Effective authentication and detection of security attacks in traditional and software defined networks

Abstract

ABSTRACT newlineThe future of networking, SDN offers multiple advantages over traditional networks, including newlineprogrammability, flexibility, and scalability. This thesis analyzes and evaluates the newlinedifferent approaches, highlighting the advantages and drawbacks of each solution based on newlinetheir efficiency, service to legitimate users, delay and it provides an exhaustive analysis of newlineSDN technology, with the latest research and applications of SDN in 5G, Wi-Fi networks, newlineIoT-based automated vehicle technology, satellite networks, smart grids, towards green and newlinerenewable energy and AI. For the next generation, one of the emerging network technologies newlineis Software Defined Networking (SDN) enabled Wireless Sensor Networks (WSNs) that newlinewill be developed and deployed to improve computing facilities. Micro-electromechanical newlinesystem (MEMS) technologies advance, and WSNs gain in popularity because they provide newlinereal-time monitoring solutions that are both economically and practically viable. The SDN newlineparadigm is consequently being incorporated into WSNs to prevent a performance bottleneck newlinewith traditional network architecture as network traffic and diverse sensor nodes newlineincrease. Because they interact through a public channel and the sensor nodes are spread newlinethroughout a hostile environment, the information transmitted among entities is subject newlineto assault. The proposed protocol showed how centralized SDN controller nodes logically newlineassumed the role of network management and control. And, we present a Lightweight newlineAuthentication and Key Agreement Protocol (LAKP) for SDN-enabled WSNs to protect newlineentity communication. Additionally, we demonstrate that the suggested system prevents newlineknown security flaws by conducting both informal and formal security studies using the newlineScyther tool and Burrows-Abadi-Needham (BAN) logic. Further, the performance study newlinedemonstrates that the proposed scheme performs better in computing and communication newlinecost than the existing related protocols with 1.6% to 5.4% and 1.3% to 5.8%, respectively. newlineThe work presented in this

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced