN) such as spoofing, tampering, repudiation, information disclosure, denial of service, elevation known as STRIDE. The authors in [60] compare the performance of several communication protocols in SDWNs including border gateway protocol (BGP), NETCONF when facing STRIDE security threat. In [23], the authors provide a comprehensive survey of security threats of SDWNs related to a centralized controller as well as the separation of the control and data planes.…”
Section: Security Threats and Countermeasures In Sdwnmentioning
confidence: 99%