Efficient handling of ACL policy change in SDN using reactive and proactive flow rule installation DOI Creative Commons
Mudassar Hussain, Rashid Amin, Rahma Gantassi

и другие.

Scientific Reports, Год журнала: 2024, Номер 14(1)

Опубликована: Июнь 28, 2024

Software-defined networking (SDN) is a pioneering network paradigm that strategically decouples the control plane from data and management planes, thereby streamlining administration. SDN's centralized makes configuring access list (ACL) policies easier, which important as these frequently change due to application needs topology modifications. Consequently, this action may trigger modifications at SDN controller. In response, controller performs computational tasks generate updated flow rules in accordance with modified ACL installs plane. Existing research has investigated reactive installation changes result packet violations inefficiencies. Network becomes difficult deleting inconsistent computing new per policies. The proposed solution efficiently handles policy phenomena by automatically detecting accordingly along caching adding A comprehensive analysis of both proactive mechanisms carried out achieve this. To facilitate evaluation mechanisms, are modeled using 5-tuple structure comprising Source, Destination, Protocol, Ports, Action. resulting then translated into implementation file transmitted Subsequently, utilizes calculate necessary caches hash table addition installing them switches. simulated Mininet Emulator set policies, hosts, results presented varying different time instances, inter-packet delay timeout value. simulation show rule better than mechanism respect throughput, violations, successful delivery, normalized overhead, detection end-to-end delay. solution, designed be directly used on controllers support Pyretic language, provides flexible efficient approach for installation. can employed administrators implementing It also integrated monitoring debugging tools analyze effectiveness mechanism.

Язык: Английский

BFL-SA: Blockchain-based federated learning via enhanced secure aggregation DOI
Yizhong Liu,

Zixiao Jia,

Zixu Jiang

и другие.

Journal of Systems Architecture, Год журнала: 2024, Номер 152, С. 103163 - 103163

Опубликована: Май 3, 2024

Язык: Английский

Процитировано

31

B-LPoET: A middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology DOI
Abdullah Ayub Khan,

Sami Dhabi,

Jing Yang

и другие.

Computers & Electrical Engineering, Год журнала: 2024, Номер 118, С. 109343 - 109343

Опубликована: Май 29, 2024

Язык: Английский

Процитировано

16

A comprehensive review of vehicle-to-grid integration in electric vehicles: Powering the future DOI Creative Commons
Pulkit Kumar, Harpreet Kaur Channi, Raman Kumar

и другие.

Energy Conversion and Management X, Год журнала: 2024, Номер unknown, С. 100864 - 100864

Опубликована: Дек. 1, 2024

Язык: Английский

Процитировано

8

DDoS attack detection techniques in IoT networks: a survey DOI Creative Commons

Amir Pakmehr,

Andreas Aßmuth,

Negar Taheri

и другие.

Cluster Computing, Год журнала: 2024, Номер 27(10), С. 14637 - 14668

Опубликована: Июль 26, 2024

Abstract The Internet of Things (IoT) is a rapidly emerging technology that has become more valuable and vital in our daily lives. This enables connection communication between objects devices allows these to exchange information perform intelligent operations with each other. However, due the scale network, heterogeneity insecurity many devices, privacy protection, it faces several challenges. In last decade, distributed DDoS attacks IoT networks have one growing challenges require serious attention investigation. take advantage limited resources available on which disrupts functionality IoT-connected applications services. article comprehensively examines effects context IoT, cause significant harm existing systems. Also, this paper investigates solutions identify deal type attack. Finally, study suggests broad line research field security, dedicated examining how adapt current predicting future trends.

Язык: Английский

Процитировано

6

Blockchain, artificial intelligence, and healthcare: the tripod of future—a narrative review DOI Creative Commons
Archana Bathula, Suneet Kumar Gupta, M. Suresh

и другие.

Artificial Intelligence Review, Год журнала: 2024, Номер 57(9)

Опубликована: Авг. 8, 2024

Abstract The fusion of blockchain and artificial intelligence (AI) marks a paradigm shift in healthcare, addressing critical challenges securing electronic health records (EHRs), ensuring data privacy, facilitating secure transmission. This study provides comprehensive analysis the adoption AI within spotlighting their role fortifying security transparency leading trajectory for promising future realm healthcare. Our study, employing PRISMA model, scrutinized 402 relevant articles, narrative to explore review includes architecture blockchain, examines applications with without integration, elucidates interdependency between blockchain. major findings include: (i) it protects transfer, digital records, security; (ii) enhances EHR COVID-19 transmission, thereby bolstering healthcare efficiency reliability through precise assessment metrics; (iii) addresses like security, decentralized computing, forming robust tripod. revolutionize by EHRs, enhancing security. Private reflects sector’s commitment improved accessibility. convergence promises enhanced disease identification, response, overall efficacy, key sector challenges. Further exploration advanced features integrated enhance outcomes, shaping global delivery guaranteed innovation.

Язык: Английский

Процитировано

6

A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification DOI
Furkh Zeshan,

Zaineb Dar,

Adnan Ahmad

и другие.

The Journal of Supercomputing, Год журнала: 2024, Номер 80(16), С. 23311 - 23356

Опубликована: Июль 13, 2024

Язык: Английский

Процитировано

5

A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems DOI
Hongwei Huang, Yu Wang,

Yue Cai

и другие.

Cluster Computing, Год журнала: 2024, Номер 27(10), С. 14515 - 14538

Опубликована: Июль 21, 2024

Язык: Английский

Процитировано

4

Network anomaly detection and security defense technology based on machine learning: A review DOI

Ruixiao Liu,

Jing Shi, Xingyu Chen

и другие.

Computers & Electrical Engineering, Год журнала: 2024, Номер 119, С. 109581 - 109581

Опубликована: Авг. 24, 2024

Язык: Английский

Процитировано

4

Web3 and the Decentralized Future: Exploring Data Ownership, Privacy, and Blockchain Infrastructure DOI

David L. Krause

Опубликована: Янв. 1, 2025

Web3 marks a significant evolution in internet architecture, shifting from centralized systems to decentralized frameworks powered by blockchain technology. This paper examines the transformative potential of analyzing its core elements: data ownership, privacy, and foundational role Layer-1 infrastructure. By decentralizing control enhancing transparency, empowers users provides innovative solutions limitations Web2. However, challenges such as scalability regulatory clarity remain critical considerations. Through an exploration Web3's technical architecture broader societal implications, this offers comprehensive framework for assessing reshape digital ecosystems redefine future internet.

Язык: Английский

Процитировано

0

Blockchain-enabled privacy protection scheme for IoT digital identity management DOI Creative Commons

Hao Yu,

Guijuan Wang, Anming Dong

и другие.

High-Confidence Computing, Год журнала: 2025, Номер unknown, С. 100320 - 100320

Опубликована: Март 1, 2025

Язык: Английский

Процитировано

0