Efficient handling of ACL policy change in SDN using reactive and proactive flow rule installation DOI Creative Commons
Mudassar Hussain, Rashid Amin, Rahma Gantassi

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: June 28, 2024

Software-defined networking (SDN) is a pioneering network paradigm that strategically decouples the control plane from data and management planes, thereby streamlining administration. SDN's centralized makes configuring access list (ACL) policies easier, which important as these frequently change due to application needs topology modifications. Consequently, this action may trigger modifications at SDN controller. In response, controller performs computational tasks generate updated flow rules in accordance with modified ACL installs plane. Existing research has investigated reactive installation changes result packet violations inefficiencies. Network becomes difficult deleting inconsistent computing new per policies. The proposed solution efficiently handles policy phenomena by automatically detecting accordingly along caching adding A comprehensive analysis of both proactive mechanisms carried out achieve this. To facilitate evaluation mechanisms, are modeled using 5-tuple structure comprising Source, Destination, Protocol, Ports, Action. resulting then translated into implementation file transmitted Subsequently, utilizes calculate necessary caches hash table addition installing them switches. simulated Mininet Emulator set policies, hosts, results presented varying different time instances, inter-packet delay timeout value. simulation show rule better than mechanism respect throughput, violations, successful delivery, normalized overhead, detection end-to-end delay. solution, designed be directly used on controllers support Pyretic language, provides flexible efficient approach for installation. can employed administrators implementing It also integrated monitoring debugging tools analyze effectiveness mechanism.

Language: Английский

BFL-SA: Blockchain-based federated learning via enhanced secure aggregation DOI
Yizhong Liu,

Zixiao Jia,

Zixu Jiang

et al.

Journal of Systems Architecture, Journal Year: 2024, Volume and Issue: 152, P. 103163 - 103163

Published: May 3, 2024

Language: Английский

Citations

31

B-LPoET: A middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology DOI
Abdullah Ayub Khan,

Sami Dhabi,

Jing Yang

et al.

Computers & Electrical Engineering, Journal Year: 2024, Volume and Issue: 118, P. 109343 - 109343

Published: May 29, 2024

Language: Английский

Citations

16

A comprehensive review of vehicle-to-grid integration in electric vehicles: Powering the future DOI Creative Commons
Pulkit Kumar, Harpreet Kaur Channi, Raman Kumar

et al.

Energy Conversion and Management X, Journal Year: 2024, Volume and Issue: unknown, P. 100864 - 100864

Published: Dec. 1, 2024

Language: Английский

Citations

8

DDoS attack detection techniques in IoT networks: a survey DOI Creative Commons

Amir Pakmehr,

Andreas Aßmuth,

Negar Taheri

et al.

Cluster Computing, Journal Year: 2024, Volume and Issue: 27(10), P. 14637 - 14668

Published: July 26, 2024

Abstract The Internet of Things (IoT) is a rapidly emerging technology that has become more valuable and vital in our daily lives. This enables connection communication between objects devices allows these to exchange information perform intelligent operations with each other. However, due the scale network, heterogeneity insecurity many devices, privacy protection, it faces several challenges. In last decade, distributed DDoS attacks IoT networks have one growing challenges require serious attention investigation. take advantage limited resources available on which disrupts functionality IoT-connected applications services. article comprehensively examines effects context IoT, cause significant harm existing systems. Also, this paper investigates solutions identify deal type attack. Finally, study suggests broad line research field security, dedicated examining how adapt current predicting future trends.

Language: Английский

Citations

6

Blockchain, artificial intelligence, and healthcare: the tripod of future—a narrative review DOI Creative Commons
Archana Bathula, Suneet Kumar Gupta, M. Suresh

et al.

Artificial Intelligence Review, Journal Year: 2024, Volume and Issue: 57(9)

Published: Aug. 8, 2024

Abstract The fusion of blockchain and artificial intelligence (AI) marks a paradigm shift in healthcare, addressing critical challenges securing electronic health records (EHRs), ensuring data privacy, facilitating secure transmission. This study provides comprehensive analysis the adoption AI within spotlighting their role fortifying security transparency leading trajectory for promising future realm healthcare. Our study, employing PRISMA model, scrutinized 402 relevant articles, narrative to explore review includes architecture blockchain, examines applications with without integration, elucidates interdependency between blockchain. major findings include: (i) it protects transfer, digital records, security; (ii) enhances EHR COVID-19 transmission, thereby bolstering healthcare efficiency reliability through precise assessment metrics; (iii) addresses like security, decentralized computing, forming robust tripod. revolutionize by EHRs, enhancing security. Private reflects sector’s commitment improved accessibility. convergence promises enhanced disease identification, response, overall efficacy, key sector challenges. Further exploration advanced features integrated enhance outcomes, shaping global delivery guaranteed innovation.

Language: Английский

Citations

6

A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification DOI
Furkh Zeshan,

Zaineb Dar,

Adnan Ahmad

et al.

The Journal of Supercomputing, Journal Year: 2024, Volume and Issue: 80(16), P. 23311 - 23356

Published: July 13, 2024

Language: Английский

Citations

5

A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems DOI
Hongwei Huang, Yu Wang,

Yue Cai

et al.

Cluster Computing, Journal Year: 2024, Volume and Issue: 27(10), P. 14515 - 14538

Published: July 21, 2024

Language: Английский

Citations

4

Network anomaly detection and security defense technology based on machine learning: A review DOI

Ruixiao Liu,

Jing Shi, Xingyu Chen

et al.

Computers & Electrical Engineering, Journal Year: 2024, Volume and Issue: 119, P. 109581 - 109581

Published: Aug. 24, 2024

Language: Английский

Citations

4

Web3 and the Decentralized Future: Exploring Data Ownership, Privacy, and Blockchain Infrastructure DOI

David L. Krause

Published: Jan. 1, 2025

Web3 marks a significant evolution in internet architecture, shifting from centralized systems to decentralized frameworks powered by blockchain technology. This paper examines the transformative potential of analyzing its core elements: data ownership, privacy, and foundational role Layer-1 infrastructure. By decentralizing control enhancing transparency, empowers users provides innovative solutions limitations Web2. However, challenges such as scalability regulatory clarity remain critical considerations. Through an exploration Web3's technical architecture broader societal implications, this offers comprehensive framework for assessing reshape digital ecosystems redefine future internet.

Language: Английский

Citations

0

Blockchain-enabled privacy protection scheme for IoT digital identity management DOI Creative Commons

Hao Yu,

Guijuan Wang, Anming Dong

et al.

High-Confidence Computing, Journal Year: 2025, Volume and Issue: unknown, P. 100320 - 100320

Published: March 1, 2025

Language: Английский

Citations

0