Transforming Management With AI, Big-Data, and IoT 2022
DOI: 10.1007/978-3-030-86749-2_11
|View full text |Cite
|
Sign up to set email alerts
|

Software-Defined Network (SDN) for Cloud-Based Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…However, this scheme does not consider the security of the access control policy and is prone to problems such as policy leakage. Awasthi et al [17] design a scalable, efcient, and cost-efective network architecture that not only meets the changing needs of users but also increases the number of accessing IoT devices, which embed network elements in software rather than dedicated hardware, making it easy to rent from the pool of available devices, enabling rapid device access. Matias et al [18] propose FlowNAC, an access control scheme for SDNs, which grants users access to the network based on the user's requested target and implements fne-grained access control functionality.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this scheme does not consider the security of the access control policy and is prone to problems such as policy leakage. Awasthi et al [17] design a scalable, efcient, and cost-efective network architecture that not only meets the changing needs of users but also increases the number of accessing IoT devices, which embed network elements in software rather than dedicated hardware, making it easy to rent from the pool of available devices, enabling rapid device access. Matias et al [18] propose FlowNAC, an access control scheme for SDNs, which grants users access to the network based on the user's requested target and implements fne-grained access control functionality.…”
Section: Related Workmentioning
confidence: 99%
“…Te algorithm frst validates the legitimacy of the input parameters and then uses the parsePolicy method to parse and match the policy JSON string with the policy structure, ensuring the type and number of attributes are correct. Following this, the (1) Terminal add Token to the Options feld of the IP packet (2) Initiate access requests (3) if Te terminal is nonfrst-time access then (4) P4FD parses the IP header of packets (5) if IHL � 0x05 then (6) Discard the packets (7) end if (8) Te packet is mirrored to the P4 control plane (9) Te P4 parses the Options and get the Token (10) Query the Token from the cache database (11) if Te Token exists and has not expired then (12) Distribute the fow table in the p4 control plane ( 13) else (14) Resend the IP packet with Options to the controller (15) end if (16) else (17) Perform the same operation as in the authentication phase (18)…”
Section: Smart Contracts Of Abacmentioning
confidence: 99%