Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2019 May 19;19(10):2310. doi: 10.3390/s19102310

Packet Key-Based End-to-End Security Management on a Blockchain Control Plane

Younchan Jung 1,*, Marnel Peradilla 2, Ronnel Agulto 1
PMCID: PMC6566163  PMID: 31109156

Abstract

The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based security management (BSM) scheme enables each peer to easily obtain the necessary parameters required to manage the packet key-based security system. The important features of the BSM scheme include the renewal process, which enables the different packet data streams to use completely different security parameters for the security management. In addition, because even blind values cannot be exposed to the possible attackers, our BSM scheme guarantees very secure end-to-end data transfer against active attacks such as falsification of data and transactions. Finally, this paper compares the BSM scheme with the existing vertical model to prove the advantageous effects on latency.

Keywords: blockchain-based security control, security management, vertical model, SDN-based horizontal model, packet key

1. Introduction

The main feature of the Long Term Evolution (LTE) system is to use two independent planes where the signaling information process is done by control plane and the user data process is done by a user data plane [1,2,3,4,5]. As depicted in Figure 1, security management functions are based on the vertical model which uses distributed servers such as Mobility Management Entities (MMEs) and Home Subscriber Servers (HSSs) in LTE networks. Thus, the integrated operation of network control on the control plane enables security management functions to be efficiently implemented within the range of local LTE networks. However, for the end-to-end security management throughout the Internet, different solutions have been explored to use the horizontal network function model [6,7,8,9].

Figure 1.

Figure 1

Security management based on the vertical model distributed servers such as Mobility Management Entity (MME) and Home Subscriber Server (HSS) in LTE networks.

The existing Session Initiation Protocol (SIP) based Voice over Internet Protocol (VoIP) call system uses the vertical model to handle the security management where multiple servers distributed over networks collaborate to control a secure session between the end-to-end peers. The Internet Engineering Task Force (IETF)’s direction is to use the horizontal model. One of the horizontal models introduced for the future 5G mobile networks is Software-Defined Networking (SDN) [10,11,12,13]. SDN is an emerging networking paradigm that changes the limitations of the existing vertical model including LTE network control model, which separates the network’s control plane from the data plane [14]. In SDN, the control plane is implemented in a logically centralized controller, simplifying the policy enforcement and network function configuration. The centralized network controller in the control plane manages the intelligence and state of the entire network for the network functions such as security management and mobility management [15,16]. However, the current network legacy devices are not yet ready to implement the horizontal model [17,18,19,20].

The goal of this paper is to develop a blockchain-based security management (BSM) scheme which utilizes a packet key-based system to perform better and extends the scope in security management from the local area to the end-to-end security service range. As depicted in Figure 2, our BSM structure is close to the administrative control that the SDN-based horizontal model operates with. However, while the software-defined controller on the control plane functions as the control center, the BSM scheme utilizes one of the most innovative features of the blockchain where there is no central server running. BSM operates between two end-to-end peers without environments of the distributed servers and the centralized controller [21,22]. Thus, this idea gives significantly advantageous effects on the end-to-end security management by reducing the complexity of the system deployment and latency taken for the end-to-end secure session set up. From the latency viewpoints, our BSM scheme is more advantageous in security management because security parameter agreements between end-to-end peers can be easily obtained via blockchain. Furthermore, considering low latency of 1 ms in 5G networks (10 to 20 ms for 4G), our BSM scheme is more useful in 5G environments because it requires less computational load during secure session setup and the latency to the setup secure session is mainly affected by the network delay components [23,24,25].

Figure 2.

Figure 2

End-to-end packet key-based security management on the blockchain control plane.

The rest of this paper is organized as follows. In Section 2, this paper proposes and explains the BSM scheme. Then, Section 3 describes the improvement effects of the proposed BSM scheme. This paper will be concluded in Section 4.

2. Blockchain-Based Security Management (BSM) Scheme

2.1. Security Management on the Blockchain Control Plane

As shown in Figure 3, the blockchain-based security management (BSM) network architecture explains the feature of the control plane. The steps to run the network are as follows:

  1. New transactions, which include ToALL Tx and Peer-fitted Tx, are sent to the nearest super node (SN). After the SN receives the transaction message, it broadcasts the message to all SNs. Each transaction message contains several pieces of field data for security management, which will be described later.

  2. Like Bitcoin, our BSM scheme uses the consensus algorithm of PoW (Proof of Work). Thus, the PoW mining involves numerous hashing attempts. In the BSM network SNs are only able to add a new block to the blockchain if the distributed SNs reach consensus and agree that the block has provided by the miner is a valid proof of work. Differently from Bitcoin SNs are pre-determined at the stage of the system deployment. In addition, the BSM scheme limits the average block creation period within 1 second. The SN collects new transactions into a block and performs on finding a proof-of-work for its block. There are two kinds of blockchains: full blockchain and block-header chain. Here, the SN maintains the full blockchain while EN usually maintains the block-header chain. Later, when the end node (EN) needs a certain transactio information, it sends a query message to the nearest SN. Then, the SN searches the corresponding transaction data from the full blockchain and sends replies to the EN.

  3. When an SN finds a proof-of-work, it broadcasts the block to all SNs.

  4. SNs accept the block only if all transactions in it are valid.

  5. Nodes imply their acceptance of the block by working on creating the next necessary block in the chain, using the hash of the accepted block as the previous hash. SNs and ENs will always keep working on extending full blockchains and block-header chains respectively.

  6. The EN is responsible for updating its valid information for security management by pushing them into the blockchain. The valid information is contained in either ToALL Tx or Peer-fitted Tx.

Figure 3.

Figure 3

Blockchain-based Security Management (BSM) network architecture.

Here, we define the latency from the moment a new transaction is announced to the network until the event that the transaction successfully gets in the blockchain as Time-to-Get-in-Blockchain (TGinB). It is easy to adjust the average of TGinB value by controlling the block creation difficulty because our BSM scheme is based on the private blockchain among the SNs differently from the public blockchain where at least 51% miners have to agree for changing the difficulty [26]. Our BSM scheme adjusts this difficulty to target 1 second between blocks. The period of 1 second for TGinB means that it only takes 1 second on average for a certain EN’s new information for security management to become available to other ENs since the transaction information becomes valid on the blockchain after 1 second from the moment when the transaction was sent to the network.

2.2. BSM Wallet

The following information, which is maintained in the wallet, is used for the security management.

  • Prime number (q) and primitive root (α): global parameters in the Diffie–Hellman key exchange.

  • An array of secret values (XENs), that is, Secret Value Vector (SVV), for packet key agreements.

The tasks performed by the wallet software also include:

  • generates the corresponding public key (pubKey) and the hash address (My_Hash_Addr),

  • generates an array of blind keys (YENs), that is, Blind Value Vector (BVV), using the equation of YEN=αXENmodq.

  • generates an array of index values (HENs), that is, Blind Value Hash Table (BVHT), using the equation of HEN= Hash(YEN). ‘Hash’ is a one-way hash function which accepts the blind value as input (YEN) and produces a fixed-size message digest as output (HEN).

2.3. Security Parameter Agreement between Peers by Using Blockchain

Transactions, which grow without ceasing, are stored into a distributed database called the blockchain. There are two types of transactions: ToALL Tx and Peer-fitted Tx. Each EN sends its ToALL Tx to the network in advance. This process belongs to the registration step. Then, the ToALL Tx allows a certain session initiator to reach the ToALL transaction information of the session responder. The Peer-fitted Tx is sent to the network in order that the session responder obtains the session initiator’s Tx information during the session initiation stage. As illustrated in Figure 4, the BSM transaction consists of Transaction Input (TxIn) and Transaction Output (TxOut). The TxIn contains the signature and the public key computed from the EN’s private key which creates the transaction. The first field of TxOut contains the hash address that identifies the owner of this transaction.

Figure 4.

Figure 4

BSM transaction architecture.

Figure 5 illustrates how the SNs handles ToALL Txs and Peer-fitted Txs to establish the packet key-based secure session. Each EN, which needs the blockchain-based security management services, should store its ToALL Tx information into the blockchain in the pre-session stage. This process belongs to ToALL Tx initialization stage. Now, let’s assume the case that ENA wants to set up a packet key-based secure session with ENB. ENA first uses the Query/Reply procedure to obtain the ENB’s ToALL Tx information. After ENA succeeds to obtain ENB’s ToALL Tx information, it sends the secure session request message destined to ENB along with sending the Peer-fitted Tx to the network. When ENB receives the secure session request message from ENA, it extracts the Peer-fitted Tx from the blockchain. Then, all parameters for security management are agreed between the peers. Then, both peers renew their ToALL Txs. As a result of this renewal process, every session uses a different set of security parameters which contribute to guarantee a much more secure session.

Figure 5.

Figure 5

Security parameter agreement between peers by using blockchain.

2.4. Ever-Growing Series of Blocks and Blockchain Access

2.4.1. Creation of ToALL Tx Blocks

The blockchain is a distributed database holding all the BSM transactions, that is, ToALL and Peer-fitted Txs, and keeps them secure. Figure 6 explains how the ToALL Tx information is stored in the blockchain. When a BSM application of ENA begins to work, ENA creates and maintains m-sized Secret Value Vector of ENA, SVVA=[(1,XA,1),(2,XA,2),(3,XA,3),,(m,XA,m)]. Then, ENA calculates corresponding Blind Value Vector of ENA, BVVA=[(1,YA,1),(2,YA,2),(3,YA,3),,(m,YA,m)] where YA,i=αAXA,imod qA, i=1,2,3,,m. ENA sends ToALL Tx, which contains the value field of global parameters (αA,qA) and BVVA, to the network expecting that those values are successfully stored in the blockchain within 1 second. Because of this registration process, the ToALL Tx information converts to public status so that any peer EN can be available to reach that ToALL Tx via the blockchain.

Figure 6.

Figure 6

ToALL Tx registration.

2.4.2. Obtaining the Peer’s Information for Security Management

The procedure of a secure session establishment begins with the Query/Reply mechanism to obtain the peer’s information for security management. Figure 7 shows how ENA as a session initiator obtains the session responder ENB’s information. ENA send Query for ENB’s ToALL information to the nearest SN. Because ENB already registered its ToALL Tx to the blockchain, ENA can receive the reply of ENB’s ToALL information from its nearest SN. Therefore, ENA can obtain <Values> in ENB’s ToALL Tx: (αB,qB) and BVVB.

Figure 7.

Figure 7

Tx information access by Query/Reply mechanism.

2.4.3. Creation of Peer-Fitted Block

Because of the Query/Reply mechanism, ENA obtains (αB,qB) and BVVB. Here, for the scalability of our BSM scheme, it is assumed that the session initiator and the session responder use different global parameters. This means that our BSM scheme can be used to secure end-to-end peers which belong to different groups. If the BSM scheme operates between end-to-end peers in the same group, the use of the Peer-fitted Tx is not necessary. Because the BSM scheme is scalable, it requires the additional steps to handle the Peer-fitted Tx. The additional steps are as follows.

  • The session initiator creates the Peer-fitted Tx.

  • The session initiator sends the Peer-fitted Tx to the network.

  • Some SN create a new block, which includes the Peer-fitted Tx and uses it to extend the blockchain.

  • The session responder finally extracts the Peer-fitted Tx from the blockchain.

Those steps contribute to increase latency to complete the procedure of the secure session setup. This increased latency issue results in limitation of the BSM scheme.

Then, using (αB,qB), ENA calculates BVVA of [(1,YA,1),(2,YA,2),(3,YA,3),,(m,YA,m)] based on SVVA of [(1,XA,1),(2,XA,2),(3,XA,3),,(m,XA,m)]. As shown in Figure 8, ENA sends Peer-fitted Tx to the network where the Tx contains BVVA where the component of YA,i is calculated by using the equation of αBXA,i mod qB. When (5) Secure session request arrives at ENB, ENB can obtain BVVA via (6) Extract Peer-fitted Tx and (7) Reply.

Figure 8.

Figure 8

Sending Peer-fitted Blind Value Vector information via blockchain.

2.4.4. Security Parameter Agreements between Peers

As shown in Figure 9, ENB can maintain security-related parameters: SVVB, BVVA, and the index table of BVHTB. Here, HB,i, which is the hashed value of YB,i, can be used as the index of security parameters selected. In addition, ENA side can use security-related parameters: SVVA, BVVB, and the index table of BVHTA. Now, both sides are ready to use the packet-key system.

Figure 9.

Figure 9

Security parameter agreements between peers.

2.4.5. Renewal Process for the Security Parameters

The secure aspect of our BSM system is due to the fact that each secure session establishment procedure uses the different set of security parameters: SVV, BVV, and BVHT. Each EN uses a different SVV of [(1,X1),(2,X2),(3,X3),,(m,Xm)] every session. This means that once SVV is used, the previous SVV is replaced with new SVV*. Thus, the BVV*, which calculated from the new SVV*, needs to be made public. This is the ToALL Tx renewal process shown in Figure 10. ENA creates SVVA* of [(1,XA,1*),(2,XA,2*),(3,XA,3*),,(m,XA,m*)] and calculates the corresponding BVVA* of [(1,YA,1*),(2,YA,2*),(3,YA,3*),,(m,YA,m)*] using the equation of YA,i*=αA XA,i* mod qA. Then, the ToALL Tx, which includes the value field of (αA,qA) and BVVA*, is sent to the network.

Figure 10.

Figure 10

ToAll Tx renewal.

2.5. Operation of the Packet Key Bbased Secure Data Session

Figure 11 explains how the proposed scheme encrypts the whole session by applying a different packet key to each datagram under the condition that ENA and ENB maintain [(1,XA,1),(2,XA,2),(3,XA,3),,(m,XA,m)] and [(1,XB,1),(2,XB,2),(3,XB,3),...(m,XB,m)], respectively. In addition, ENA and ENB are ready to use [(1,YB,1),(2,YB,2),(3,YB,3),,(m,YB,m)] and [(1,YA,1),(2,YA,2),(3,YA,3),(m,YA,m)], respectively. Then, when ENA starts to send nth datagram to ENB, ENA selects an index value randomly. Here, we assume that g is selected. Then, ENA computes the packet key of KA,g using the equation of YB,gXA,gmodqB. Now, ENA can encrypt the nth datagram using the resultant packet key which results in E (nth datagram, KA,g), where E is any symmetrical key encryption algorithm. Finally, ENA sends the encrypted nth datagram together with the index value of g. When ENB receives the encrypted nth datagram from ENA, ENB finds the index value of g. Then, ENB computes the packet key of KB,g using the equation of YA,gXB,gmodqB. Now, ENB can decrypt the encrypted nth datagram using the resultant packet key, which results in D(E(nth datagram, KA,g), KB,g), where D is the same symmetrical key Decryption algorithm as ENA. Finally, ENB obtains the nth datagram.

Figure 11.

Figure 11

Packet key encryption and decryption for the secure datagram flow.

3. Improvement Effects of the Proposed BSM Scheme

3.1. Effects on Security

The most attractive feature of the packet key scheme is that there is little chance to reuse the same packet key for a continuous packet data stream. Additional advantageous effects are as follows. As shown in Figure 10, the renewal process of the BSM scheme enables the different packet data session to use completely different security parameters for security management. Therefore, our BSM scheme is secure against the powerful eavesdroppers who use brute-force approaches even to try after-transmission attacks. Our BSM scheme also uses BVHT to indicate the index value associated with the packet key used. The one-way hash function accepts the blind value selected from the BVV as input and produces a fixed-size hash value as output, which is used as the index value. As shown in Figure 11, each datagram in a secure datagram flow contains the corresponding index value for a certain blind value. This means that our BSM scheme protects the blind values while the existing Diffie–Hellman key exchange method exposes the blind values. Instead of the blind values, exposing the hash values to the possible attackers contributes to our BSM scheme to lead to very secure end-to-end data transfer systems against active attacks such as falsification of data and transactions.

3.2. Effects on Latency

In SIP-based VoIP call operation, an end user sends SIP requests to initiate a session. Figure 12 shows a series of steps required to complete a packet key-based secure VoIP session set up between two ENs.

Figure 12.

Figure 12

Secure Session Initiation Protocol (SIP) model for the packet key-based encrypted data flow.

This paper calls the existing SIP plus packet key model shown in Figure 12 a “vertical model”. Some assumptions are necessary to perform the comparative analysis with respect to total latency to complete security management between ENA and ENB, where they are located in different domains. This paper assumes three types of delays, that is (1) TIntra: intra-domain delay caused in intra-domain links, (2) TE2E: end-to-end delay caused in end-to-end path, (3) TBVV: processing delay caused to compute BVV, and (4) TGinB: latency for creating a block.

Table 1 shows comparisons on latency needed to set up a packet key-based secure session between the proposed BSM model, the non-scalable BSM model, and the vertical model. Figure 13 shows the secure session setup procedure for the non-scalable BSM scheme. Compared to the proposed BSM scheme in Figure 5, it is shown that the secure session setup procedure for the non-scalable BSM scheme is much simpler.

Table 1.

Comparisons on latency needed to set up packet key-based session.

Models Latency to Setup a Secure Session
Proposed BSM model 2TIntra ((1), (2) in Figure 7)
1TBVV ((3) in Figure 8)
1TGinB ((4)+(5)+(6)+(7) in Figure 8)
(2TIntra+1TBVV+1TGinB)
Non-scalable BSM model 2TIntra ((1), (2) in Figure 13)
1TE2E ((3) in Figure 13)
2TIntra ((4), (5) in Figure 13)
(4TIntra + 1TE2E)
Vertical model 2TE2E: ((b), (d) in Figure 12)
2TBVV ((a), (c) in Figure 12)
(2TE2E+2TBVV)

Figure 13.

Figure 13

Secure session setup procedure in the non-scalable BSM model.

The latency of TBVV changes depending on the size of BVV as well as the size of the secret value. Here, the size of the secret value, as well as the blind value, is the same as that of the packet key. Recall that calculating each component of the BVV needs the corresponding latency for the computation of αAXA,imodqA. Table 2 shows experimental data on computational latency needed to compute each blind value for a given secret value. The results were obtained from the testbed with 2.2GHz i7-8750H CPU. Then, the m-sized BVV requires m times the above latency.

Table 2.

Key-size varying latency for computing a blind value.

Packet Key Size (bits) Latency to Compute αAXA,imodqA (ms)
256 1
512 3
1024 4
2048 7
3072 19

Figure 14 plots the total latency to set up the packet key-based secure session in the BSM model, which corresponds to the latency of 2TIntra+1TBVV+1TGinB. Here, we assume that 2 × TIntra is 0.4 s and TGinB is one second.

Figure 14.

Figure 14

Total latency to set up a packet key-based secure session in the BSM model.

Figure 15 plots the total latency to set up the packet key-based secure session in the non-scalable BSM model, which corresponds the latency of 4TIntra+1TE2E. Here, we assume that 4 × TIntra is 0.8 s and TE2E is 0.5 s. For the non-scalable BSM model, the total latency is independent of the parameter of TBVV. It is shown that the total latency to setup the packet key-based secure session can be dramatically reduced if the proposed BSM scheme operates in the limited scale.

Figure 15.

Figure 15

Total latency to set up a packet key-based secure session in the non-scalable BSM model.

Figure 16 plots the total latency to set up the packet key-based secure session in the vertical model, which corresponds to the latency of 2TE2E+2TBVV. Here, we assume that 2 × TE2E is one second.

Figure 16.

Figure 16

Total latency to set up a packet key-based secure session in the vertical model.

The use of packet key guarantees very secure data flow [27]. However, the latency to set up the secure session needs to be limited to below several seconds. In Figure 14, it is shown that the BVV size of 1600 and the key size of 2048 bits are enough to satisfy the session set up latency below 10 s. On the other hand, according to Figure 16, the condition of 1600-sized BVV and 2048-sized key causes the latency to rise beyond 20 s. If the vertical model uses the BVV size of 2000 and the key size of 2048 bits, its packet key session setup latency tends to increase up to 30 s. As a result, it is proved that, compared with the vertical model, our BSM scheme effects are better by almost 200% on latency to set up a secure session while it provides the same security level as the vertical model.

Table 3 shows comparisons on two kinds of network delay components for the 3G, 4G and 5G networks. According to [24], TIntra can be reduced to 2 ms in 5G networks while TIntra of 20 ms is required in 4G networks. Then, it is reasonable to consider that TE2E values in 4G networks and 5G networks are 50 ms and 5 ms, respectively.

Table 3.

Network delays for 3G, 4G, and 5G networks.

Networks TIntra TE2E
3G 200 ms 500 ms
4G 20 ms 50 ms
5G 2 ms 5 ms

Figure 17 plots the latency comparisons for different models. Those latency results are based on the conditions that 3G networks work and the size of BVV is 400, that is, m = 400. Considering that in the packet key scheme different keys are supplied for different packets, packet key size of around 512 bits is enough to satisfy the secure session. It is shown that either the proposed BSM model or the non-scalable BSM model guarantees latency level of 2500 ms even in 3G networks.

Figure 17.

Figure 17

Total latency to set up a packet key-based secure session in 3G networks for the case size of Blind Value Vector (m) = 400.

Figure 18 plots the latency comparisons for different models in 4G environments where m = 400. It is shown that the key size of 512 bits is the turning point where the proposed BSM scheme performs better on latency compared with the vertical model. In addition, the non-scalable BSM model guarantees very low latency level as the 4G networks guarantee fast data rates.

Figure 18.

Figure 18

Total latency to set up a packet key-based secure session in 4G networks for the case size of Blind Value Vector (m) = 400.

Figure 19 plots the latency comparisons for different models in 5G environments where m = 400. In 5G environments, with the key size of 512 bits, latency level can be reduce to 2000 ms in the BSM model. In addition, the non-scalable BSM model guarantees much less latency level as the 5G networks serve very fast data rates.

Figure 19.

Figure 19

Total latency to set up a packet key-based secure session in 5G networks for the case size of Blind Value Vector (m) = 400.

4. Conclusions

Existing phone systems, such as SIP-based VoIP call systems, use the vertical model to solve issues relating to the security management. As of now, as IETF suggests, an alternative solution is to use the SDN horizontal model where a centralized software-defined network controller on the control plane is in charge of security management. The goal of this paper is to introduce blockchain technologies to manage a packet key-based security system, which can overcome the limitation that the vertical model is confronted with. While the packet key-based security system can provide very strong security strength, it needs a high computational power to agree on security parameters between peers at the packet key session setup phase. Our BSM scheme is advantageous from the perspective that, using blockchain, each peer can easily obtain the necessary parameters required to handle security management.

Advantageous effects in our BSM scheme result from the renewal process, which enables the different packet data sessions to use completely different security parameters for the security management. Therefore, our BSM scheme is secure against the powerful eavesdroppers who use brute-force approaches even to try after-transmission attacks. In addition, in our BSM scheme, corresponding hash values travel together with the secured datagrams so that even blind values cannot be exposed to the possible attackers. This contributes our BSM scheme to lead to very secure end-to-end data transfer systems against active attacks such as falsification of data and transactions. From the viewpoints of latency, the BSM scheme performs better by around 200% than the existing vertical model.

Author Contributions

Y.J. initiated the idea, designed the security management scheme and wrote the paper; M.P. made contributions in the proposed security management scheme and edited the paper; R.A. conducted the experiment setup and helped to finalize the paper.

Funding

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2017R1A2B4006086).This study was also supported by the Research Fund, 2019 of the Catholic University of Korea.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

References

  • 1.Saini A., Festijo E.D., Jung Y. Packet key-based security system for the next generation LTE networks. Procedia Comput. Sci. 2017;110:297–303. doi: 10.1016/j.procs.2017.06.098. [DOI] [Google Scholar]
  • 2.Ahmad F., Peradilla M., Saini A., Jung Y. Improving security level of LTE access procedure by using short-life shared key. IEICE Trans. Commun. 2017;100:738–748. doi: 10.1587/transcom.2016EBP3267. [DOI] [Google Scholar]
  • 3.Alamouti S., Sharafat A.R. Device-to-Device Communications in Multi-Cell LTE-Advanced Networks with Cloud Radio Access Network Architecture. IEEE Commun. Stand. Mag. 2018;2:90–94. doi: 10.1109/MCOMSTD.2018.1700018. [DOI] [Google Scholar]
  • 4.Ahmad I., Shahabuddin S., Kumar T., Okwuibe J., Gurtov A., Ylianttila M. Security for 5G and Beyond. IEEE Commun. Surv. Tutorials. 2019 doi: 10.1109/COMST.2019.2916180. [DOI] [Google Scholar]
  • 5.Tahir M.N., Maenpaa K., Sukuvaara D.T. Evolving Wireless Vehicular Communication System level comparison and analysis of 802,11 p, 4G 5G; Proceedings of the 2nd International Conference on Communication, Computing and Digital systems (C-CODE); Islamabad, Pakistan. 6–7 March 2019; pp. 48–52. [DOI] [Google Scholar]
  • 6.Tantayakul K., Dhaou R., Paillassa B. Mobility management with caching policy over SDN architecture; Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN); Berlin, Germany. 6–8 November 2017; pp. 1–7. [DOI] [Google Scholar]
  • 7.Tantayakul K., Dhaou R., Paillassa B. Impact of SDN on Mobility Management; Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA); Crans-Montana, Switzerland. 23–25 March 2016; pp. 260–265. [DOI] [Google Scholar]
  • 8.Sun G., Al-Ward H., Boateng G.O., Jiang W. Content-Aware Caching in SDN-Enabled Virtualized Wireless D2D Networks to Reduce Visiting Latency; Proceedings of the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS); Chengdu, China. 9–12 October 2018; pp. 149–150. [DOI] [Google Scholar]
  • 9.Ko H., Jang I., Lee J., Pack S., Lee G. SDN-based distributed mobility management for 5G; Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE); Las Vegas, NV, USA. 8–10 January 2017; pp. 116–117. [DOI] [Google Scholar]
  • 10.Baktir A.C., Ozgovde A., Ersoy C. How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions. IEEE Commun. Surv. Tutor. 2017;19:2359–2391. doi: 10.1109/COMST.2017.2717482. [DOI] [Google Scholar]
  • 11.Elsadek W.F., Mikhail M.N. IP mobility management using software defined networking: A review; Proceedings of the 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC); Chengdu, China. 15–17 December 2017; pp. 76–81. [DOI] [Google Scholar]
  • 12.Cox J.H., Chung J., Donovan S., Ivey J., Clark R.J., Riley G., Owen H.L. Advancing Software-Defined Networks: A Survey. IEEE Access. 2017;5:25487–25526. doi: 10.1109/ACCESS.2017.2762291. [DOI] [Google Scholar]
  • 13.Bera S., Misra S., Vasilakos A.V. Software-Defined Networking for Internet of Things: A Survey. IEEE Internet Things J. 2017;4:1994–2008. doi: 10.1109/JIOT.2017.2746186. [DOI] [Google Scholar]
  • 14.Din I.U., Kim B.S., Hassan S., Guizani M., Atiquzzaman M., Rodrigues J.J.P.C. Information-Centric Network-Based Vehicular Communications: Overview and Research Opportunities. Sensors. 2018;18 doi: 10.3390/s18113957. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 15.Jung Y., Peradilla M., Saini A. Software-defined Naming, Discovery and Session Control for IoT Devices and Smart Phones in the Constraint Networks. Procedia Comput. Sci. 2017;110:290–296. doi: 10.1016/j.procs.2017.06.097. [DOI] [Google Scholar]
  • 16.Festijo E., Jung Y., Peradilla M. Software-defined security controller-based group management and end-to-end security management. J. Ambient Intell. Humanized Comput. 2018 doi: 10.1007/s12652-018-0678-6. [DOI] [Google Scholar]
  • 17.Bhatia A., Haribabu K., Gupta K., Sahu A. Realization of flexible and scalable VANETs through SDN and virtualization; Proceedings of the 2018 International Conference on Information Networking (ICOIN); Chiang Mai, Thailand. 10–12 January 2018; pp. 280–282. [DOI] [Google Scholar]
  • 18.Hätönen S., Savolainen P., Rao A., Flinck H., Tarkoma S. Off-the-Shelf Software-defined Wi-Fi Networks; Proceedings of the 2016 ACM SIGCOMM Conference; Florianopolis, Brazil. 22–26 August 2016; pp. 609–610. [DOI] [Google Scholar]
  • 19.Bifulco R., Boite J., Bouet M., Schneider F. Improving SDN with InSPired Switches; Proceedings of the Symposium on SDN Research; Santa Clara, CA, USA. 14–15 March 2016; pp. 11:1–11:12. [DOI] [Google Scholar]
  • 20.Luo H., Wu K., Ruby R., Liang Y., Guo Z., Ni L.M. Software-Defined Architectures and Technologies for Underwater Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutor. 2018;20:2855–2888. doi: 10.1109/COMST.2018.2842060. [DOI] [Google Scholar]
  • 21.Fekih A., Gaied S., Yousef H. A comparative study of content-centric and software defined networks in smart cities; Proceedings of the 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C); Sfax, Tunisia. 17–19 February 2017; pp. 147–151. [DOI] [Google Scholar]
  • 22.Kumari A., Gowri S., Radhika E.G. An Approach for End-to-End (E2E) Security of 5G Applications; Proceedings of the 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS); Omaha, NE, USA. 3–5 May 2018; pp. 133–138. [DOI] [Google Scholar]
  • 23.Parvez I., Rahmati A., Guvenc I., Sarwat A.I., Dai H. A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions. IEEE Commun. Surv. Tutor. 2018;20:3098–3130. doi: 10.1109/COMST.2018.2841349. [DOI] [Google Scholar]
  • 24.Kiss P., Reale A., Ferrari C.J., Istenes Z. Deployment of IoT applications on 5G edge; Proceedings of the 2018 IEEE International Conference on Future IoT Technologies (Future IoT); Eger, Hungary. 18–19 January 2018; pp. 1–9. [DOI] [Google Scholar]
  • 25.López Rodríguez F., Silva Dias U., Campelo D.R., Oliveira Albuquerque R.d., Lim S.J., García Villalba L.J. QoS Management and Flexible Traffic Detection Architecture for 5G Mobile Networks. Sensors. 2019;19:1335. doi: 10.3390/s19061335. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 26.Košťál K., Helebrandt P., Belluš M., Ries M., Kotuliak I. Management and Monitoring of IoT Devices Using Blockchain. Sensors. 2019;19 doi: 10.3390/s19040856. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 27.Festijo E., Jung Y. An Open Horizontal Model for Group Management and End-to-End Security Management Suitable for Group-based Private Systems; Proceedings of the International Conference on Internet of Things and Cloud Computing; Cambridge, UK. 22–23 March 2016; pp. 19:1–19:12. [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES