Effective authentication and detection of security attacks in traditional and software defined networks
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
ABSTRACT
newlineThe future of networking, SDN offers multiple advantages over traditional networks, including
newlineprogrammability, flexibility, and scalability. This thesis analyzes and evaluates the
newlinedifferent approaches, highlighting the advantages and drawbacks of each solution based on
newlinetheir efficiency, service to legitimate users, delay and it provides an exhaustive analysis of
newlineSDN technology, with the latest research and applications of SDN in 5G, Wi-Fi networks,
newlineIoT-based automated vehicle technology, satellite networks, smart grids, towards green and
newlinerenewable energy and AI. For the next generation, one of the emerging network technologies
newlineis Software Defined Networking (SDN) enabled Wireless Sensor Networks (WSNs) that
newlinewill be developed and deployed to improve computing facilities. Micro-electromechanical
newlinesystem (MEMS) technologies advance, and WSNs gain in popularity because they provide
newlinereal-time monitoring solutions that are both economically and practically viable. The SDN
newlineparadigm is consequently being incorporated into WSNs to prevent a performance bottleneck
newlinewith traditional network architecture as network traffic and diverse sensor nodes
newlineincrease. Because they interact through a public channel and the sensor nodes are spread
newlinethroughout a hostile environment, the information transmitted among entities is subject
newlineto assault. The proposed protocol showed how centralized SDN controller nodes logically
newlineassumed the role of network management and control. And, we present a Lightweight
newlineAuthentication and Key Agreement Protocol (LAKP) for SDN-enabled WSNs to protect
newlineentity communication. Additionally, we demonstrate that the suggested system prevents
newlineknown security flaws by conducting both informal and formal security studies using the
newlineScyther tool and Burrows-Abadi-Needham (BAN) logic. Further, the performance study
newlinedemonstrates that the proposed scheme performs better in computing and communication
newlinecost than the existing related protocols with 1.6% to 5.4% and 1.3% to 5.8%, respectively.
newlineThe work presented in this