메뉴 건너뛰기




Volumn 21, Issue 5, 2016, Pages 729-743

Software-Defined Mobile Networks Security

Author keywords

Network function virtualization (NFV); OpenFlow; Security; Software defined mobile network (SDMN)

Indexed keywords

5G MOBILE COMMUNICATION SYSTEMS; CLOUD COMPUTING; ENERGY EFFICIENCY; GREEN COMPUTING; MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK FUNCTION VIRTUALIZATION; SECURITY SYSTEMS; SURVEYS; TRANSFER FUNCTIONS; VIRTUAL REALITY; WIRELESS NETWORKS;

EID: 84953392935     PISSN: 1383469X     EISSN: 15728153     Source Type: Journal    
DOI: 10.1007/s11036-015-0665-5     Document Type: Article
Times cited : (104)

References (98)
  • 2
    • 84925076185 scopus 로고    scopus 로고
    • Spatial Spectrum and Energy Efficiency of Random Cellular Networks
    • Ge X, Yang B, Ye J, Mao G, Wang C-X, Han T (2015) Spatial Spectrum and Energy Efficiency of Random Cellular Networks. IEEE Trans Commun 63(3):1019–1030
    • (2015) IEEE Trans Commun , vol.63 , Issue.3 , pp. 1019-1030
    • Ge, X.1    Yang, B.2    Ye, J.3    Mao, G.4    Wang, C.-X.5    Han, T.6
  • 4
    • 80855138617 scopus 로고    scopus 로고
    • Capacity Analysis of a Multi-Cell Multi-Antenna Cooperative Cellular Network with Co-Channel Interference
    • Ge X, Huang K, Wang C-X, Hong X, Yang X (2011) Capacity Analysis of a Multi-Cell Multi-Antenna Cooperative Cellular Network with Co-Channel Interference. IEEE Trans Wirel Commun 10(10):3298–3309
    • (2011) IEEE Trans Wirel Commun , vol.10 , Issue.10 , pp. 3298-3309
    • Ge, X.1    Huang, K.2    Wang, C.-X.3    Hong, X.4    Yang, X.5
  • 6
    • 84938292036 scopus 로고    scopus 로고
    • Chávez-Santiago R, Szydełko M, Kliks A, Foukalas F, Haddad Y, Nolan KE, Kelly MY, Masonta MT, Balasingham I (2015) 5G: The convergence of wireless communications. Wirel Pers Commun:1–26
    • Chávez-Santiago R, Szydełko M, Kliks A, Foukalas F, Haddad Y, Nolan KE, Kelly MY, Masonta MT, Balasingham I (2015) 5G: The convergence of wireless communications. Wirel Pers Commun:1–26
  • 7
    • 84872222730 scopus 로고    scopus 로고
    • Techno-economic analysis of software defined networking as architecture for the virtualization of a mobile network
    • European Workshop on Software Defined Networking (EWSDN), IEEE
    • Naudts B, Kind M, Westphal F-J, Verbrugge S, Colle D, Pickavet M (2012) Techno-economic analysis of software defined networking as architecture for the virtualization of a mobile network. In: 2012 European Workshop on Software Defined Networking (EWSDN). IEEE, pp 67–72
    • (2012) In , vol.2012 , pp. 67-72
    • Naudts, B.1    Kind, M.2    Westphal, F.-J.3    Verbrugge, S.4    Colle, D.5    Pickavet, M.6
  • 10
    • 84877782894 scopus 로고    scopus 로고
    • Expanding lte network spectrum with cognitive radios: From concept to implementation
    • Xiao J, Hu R, Qian Y, Gong L, Wang B (2013) Expanding lte network spectrum with cognitive radios: From concept to implementation. IEEE Wirel Commun 20(2):12–19
    • (2013) IEEE Wirel Commun , vol.20 , Issue.2 , pp. 12-19
    • Xiao, J.1    Hu, R.2    Qian, Y.3    Gong, L.4    Wang, B.5
  • 11
    • 84990949087 scopus 로고    scopus 로고
    • Software-defined networks for future networks and services: main technical challenges and business implications, SDN4FNS
    • Manzalini A, Saracco R, Buyukkoc C, et al. (2014) Software-defined networks for future networks and services: main technical challenges and business implications, SDN4FNS. IEEE
    • (2014) IEEE
    • Manzalini, A.1    Saracco, R.2    Buyukkoc, C.3
  • 12
    • 84883671159 scopus 로고    scopus 로고
    • Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM
    • Kreutz D, Ramos F, Verissimo P (2013) Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 55–60
    • (2013) pp 55–60
    • Kreutz, D.1    Ramos, F.2    Verissimo, P.3
  • 13
    • 84918828099 scopus 로고    scopus 로고
    • Software-defined networking: Challenges and research opportunities for future internet
    • Hakiri A, Gokhale A, Berthou P, Schmidt DC, Gayraud T (2014) Software-defined networking: Challenges and research opportunities for future internet. Comput Netw 75(24):453–471
    • (2014) Comput Netw , vol.75 , Issue.24 , pp. 453-471
    • Hakiri, A.1    Gokhale, A.2    Berthou, P.3    Schmidt, D.C.4    Gayraud, T.5
  • 16
    • 84990993718 scopus 로고    scopus 로고
    • Principles and practices for securing software-defined networks, 2015
    • Principles and practices for securing software-defined networks, 2015. www.opennetworking.org
  • 18
    • 78649307331 scopus 로고    scopus 로고
    • Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures. ACM
    • Yap K-K, Sherwood R, Kobayashi M, Huang T-Y, Chan M, Handigol N, McKeown N, Parulkar G (2010) Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures. ACM, pp 25–32
    • (2010) pp 25–32
    • Yap, K.-K.1    Sherwood, R.2    Kobayashi, M.3    Huang, T.-Y.4    Chan, M.5    Handigol, N.6    McKeown, N.7    Parulkar, G.8
  • 19
    • 84990994204 scopus 로고    scopus 로고
    • Uncover security design flaws using the stride approach msdn. microsoft
    • Hernan S, Lambert S, Ostwald T, Shostack A (2006) Uncover security design flaws using the stride approach msdn. microsoft. com
    • (2006) com
    • Hernan, S.1    Lambert, S.2    Ostwald, T.3    Shostack, A.4
  • 20
    • 84990993715 scopus 로고    scopus 로고
    • Wikipedia, Stride(security)–wikipedia, the free encyclopedia, 2015, [Online; accessed 20-July-2015]
    • Wikipedia, Stride(security)–wikipedia, the free encyclopedia, 2015, [Online; accessed 20-July-2015]. [Online]. Available: https://en.wikipedia.org/wiki/STRIDE_(security)
  • 21
    • 84924368818 scopus 로고    scopus 로고
    • Security in cloud computing: Opportunities and challenges
    • Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305(1):357–383
    • (2015) Inf Sci , vol.305 , Issue.1 , pp. 357-383
    • Ali, M.1    Khan, S.U.2    Vasilakos, A.V.3
  • 22
    • 84915751455 scopus 로고    scopus 로고
    • A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management
    • Yazıcı V, Kozat UC, Oguz Sunay M (2014) A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management. IEEE Commun Mag 52(11):76–85
    • (2014) IEEE Commun Mag , vol.52 , Issue.11 , pp. 76-85
    • Yazıcı, V.1    Kozat, U.C.2    Oguz Sunay, M.3
  • 24
    • 84893371881 scopus 로고    scopus 로고
    • Softcell: Scalable and flexible cellular core network architecture. In: Proceedings of the ninth ACM Conference on Emerging Networking Experiments and Technologies. ACM
    • Jin X, Li LE, Vanbever L, Rexford J (2013) Softcell: Scalable and flexible cellular core network architecture. In: Proceedings of the ninth ACM Conference on Emerging Networking Experiments and Technologies. ACM, pp 163–174
    • (2013) pp 163–174
    • Jin, X.1    Li, L.E.2    Vanbever, L.3    Rexford, J.4
  • 25
    • 84899935394 scopus 로고    scopus 로고
    • International Conference on Information Networking (ICOIN). IEEE
    • Costa-Requena J (2014) SDN integration in lte mobile backhaul networks. In: 2014 International Conference on Information Networking (ICOIN). IEEE, pp 264–269
    • (2014) pp 264–269
  • 28
    • 84916243397 scopus 로고    scopus 로고
    • Utilizing OpenFlow, SDN and NFV in GPRS core network, in Testbeds and Research Infrastructure: Development of Networks and Communities
    • Nagy M, Kotuliak I (2014) Utilizing OpenFlow, SDN and NFV in GPRS core network, in Testbeds and Research Infrastructure: Development of Networks and Communities. Springer, pp 184–193
    • (2014) Springer , pp. 184-193
    • Nagy, M.1    Kotuliak, I.2
  • 29
    • 84913596782 scopus 로고    scopus 로고
    • 5G Wireless Backhaul Networks: Challenges and Research Advances
    • Ge X, Cheng H, Guizani M, Han T (2014) 5G Wireless Backhaul Networks: Challenges and Research Advances. IEEE Netw 28(6):6–11
    • (2014) IEEE Netw , vol.28 , Issue.6 , pp. 6-11
    • Ge, X.1    Cheng, H.2    Guizani, M.3    Han, T.4
  • 30
    • 84890925214 scopus 로고    scopus 로고
    • CBM: Online Strategies on Cost-aware Buffer Management for Mobile Video Streaming
    • He J, Xue Z, Wu D, Wu DO, Wen Y (2014) CBM: Online Strategies on Cost-aware Buffer Management for Mobile Video Streaming. IEEE Transactions on Multimedia 16(1): 242–252
    • (2014) IEEE Transactions on Multimedia , vol.16 , Issue.1 , pp. 242-252
    • He, J.1    Xue, Z.2    Wu, D.3    Wu, D.O.4    Wen, Y.5
  • 31
    • 84897766928 scopus 로고    scopus 로고
    • Challenges on Wireless Heterogeneous Networks for Mobile Cloud Computing
    • Lei L, Zhong Z, Zheng K, Chen J, Meng H (2013) Challenges on Wireless Heterogeneous Networks for Mobile Cloud Computing. IEEE Wirel Commun 20(3):34–44
    • (2013) IEEE Wirel Commun , vol.20 , Issue.3 , pp. 34-44
    • Lei, L.1    Zhong, Z.2    Zheng, K.3    Chen, J.4    Meng, H.5
  • 32
    • 84555178451 scopus 로고    scopus 로고
    • Energy-efficient wireless in-home: the need for interference-controlled femtocells
    • Zheng K, Wang Y, Wang W, Dohler M, Wang J (2011) Energy-efficient wireless in-home: the need for interference-controlled femtocells. IEEE Wirel Commun 18(6):36–44
    • (2011) IEEE Wirel Commun , vol.18 , Issue.6 , pp. 36-44
    • Zheng, K.1    Wang, Y.2    Wang, W.3    Dohler, M.4    Wang, J.5
  • 34
    • 84905683223 scopus 로고    scopus 로고
    • iCloudAccess: Cost-Effective Streaming of Video Games from the Cloud with Low Latency
    • Wu D, Xue Z, He J (2014) iCloudAccess: Cost-Effective Streaming of Video Games from the Cloud with Low Latency. IEEE Transactions on Circuits and Systems for Video Technology 24(8):1405–1416
    • (2014) IEEE Transactions on Circuits and Systems for Video Technology , vol.24 , Issue.8 , pp. 1405-1416
    • Wu, D.1    Xue, Z.2    He, J.3
  • 36
    • 84990949028 scopus 로고    scopus 로고
    • Network functions virtualisation (nfv), 2013
    • Network functions virtualisation (nfv), 2013. [Online]. Available: https://portal.etsi.org/nfv/nfv_white_paper2.pdf
  • 40
    • 77950857042 scopus 로고    scopus 로고
    • Protecting kernel code and data with a virtualization-aware collaborative operating system. In: 2009 Annual Computer Security Applications Conference, ACSAC’09. IEEE
    • de Oliveira DAS, Wu FS (2009) Protecting kernel code and data with a virtualization-aware collaborative operating system. In: 2009 Annual Computer Security Applications Conference, ACSAC’09. IEEE, pp 451–460
    • (2009) pp 451–460
    • de Oliveira, D.A.S.1    Wu, F.S.2
  • 41
    • 84906494968 scopus 로고    scopus 로고
    • Rootkitdet: Practical end-to-end defense against kernel rootkits in a cloud environment. In: Computer Security-ESORICS 2014. Springer
    • Zhang L, Shetty S, Liu P, Jing J (2014) Rootkitdet: Practical end-to-end defense against kernel rootkits in a cloud environment. In: Computer Security-ESORICS 2014. Springer, pp 475– 493
    • (2014) pp 475– 493
    • Zhang, L.1    Shetty, S.2    Liu, P.3    Jing, J.4
  • 42
    • 34548708575 scopus 로고    scopus 로고
    • Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE
    • Baliga A, Kamat P, Iftode L (2007) Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE, pp 246–251
    • (2007) pp 246–251
    • Baliga, A.1    Kamat, P.2    Iftode, L.3
  • 46
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28 (3):583–592
    • (2012) Futur Gener Comput Syst , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 47
    • 84927760095 scopus 로고    scopus 로고
    • Distributed denial of service attacks in software-defined networking with cloud computing
    • Yan Q, Yu F (2015) Distributed denial of service attacks in software-defined networking with cloud computing. EEE Commun Mag 53(4):52–59
    • (2015) EEE Commun Mag , vol.53 , Issue.4 , pp. 52-59
    • Yan, Q.1    Yu, F.2
  • 48
    • 80755169480 scopus 로고    scopus 로고
    • Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM
    • Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, pp 401–412
    • (2011) pp 401–412
    • Szefer, J.1    Keller, E.2    Lee, R.B.3    Rexford, J.4
  • 49
    • 84924902934 scopus 로고    scopus 로고
    • Wireless virtualization for next generation mobile cellular networks
    • Liang C, Yu FR (2015) Wireless virtualization for next generation mobile cellular networks. IEEE Wirel Commun 22(1):61–69
    • (2015) IEEE Wirel Commun , vol.22 , Issue.1 , pp. 61-69
    • Liang, C.1    Yu, F.R.2
  • 51
    • 84990948728 scopus 로고    scopus 로고
    • Service-oriented 5G network architecture: an end-to-end software defining approach
    • Yang M, Li Y, Li B, Jin D, Chen S (2015) Service-oriented 5G network architecture: an end-to-end software defining approach. Int J Commun Syst
    • (2015) Int J Commun Syst
    • Yang, M.1    Li, Y.2    Li, B.3    Jin, D.4    Chen, S.5
  • 53
    • 84990949044 scopus 로고    scopus 로고
    • Poisoning network visibility in software-defined networks: New attacks and countermeasures. In: Network and Distributed System Security (NDSS) Symposium 2015. NDSS
    • Hong S, Xu L, Wang H, Gu G (2015) Poisoning network visibility in software-defined networks: New attacks and countermeasures. In: Network and Distributed System Security (NDSS) Symposium 2015. NDSS, pp 8–11
    • (2015) pp 8–11
    • Hong, S.1    Xu, L.2    Wang, H.3    Gu, G.4
  • 54
    • 84883734157 scopus 로고    scopus 로고
    • OpenFlow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM
    • Benton K, Camp LJ, Small C (2013) OpenFlow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 151–152
    • (2013) pp 151–152
    • Benton, K.1    Camp, L.J.2    Small, C.3
  • 55
    • 84883687346 scopus 로고    scopus 로고
    • Attacking software-defined networks: A first feasibility study. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM
    • Shin S, Gu G (2013) Attacking software-defined networks: A first feasibility study. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 165–166
    • (2013) pp 165–166
    • Shin, S.1    Gu, G.2
  • 58
    • 84928387229 scopus 로고    scopus 로고
    • A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
    • Marinho J, Granjal J, Monteiro E (2015) A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security 2015(1):1–14
    • (2015) EURASIP Journal on Information Security , vol.2015 , Issue.1 , pp. 1-14
    • Marinho, J.1    Granjal, J.2    Monteiro, E.3
  • 59
    • 84990975893 scopus 로고    scopus 로고
    • Naseef M (2014) Vulnerabilities of LTE and LTE-Advanced Communication White Paper
    • Naseef M (2014) Vulnerabilities of LTE and LTE-Advanced Communication White Paper
  • 60
    • 84937478312 scopus 로고    scopus 로고
    • IEEE Global Communications Conference (GLOBECOM), vol 2014. IEEE
    • Qi F, Sun S, Rong B, Hu RQ, Qian Y Cognitive radio based adaptive SON for LTE-a heterogeneous networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), vol 2014. IEEE, pp 4412–4417
    • (2014) pp 4412–4417
    • Qi, F.1    Sun, S.2    Rong, B.3    Hu, R.Q.4
  • 61
    • 84896445081 scopus 로고    scopus 로고
    • Cognitive radio resource management for future cellular networks
    • Lien S-Y, Chen K-C, Liang Y-C, Lin Y (2014) Cognitive radio resource management for future cellular networks. IEEE Wirel Commun 21(1):70–79
    • (2014) IEEE Wirel Commun , vol.21 , Issue.1 , pp. 70-79
    • Lien, S.-Y.1    Chen, K.-C.2    Liang, Y.-C.3    Lin, Y.4
  • 64
    • 58049113451 scopus 로고    scopus 로고
    • Brown TX (2008) Hammer model threat assessment of cognitive radio denial of service attacks
    • DySPAN: IEEE
    • Sethi A, Brown TX (2008) Hammer model threat assessment of cognitive radio denial of service attacks. In: 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks 2008, DySPAN 2008. IEEE, pp 1–12
    • (2008) Networks , vol.2008 , pp. 1-12
    • Sethi, A.1
  • 65
    • 84918834065 scopus 로고    scopus 로고
    • A layered approach to cognitive radio network security: A survey
    • Hlavacek D, Chang JM (2014) A layered approach to cognitive radio network security: A survey. Comput Netw 75(24):414– 436
    • (2014) Comput Netw , vol.75 , Issue.24 , pp. 414-436
    • Hlavacek, D.1    Chang, J.M.2
  • 67
  • 68
    • 85020881921 scopus 로고    scopus 로고
    • Weaponizing femtocells: The effect of rogue devices on mobile telecommunications
    • Golde N, Redon K, Borgaonkar R (2012) Weaponizing femtocells: The effect of rogue devices on mobile telecommunications. In: NDSS
    • (2012) In: NDSS
    • Golde, N.1    Redon, K.2    Borgaonkar, R.3
  • 73
    • 84913593468 scopus 로고    scopus 로고
    • A survey on software-defined network and OpenFlow: from concept to implementation
    • Hu F, Hao Q, Bao K (2014) A survey on software-defined network and OpenFlow: from concept to implementation. IEEE Communications Surveys & Tutorials 16(4):2181–2206
    • (2014) IEEE Communications Surveys & Tutorials , vol.16 , Issue.4 , pp. 2181-2206
    • Hu, F.1    Hao, Q.2    Bao, K.3
  • 76
    • 84990912903 scopus 로고    scopus 로고
    • A multi-agent system for smartphone intrusion detection framework. In: Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Vol 1. Springer
    • Alzahrani AJ, Ghorbani AA (2015) A multi-agent system for smartphone intrusion detection framework. In: Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Vol 1. Springer, pp 101–113
    • (2015) pp 101–113
    • Alzahrani, A.J.1    Ghorbani, A.A.2
  • 77
    • 84990905901 scopus 로고    scopus 로고
    • Evaluation of intrusion prevention technique in lte based network
    • El-Gaml EF, ElAttar H, El-Badawy HM (2014) Evaluation of intrusion prevention technique in lte based network. Int J Sci Eng Res 5:1395–1400
    • (2014) Int J Sci Eng Res , vol.5 , pp. 1395-1400
    • El-Gaml, E.F.1    ElAttar, H.2    El-Badawy, H.M.3
  • 78
    • 84945978084 scopus 로고    scopus 로고
    • Cellpot: A concept for next generation cellular network honeypots
    • Workshop on Security Emergence Network Technology, NDSS
    • Liebergeld S, Lange M, Borgaonkar R (2014) Cellpot: A concept for next generation cellular network honeypots. In: Workshop on Security Emergence Network Technology. NDSS
    • (2014) In
    • Liebergeld, S.1    Lange, M.2    Borgaonkar, R.3
  • 79
    • 84992733698 scopus 로고    scopus 로고
    • A security and trust framework for virtualized networks and software-defined networking
    • Yan Z, Zhang P, Vasilakos AV (2015) A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks
    • (2015) Security and Communication Networks
    • Yan, Z.1    Zhang, P.2    Vasilakos, A.V.3
  • 80
  • 81
    • 84927731786 scopus 로고    scopus 로고
    • Authentication handover and privacy protection in 5G hetnets using software-defined networking
    • Duan X, Wang X (2015) Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun Mag 53(4):28–35
    • (2015) IEEE Commun Mag , vol.53 , Issue.4 , pp. 28-35
    • Duan, X.1    Wang, X.2
  • 82
    • 84927712570 scopus 로고    scopus 로고
    • Safeguarding 5G wireless communication networks using physical layer security
    • Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Renzo MD (2015) Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27
    • (2015) IEEE Commun Mag , vol.53 , Issue.4 , pp. 20-27
    • Yang, N.1    Wang, L.2    Geraci, G.3    Elkashlan, M.4    Yuan, J.5    Renzo, M.D.6
  • 84
    • 84901399118 scopus 로고    scopus 로고
    • Software defined networking for security enhancement in wireless mobile networks
    • Ding AY, Crowcroft J, Tarkoma S, Flinck H (2014) Software defined networking for security enhancement in wireless mobile networks. Comput Netw 66:94–101
    • (2014) Comput Netw , vol.66 , pp. 94-101
    • Ding, A.Y.1    Crowcroft, J.2    Tarkoma, S.3    Flinck, H.4
  • 87
    • 84940542871 scopus 로고    scopus 로고
    • Kim K (2015) Assessing the impact of resource attack in software defined network
    • ICOIN, IEEE
    • Tri N, Hiep T, Kim K (2015) Assessing the impact of resource attack in software defined network. In: 2015 International Conference on Information Networking (ICOIN). IEEE, pp 420–425
    • 2015 International Conference on Information Networking , pp. 420-425
    • Tri, N.1    Hiep, T.2
  • 88
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: architecture, applications, and approaches
    • Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611
    • (2013) Wirel Commun Mob Comput , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 89
    • 84990959329 scopus 로고    scopus 로고
    • Mobile device security in the workplace: 6 key risks & challenges, 2015
    • Mobile device security in the workplace: 6 key risks & challenges, 2015. [Online]. Available: http://focus.forsythe.com/articles/55/Mobile-Device-Security-in-the-Workplace-6-Key-Risks-and-Challenges
  • 90
    • 84888011760 scopus 로고    scopus 로고
    • Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
    • Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706
    • (2013) J Supercomput , vol.66 , Issue.3 , pp. 1687-1706
    • Khan, A.N.1    Kiah, M.M.2    Madani, S.A.3    Ali, M.4
  • 91
    • 84990975918 scopus 로고    scopus 로고
    • SDN and security, 2015.
    • SDN and security, 2015. [Online]. Available: http://onosproject.org/2015/04/03/sdn-and-security-david-jorm/
  • 92
    • 84883671775 scopus 로고    scopus 로고
    • SoftRAN: Software defined radio access network. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM
    • Gudipati A, Perry D, Li LE, Katti S (2013) SoftRAN: Software defined radio access network. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, pp 25–30
    • (2013) pp 25–30
    • Gudipati, A.1    Perry, D.2    Li, L.E.3    Katti, S.4
  • 93
    • 84866518191 scopus 로고    scopus 로고
    • A security enforcement kernel for OpenFlow networks. In: Proceedings of the first workshop on Hot topics in software defined networks. ACM
    • Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G (2012) A security enforcement kernel for OpenFlow networks. In: Proceedings of the first workshop on Hot topics in software defined networks. ACM, pp 121–126
    • (2012) pp 121–126
    • Porras, P.1    Shin, S.2    Yegneswaran, V.3    Fong, M.4    Tyson, M.5    Gu, G.6
  • 94
    • 84897109717 scopus 로고    scopus 로고
    • Combining OpenFlow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
    • Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122–136
    • (2014) Comput Netw , vol.62 , pp. 122-136
    • Giotis, K.1    Argyropoulos, C.2    Androulidakis, G.3    Kalogeras, D.4    Maglaris, V.5
  • 97
    • 84927770130 scopus 로고    scopus 로고
    • Securing software defined networks: taxonomy, requirements, and open issues
    • Akhunzada A, Ahmed E, Gani A, Khan M, Imran M, Guizani S (2015) Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun Mag 53(4):36–44
    • (2015) IEEE Commun Mag , vol.53 , Issue.4 , pp. 36-44
    • Akhunzada, A.1    Ahmed, E.2    Gani, A.3    Khan, M.4    Imran, M.5    Guizani, S.6
  • 98
    • 84921494885 scopus 로고    scopus 로고
    • Security analysis of security applications for software defined networks. In: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference. ACM
    • Tasch M, Khondoker R, Marx R, Bayarou K (2014) Security analysis of security applications for software defined networks. In: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference. ACM, pp 23–30
    • (2014) pp 23–30
    • Tasch, M.1    Khondoker, R.2    Marx, R.3    Bayarou, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.