1 |
S. Sezer, S. Scott-Hayward, P.-K. Chouhan, B. Fraser, D. Lake, J. Finnegan, N. Viljoen, M. Miller, and N. Rao, "Are we ready for SDN? Implementation challenges for software-defined networks," IEEE Communications Magazine, vol. 51, no. 7, pp. 36-43, 2013.
DOI
|
2 |
A. De Gante, M. Aslan, and A. Matrawy, "Smart wireless sensor network management based on software-defined networking," In Communications (QBSC), pp. 71-75, 2014
|
3 |
Z. Shu, J. Wan, D. Li, J. Lin, A. V. Vasilakos, and M. Imran, "Security in software-defined networking: Threats and countermeasures," Mobile Networks and Applications, vol. 21, no. 5, pp. 764-776, 2016.
DOI
|
4 |
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, "A security enforcement kernel for OpenFlow networks," In Proceedings of the first workshop on Hot topics in software defined networks, pp. 121-126, 2012
|
5 |
X. Wen, Y. Chen, C. Hu, C. Shi, and Y. Wang, "Towards a secure controller platform for OpenFlow applications," In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp. 171-172, 2013
|
6 |
T. Luo, H.-P. Tan and T. Q. S. Quek, "Sensor OpenFlow: Enabling software- defined wireless sensor networks," IEEE Communications letters, Vol. 16, No. 11, pp. 1896-1899, 2012
DOI
|
7 |
M. P. Fernandez, "Comparing OpenFlow controller paradigms scalability: Reactive and proactive," In Advanced Information Networking and Applications, pp.1009-1016, 2013
|
8 |
S. T. Ali, V. Sivaraman, A. Radford, and S. Jha, "A survey of securing networks using software defined networking," IEEE Transactions on Reliability, vol. 64, no. 3, pp. 1086-1097, 2015.
DOI
|
9 |
S. Shin, P. Porras, V. Yegneswaran, and M. Fong, "FRESCO: Modular composable security services for software-defined networks," In 20th Annual Network & Distributed System Security Symposium. 2013
|
10 |
J. R. Ballard, I. Rae, and A. Akella, "Extensible and scalable network monitoring using OpenSAFE," In Proceedings of USENIX Internet Network Management Workshop/Workshop on Research on Enterprise Networking, pp. 8, 2010.
|
11 |
M. Huang, B. Yu, and S. Li, "Puf-assisted group key distribution scheme for software-defined wireless sensor networks," IEEE Communications Letters, Vol. 22, no. 2, pp. 404-407, 2018
DOI
|
12 |
J. Delvaux and I. Verbauwhede, "Key-recovery attacks on various RO-PUF constructions via helper data manipulation," In Proceedings of the conference on Design, Automation & Test in Europe, pp. 72, 2014
|
13 |
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," In International conference on the theory and applications of cryptographic techniques, pp. 523-540, 2004.
|
14 |
Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, and Jongchan Lee, "A reusable fuzzy extractor with practical storage size: Modifying canetti et al.'s construction," In Australasian Conference on Information Security and Privacy, pp. 28-44, 2018.
|
15 |
M. Bellare and P. Rogaway, "Entity authentication and key distribution," In Annual international cryptology conference, pp. 232-249, 1993
|