Skip to main content
Top
Published in: Wireless Personal Communications 4/2023

19-04-2023

Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions

Authors: Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar, Bhawani Shankar Chowdhry

Published in: Wireless Personal Communications | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Modern communication systems are probable to surface new challenges while introducing innovative fronts concerning context consciousness in wireless networks. The main outcome behind this expected technological jump will be a whole novel set of intuiting aptitudes forecasted for Fifth Generation (5G) enabled devices. In line with 5G, Software Defined Networking (SDN) is also rising as an intrinsically novel phenomenon. SDN is an unconventional methodology and key technology in modern communication. SDN maintains favorable novelty about network programmability, where network administration is permitted with extraordinary intellections. SDN architecture has the prospective to allow, simplify or augment security implementations in network through instantly reprogrammable centralized view of the data plane. In the near future, 5G and SDN will ripe mobile communication through the development of state-of-the-art implementations such as a smart city, advanced military security, modern national defense, intelligent traffic, etc.; thereby, these emerging mobile communication concepts invoke various significant topics, where security is a paramount implication. Therefore, we initiate our focus from basic architecture of 5G and SDN. Next, we analyze security requirements, solutions and challenges in joint paradigm of 5G and SDN. Further, considering the modern communication technological shift, we discuss future trends and research directions in the joint era of 5G and SDN technologies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dhawan, S., et al. (2022). Internet of medical things devices: A review. Convergence of deep learning and artificial intelligence in internet of things (pp. 135–148). CRC Press.CrossRef Dhawan, S., et al. (2022). Internet of medical things devices: A review. Convergence of deep learning and artificial intelligence in internet of things (pp. 135–148). CRC Press.CrossRef
2.
go back to reference Javaid, M., et al. (2022). Progressive schema of 5G for Industry 4.0: features, enablers, and services. Industrial Robot: the international journal of robotics research and application, 49, 527–543.CrossRef Javaid, M., et al. (2022). Progressive schema of 5G for Industry 4.0: features, enablers, and services. Industrial Robot: the international journal of robotics research and application, 49, 527–543.CrossRef
3.
go back to reference Prathiba, S. B., et al. (2021). SDN-assisted safety message dissemination framework for vehicular critical energy infrastructure. IEEE Transactions on Industrial Informatics, 18, 3510–3518.CrossRef Prathiba, S. B., et al. (2021). SDN-assisted safety message dissemination framework for vehicular critical energy infrastructure. IEEE Transactions on Industrial Informatics, 18, 3510–3518.CrossRef
4.
go back to reference Sun, P. (2021). 5GtoB evolution path. Unleashing the power of 5GtoB in industries (pp. 273–279). Springer.CrossRef Sun, P. (2021). 5GtoB evolution path. Unleashing the power of 5GtoB in industries (pp. 273–279). Springer.CrossRef
5.
go back to reference Habib, A. A., Hasan, M. K., Alkhayyat, A., Islam, S., Sharma, R., & Alkwai, L. M. (2023). False data injection attack in smart grid cyber physical system: Issues, challenges, and future direction. Computers and Electrical Engineering, 107, 108638.CrossRef Habib, A. A., Hasan, M. K., Alkhayyat, A., Islam, S., Sharma, R., & Alkwai, L. M. (2023). False data injection attack in smart grid cyber physical system: Issues, challenges, and future direction. Computers and Electrical Engineering, 107, 108638.CrossRef
6.
go back to reference Ren, C., et al. (2020). Achieving near-optimal traffic engineering using a distributed algorithm in hybrid SDN. IEEE Access, 8, 29111–29124.CrossRef Ren, C., et al. (2020). Achieving near-optimal traffic engineering using a distributed algorithm in hybrid SDN. IEEE Access, 8, 29111–29124.CrossRef
7.
go back to reference Das, D., et al. (2023). Blockchain enabled SDN framework for security management in 5g applications. In 24th international conference on distributed computing and networking. Das, D., et al. (2023). Blockchain enabled SDN framework for security management in 5g applications. In 24th international conference on distributed computing and networking.
8.
go back to reference Grumert, E. F., & Olstam, J. (2023). An automated process for identification of bottlenecks in the traffic system using large data sets. Journal of Transportation Engineering, Part A: Systems, 149(3), 04022156. Grumert, E. F., & Olstam, J. (2023). An automated process for identification of bottlenecks in the traffic system using large data sets. Journal of Transportation Engineering, Part A: Systems, 149(3), 04022156.
9.
go back to reference Singh, R., Sukapuram, R., & Chakraborty, S. (2023). A survey of mobility-aware multi-access edge computing: challenges, use cases and future directions. Ad Hoc Networks, 140, 103044.CrossRef Singh, R., Sukapuram, R., & Chakraborty, S. (2023). A survey of mobility-aware multi-access edge computing: challenges, use cases and future directions. Ad Hoc Networks, 140, 103044.CrossRef
10.
go back to reference Parra Espín, J. A., et al., Sdn-based automated rekey of ipsec security associations: design and practical validations. Available at SSRN 4326498. Parra Espín, J. A., et al., Sdn-based automated rekey of ipsec security associations: design and practical validations. Available at SSRN 4326498.
11.
go back to reference Singh, S., & Prakash, S. (2019). A survey on software defined network based on architecture, issues and challenges. In 2019 3rd international conference on computing methodologies and communication (ICCMC). IEEE. Singh, S., & Prakash, S. (2019). A survey on software defined network based on architecture, issues and challenges. In 2019 3rd international conference on computing methodologies and communication (ICCMC). IEEE.
12.
go back to reference Zhou, W., et al. (2022). Design and implementation of semi-physical platform for label based frame switching in integrated satellite terrestrial networks. Applied Sciences, 12(13), 6674.CrossRef Zhou, W., et al. (2022). Design and implementation of semi-physical platform for label based frame switching in integrated satellite terrestrial networks. Applied Sciences, 12(13), 6674.CrossRef
13.
go back to reference Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDOS) attacks in sdn and cloud computing environments. IEEE Access, 7, 80813–80828.CrossRef Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDOS) attacks in sdn and cloud computing environments. IEEE Access, 7, 80813–80828.CrossRef
14.
go back to reference Siddiqui, M. U. A., et al. (2021). Interference management in 5G and beyond network: Requirements, challenges and future directions. IEEE Access, 9, 68932–68965.CrossRef Siddiqui, M. U. A., et al. (2021). Interference management in 5G and beyond network: Requirements, challenges and future directions. IEEE Access, 9, 68932–68965.CrossRef
15.
go back to reference Erunkulu, O. O., et al. (2021). 5G mobile communication applications: A survey and comparison of use cases. IEEE Access, 9, 97251–97295.CrossRef Erunkulu, O. O., et al. (2021). 5G mobile communication applications: A survey and comparison of use cases. IEEE Access, 9, 97251–97295.CrossRef
16.
go back to reference Shanmugam, H. M., & Srinivasan, S. (2020). A review on future security challenges in 5G: Future security challenges in 5G. Asia-Pacific Journal of Management and Technology, 1(2), 8–12. Shanmugam, H. M., & Srinivasan, S. (2020). A review on future security challenges in 5G: Future security challenges in 5G. Asia-Pacific Journal of Management and Technology, 1(2), 8–12.
17.
go back to reference Pohrmen, F. H., Das, R. K., & Saha, G. (2019). Blockchain-based security aspects in heterogeneous internet-of-things networks: A survey. Transactions on Emerging Telecommunications Technologies, 30(10), e3741.CrossRef Pohrmen, F. H., Das, R. K., & Saha, G. (2019). Blockchain-based security aspects in heterogeneous internet-of-things networks: A survey. Transactions on Emerging Telecommunications Technologies, 30(10), e3741.CrossRef
18.
go back to reference Nisar, K., et al. (2020). A survey on the architecture, application, and security of software defined networking: Challenges and open issues. Internet of Things, 12, 100289.CrossRef Nisar, K., et al. (2020). A survey on the architecture, application, and security of software defined networking: Challenges and open issues. Internet of Things, 12, 100289.CrossRef
20.
go back to reference Yurekten, O., & Demirci, M. (2021). SDN-based cyber defense: A survey. Future Generation Computer Systems, 115, 126–149.CrossRef Yurekten, O., & Demirci, M. (2021). SDN-based cyber defense: A survey. Future Generation Computer Systems, 115, 126–149.CrossRef
21.
go back to reference Hassan, R., et al. (2020). Internet of things and its applications: A comprehensive survey. Symmetry, 12(10), 1674.CrossRef Hassan, R., et al. (2020). Internet of things and its applications: A comprehensive survey. Symmetry, 12(10), 1674.CrossRef
22.
go back to reference Alam, T. (2020). Cloud-MANET and its role in software-defined networking. Transactions on Science and Technology, 7(1), 1–7. Alam, T. (2020). Cloud-MANET and its role in software-defined networking. Transactions on Science and Technology, 7(1), 1–7.
23.
go back to reference Madi, T., et al. (2021). NFV security survey in 5G networks: A three-dimensional threat taxonomy. Computer Networks, 197, 108288.CrossRef Madi, T., et al. (2021). NFV security survey in 5G networks: A three-dimensional threat taxonomy. Computer Networks, 197, 108288.CrossRef
24.
go back to reference Barakabitze, A. A., et al. (2020). 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Computer Networks, 167, 106984.CrossRef Barakabitze, A. A., et al. (2020). 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Computer Networks, 167, 106984.CrossRef
25.
go back to reference Barakabitze, A. A., & Walshe, R. (2022). SDN and NFV for QoE-driven multimedia services delivery: The road towards 6G and beyond networks. Computer Networks, 214, 109133.CrossRef Barakabitze, A. A., & Walshe, R. (2022). SDN and NFV for QoE-driven multimedia services delivery: The road towards 6G and beyond networks. Computer Networks, 214, 109133.CrossRef
26.
go back to reference Thandeeswaran, R., et al. (2020). Managing security services in heterogenous networks: Confidentiality, integrity, availability, authentication, and access control. CRC Press. Thandeeswaran, R., et al. (2020). Managing security services in heterogenous networks: Confidentiality, integrity, availability, authentication, and access control. CRC Press.
27.
go back to reference Ghosh, A., et al. (2019). 5G evolution: A view on 5G cellular technology beyond 3GPP release 15. IEEE Access, 7, 127639–127651.CrossRef Ghosh, A., et al. (2019). 5G evolution: A view on 5G cellular technology beyond 3GPP release 15. IEEE Access, 7, 127639–127651.CrossRef
30.
go back to reference Mihovska, A., & Prasad, R. (2020). Overview of 5G new radio and carrier aggregation: 5G and beyond networks. In 2020 23rd international symposium on wireless personal multimedia communications (WPMC). IEEE. Mihovska, A., & Prasad, R. (2020). Overview of 5G new radio and carrier aggregation: 5G and beyond networks. In 2020 23rd international symposium on wireless personal multimedia communications (WPMC). IEEE.
31.
go back to reference Qamar, F., et al. (2017). A comprehensive review on coordinated multi-point operation for LTE-A. Computer Networks, 123, 19–37.CrossRef Qamar, F., et al. (2017). A comprehensive review on coordinated multi-point operation for LTE-A. Computer Networks, 123, 19–37.CrossRef
32.
go back to reference Ibrahim, A. A. A., et al. (2019). Review and analyzing RFID technology tags and applications. In 2019 IEEE 13th international conference on application of information and communication technologies (AICT). IEEE. Ibrahim, A. A. A., et al. (2019). Review and analyzing RFID technology tags and applications. In 2019 IEEE 13th international conference on application of information and communication technologies (AICT). IEEE.
33.
go back to reference Huseien, G. F., & Shah, K. W. (2022). A review on 5G technology for smart energy management and smart buildings in Singapore. Energy and AI, 7, 100116.CrossRef Huseien, G. F., & Shah, K. W. (2022). A review on 5G technology for smart energy management and smart buildings in Singapore. Energy and AI, 7, 100116.CrossRef
34.
go back to reference Qamar, F., et al., (2020). Outdoor propagation channel investigation at 26 GHz for 5G mmWave communication. In 2020 IEEE student conference on research and development (SCOReD). IEEE. Qamar, F., et al., (2020). Outdoor propagation channel investigation at 26 GHz for 5G mmWave communication. In 2020 IEEE student conference on research and development (SCOReD). IEEE.
35.
go back to reference Chen, W. C. (2020). 5G mmWAVE technology design challenges and development trends. In 2020 international symposium on VLSI design, automation and test (VLSI-DAT). IEEE. Chen, W. C. (2020). 5G mmWAVE technology design challenges and development trends. In 2020 international symposium on VLSI design, automation and test (VLSI-DAT). IEEE.
36.
go back to reference Kuppusamy, S. P., & Subramaniam, M. (2023). Deep learning-based TCP congestion control algorithm for disaster 5G environment. Kuppusamy, S. P., & Subramaniam, M. (2023). Deep learning-based TCP congestion control algorithm for disaster 5G environment.
37.
go back to reference Zhang, C., et al. (2019). Research challenges and opportunities of UAV millimeter-wave communications. IEEE Wireless Communications, 26(1), 58–62.CrossRef Zhang, C., et al. (2019). Research challenges and opportunities of UAV millimeter-wave communications. IEEE Wireless Communications, 26(1), 58–62.CrossRef
38.
go back to reference Ahuja, K., & Bala, I. (2023). M2M in 5G cellular networks: challenges, proposed solutions, and future directions. Wireless Communication Security, p. 1. Ahuja, K., & Bala, I. (2023). M2M in 5G cellular networks: challenges, proposed solutions, and future directions. Wireless Communication Security, p. 1.
39.
go back to reference Zorello, L. M. M., et al. (2022). Power-efficient baseband-function placement in latency-constrained 5G metro access. IEEE Transactions on Green Communications and Networking, 6(3), 1683–1696.CrossRef Zorello, L. M. M., et al. (2022). Power-efficient baseband-function placement in latency-constrained 5G metro access. IEEE Transactions on Green Communications and Networking, 6(3), 1683–1696.CrossRef
40.
go back to reference Yang, X., et al. (2019). Hardware-constrained millimeter-wave systems for 5G: Challenges, opportunities, and solutions. IEEE Communications Magazine, 57(1), 44–50.CrossRef Yang, X., et al. (2019). Hardware-constrained millimeter-wave systems for 5G: Challenges, opportunities, and solutions. IEEE Communications Magazine, 57(1), 44–50.CrossRef
41.
go back to reference Ampririt, P., et al., (2023). A fuzzy-based approach for selection of radio access technologies in 5G wireless networks. In Advances in internet, data & web technologies: The 11th international conference on emerging internet, data & web technologies (EIDWT-2023). Springer. Ampririt, P., et al., (2023). A fuzzy-based approach for selection of radio access technologies in 5G wireless networks. In Advances in internet, data & web technologies: The 11th international conference on emerging internet, data & web technologies (EIDWT-2023). Springer.
43.
go back to reference Habib, M. A., et al., (2023). Traffic steering for 5G Multi-RAT deployments using deep reinforcement learning. arXiv preprint arXiv:2301.05316. Habib, M. A., et al., (2023). Traffic steering for 5G Multi-RAT deployments using deep reinforcement learning. arXiv preprint arXiv:​2301.​05316.
44.
go back to reference Qamar, F., et al. (2021). Robust schemes to enhance energy consumption efficiency for millimeter wave-based microcellular network in congested urban environments. International Journal of Electronics and Telecommunications, 67(3), 417–424. Qamar, F., et al. (2021). Robust schemes to enhance energy consumption efficiency for millimeter wave-based microcellular network in congested urban environments. International Journal of Electronics and Telecommunications, 67(3), 417–424.
45.
go back to reference Sylla, T., et al. (2022). Multi-connectivity for 5g networks and beyond: A survey. Sensors, 22(19), 7591.CrossRef Sylla, T., et al. (2022). Multi-connectivity for 5g networks and beyond: A survey. Sensors, 22(19), 7591.CrossRef
46.
go back to reference El Jbari, M., Moussaoui, M., & Chahboun, N. (2022). A review on visible light communication system for 5G. In Advanced technologies for humanity: Proceedings of international conference on advanced technologies for humanity (ICATH'2021). Springer. El Jbari, M., Moussaoui, M., & Chahboun, N. (2022). A review on visible light communication system for 5G. In Advanced technologies for humanity: Proceedings of international conference on advanced technologies for humanity (ICATH'2021). Springer.
47.
go back to reference Ahmed, A., et al. (2021). Cooperative non-orthogonal multiple access for beyond 5G networks. IEEE Open Journal of the Communications Society, 2, 990–999.CrossRef Ahmed, A., et al. (2021). Cooperative non-orthogonal multiple access for beyond 5G networks. IEEE Open Journal of the Communications Society, 2, 990–999.CrossRef
50.
go back to reference Fadhil, M., et al. (2022). Game theory-based power allocation strategy for NOMA in 5G cooperative beamforming. Wireless Personal Communications, 122(2), 1101–1128.CrossRef Fadhil, M., et al. (2022). Game theory-based power allocation strategy for NOMA in 5G cooperative beamforming. Wireless Personal Communications, 122(2), 1101–1128.CrossRef
51.
go back to reference Mishra, A., et al. (2022). Convergent network architecture of 5G and MEC. 5G IoT and edge computing for smart healthcare (pp. 111–138). Elsevier.CrossRef Mishra, A., et al. (2022). Convergent network architecture of 5G and MEC. 5G IoT and edge computing for smart healthcare (pp. 111–138). Elsevier.CrossRef
52.
go back to reference Yang, W., et al., (2020). Dynamic URLLC and eMBB multiplexing design in 5G new radio. In 2020 IEEE 17th annual consumer communications & networking conference (CCNC). IEEE. Yang, W., et al., (2020). Dynamic URLLC and eMBB multiplexing design in 5G new radio. In 2020 IEEE 17th annual consumer communications & networking conference (CCNC). IEEE.
53.
go back to reference Mutalemwa, L. C., & Shin, S. (2020). A classification of the enabling techniques for low latency and reliable communications in 5G and beyond: AI-enabled edge caching. IEEE Access, 8, 205502–205533.CrossRef Mutalemwa, L. C., & Shin, S. (2020). A classification of the enabling techniques for low latency and reliable communications in 5G and beyond: AI-enabled edge caching. IEEE Access, 8, 205502–205533.CrossRef
54.
go back to reference Vasilakos, X., et al., (2020). Towards zero downtime edge application mobility for ultra-low latency 5G streaming. In 2020 IEEE cloud summit. IEEE. Vasilakos, X., et al., (2020). Towards zero downtime edge application mobility for ultra-low latency 5G streaming. In 2020 IEEE cloud summit. IEEE.
55.
go back to reference Alioua, A., et al. (2022). Incentive mechanism for competitive edge caching in 5G-enabled Internet of things. Computer Networks, 213, 109096.CrossRef Alioua, A., et al. (2022). Incentive mechanism for competitive edge caching in 5G-enabled Internet of things. Computer Networks, 213, 109096.CrossRef
56.
go back to reference Huang, Y., Hou, Y. T., & Lou, W. (2021). A deep-learning-based link adaptation design for eMBB/URLLC multiplexing in 5G NR. In IEEE INFOCOM 2021-IEEE conference on computer communications. IEEE. Huang, Y., Hou, Y. T., & Lou, W. (2021). A deep-learning-based link adaptation design for eMBB/URLLC multiplexing in 5G NR. In IEEE INFOCOM 2021-IEEE conference on computer communications. IEEE.
57.
go back to reference Boutiba, K., Bagaa, M., & Ksentini, A. (2021). Radio link failure prediction in 5G networks. Boutiba, K., Bagaa, M., & Ksentini, A. (2021). Radio link failure prediction in 5G networks.
59.
go back to reference Sharma, B., & Singh, P. (2021). A Review of Anti-phishing Techniques and its Shortcomings. In Lecture notes on data engineering and communications technologies, Springer Singapore. p. 273–288. Sharma, B., & Singh, P. (2021). A Review of Anti-phishing Techniques and its Shortcomings. In Lecture notes on data engineering and communications technologies, Springer Singapore. p. 273–288.
60.
go back to reference Khidzir, N. Z., et al., (2021). Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach. In Proceedings of 8th international conference on advanced materials engineering & technology (ICAMET 2020). AIP Publishing. Khidzir, N. Z., et al., (2021). Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach. In Proceedings of 8th international conference on advanced materials engineering & technology (ICAMET 2020). AIP Publishing.
61.
go back to reference Dzik, S. (2020). COVID-19 convalescent plasma: Now is the time for better science. Transfusion medicine reviews, 34(3), 141–144.CrossRef Dzik, S. (2020). COVID-19 convalescent plasma: Now is the time for better science. Transfusion medicine reviews, 34(3), 141–144.CrossRef
63.
go back to reference Zhao, G., et al. (2019). Network slice selection in softwarization-based mobile networks. Transactions on Emerging Telecommunications Technologies, 31(1), e3617. Zhao, G., et al. (2019). Network slice selection in softwarization-based mobile networks. Transactions on Emerging Telecommunications Technologies, 31(1), e3617.
64.
go back to reference Jaballah, W. B., Conti, M., & Lal, C. (2020). Security and design requirements for software-defined VANETs. Computer Networks, 169, 107099.CrossRef Jaballah, W. B., Conti, M., & Lal, C. (2020). Security and design requirements for software-defined VANETs. Computer Networks, 169, 107099.CrossRef
65.
go back to reference Olimid, R. F., & Nencioni, G. (2020). 5G network slicing: A security overview. IEEE Access, 8, 99999–100009.CrossRef Olimid, R. F., & Nencioni, G. (2020). 5G network slicing: A security overview. IEEE Access, 8, 99999–100009.CrossRef
66.
go back to reference Zhao, H., et al. (2021). A fast physical layer security-based location privacy parameter recommendation algorithm in 5G IoT. China Communications, 18(8), 75–84.CrossRef Zhao, H., et al. (2021). A fast physical layer security-based location privacy parameter recommendation algorithm in 5G IoT. China Communications, 18(8), 75–84.CrossRef
67.
go back to reference Lee, J., et al., (2021). A multi-server authentication protocol achieving privacy protection and traceability for 5G mobile edge computing. In 2021 IEEE international conference on consumer electronics (ICCE). IEEE. Lee, J., et al., (2021). A multi-server authentication protocol achieving privacy protection and traceability for 5G mobile edge computing. In 2021 IEEE international conference on consumer electronics (ICCE). IEEE.
68.
go back to reference Mo, J., & Hu, Z. (2021). Comments on a remote user authentication scheme for multi-server 5G networks. International Journal of Network Security, 23(5), 878–882. Mo, J., & Hu, Z. (2021). Comments on a remote user authentication scheme for multi-server 5G networks. International Journal of Network Security, 23(5), 878–882.
69.
go back to reference Kwon, S., et al. (2021). Towards 5G-based IoT security analysis against Vo5G eavesdropping. Computing, 103(3), 425–447.CrossRef Kwon, S., et al. (2021). Towards 5G-based IoT security analysis against Vo5G eavesdropping. Computing, 103(3), 425–447.CrossRef
70.
go back to reference Sedjelmaci, H. (2021). Cooperative attacks detection based on artificial intelligence system for 5G networks. Computers & Electrical Engineering, 91, 107045.CrossRef Sedjelmaci, H. (2021). Cooperative attacks detection based on artificial intelligence system for 5G networks. Computers & Electrical Engineering, 91, 107045.CrossRef
71.
go back to reference Rahman, M., & Jahankhani, H. (2021). Security vulnerabilities in existing security mechanisms for iomt and potential solutions for mitigating cyber-attacks. Information security technologies for controlling pandemics (pp. 307–334). Springer.CrossRef Rahman, M., & Jahankhani, H. (2021). Security vulnerabilities in existing security mechanisms for iomt and potential solutions for mitigating cyber-attacks. Information security technologies for controlling pandemics (pp. 307–334). Springer.CrossRef
72.
go back to reference Jiang, H., et al. (2021). Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Computing Surveys (CSUR), 54(1), 1–36.MathSciNet Jiang, H., et al. (2021). Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Computing Surveys (CSUR), 54(1), 1–36.MathSciNet
74.
go back to reference Wang, Y., Zhang, Z., & Xie, Y. (2021). Privacy-preserving and standard-compatible {AKA} protocol for 5G. In 30th {USENIX} security symposium ({USENIX} Security 21). Wang, Y., Zhang, Z., & Xie, Y. (2021). Privacy-preserving and standard-compatible {AKA} protocol for 5G. In 30th {USENIX} security symposium ({USENIX} Security 21).
75.
go back to reference Noura, H. N., Melki, R., & Chehab, A. (2021). Efficient data confidentiality scheme for 5g wireless NOMA communications. Journal of Information Security and Applications, 58, 102781.CrossRef Noura, H. N., Melki, R., & Chehab, A. (2021). Efficient data confidentiality scheme for 5g wireless NOMA communications. Journal of Information Security and Applications, 58, 102781.CrossRef
76.
go back to reference Mohan, J. P., Sugunaraj, N., & Ranganathan, P. (2022). Cyber security threats for 5G networks. In 2022 IEEE international conference on electro information technology (eIT). IEEE. Mohan, J. P., Sugunaraj, N., & Ranganathan, P. (2022). Cyber security threats for 5G networks. In 2022 IEEE international conference on electro information technology (eIT). IEEE.
77.
go back to reference Adnan, M. H., Ahmad Zukarnain, Z., & Harun, N. Z. (2022). Quantum key distribution for 5G networks: A review, state of art and future directions. Future Internet, 14(3), 73.CrossRef Adnan, M. H., Ahmad Zukarnain, Z., & Harun, N. Z. (2022). Quantum key distribution for 5G networks: A review, state of art and future directions. Future Internet, 14(3), 73.CrossRef
78.
go back to reference Farooqui, M. N. I., Arshad, J., & Khan, M. M. (2022). A layered approach to threat modeling for 5G-based systems. Electronics, 11(12), 1819.CrossRef Farooqui, M. N. I., Arshad, J., & Khan, M. M. (2022). A layered approach to threat modeling for 5G-based systems. Electronics, 11(12), 1819.CrossRef
79.
go back to reference Yocam, E., et al. (2022). 5G mobile networks: Reviewing security control correctness for mischievous activity. SN Applied Sciences, 4(11), 304.CrossRef Yocam, E., et al. (2022). 5G mobile networks: Reviewing security control correctness for mischievous activity. SN Applied Sciences, 4(11), 304.CrossRef
80.
go back to reference Qi, L., et al. (2021). Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment. IEEE Transactions on Industrial Informatics, 17(6), 4159–4167.CrossRef Qi, L., et al. (2021). Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment. IEEE Transactions on Industrial Informatics, 17(6), 4159–4167.CrossRef
81.
go back to reference Hu, J., et al. (2022). 5GSS: A framework for 5G-secure-smart healthcare monitoring. Connection Science, 34(1), 139–161.CrossRef Hu, J., et al. (2022). 5GSS: A framework for 5G-secure-smart healthcare monitoring. Connection Science, 34(1), 139–161.CrossRef
82.
go back to reference Mogyorósi, F., et al. (2022). Positioning in 5G and 6G networks—a survey. Sensors, 22(13), 4757.CrossRef Mogyorósi, F., et al. (2022). Positioning in 5G and 6G networks—a survey. Sensors, 22(13), 4757.CrossRef
83.
go back to reference Yuan, J., Wang, Y., & Ji, Z. (2020). A differentially private square root unscented Kalman filter for protecting process parameters in ICPSs. ISA transactions, 104, 44–52.CrossRef Yuan, J., Wang, Y., & Ji, Z. (2020). A differentially private square root unscented Kalman filter for protecting process parameters in ICPSs. ISA transactions, 104, 44–52.CrossRef
84.
go back to reference Irshad, A., et al. (2021). A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment. Computer Networks, 195, 108219.CrossRef Irshad, A., et al. (2021). A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment. Computer Networks, 195, 108219.CrossRef
85.
go back to reference Chitre, P., & Sriramulu, S. (2022). Analysis and evaluation of security and privacy threats in high speed communication network. In International conference on innovative computing and communications: Proceedings of ICICC 2022, Volume 2, Springer. Chitre, P., & Sriramulu, S. (2022). Analysis and evaluation of security and privacy threats in high speed communication network. In International conference on innovative computing and communications: Proceedings of ICICC 2022, Volume 2, Springer.
86.
go back to reference Fonyi, S. (2020). Overview of 5G security and vulnerabilities. The Cyber Defense Review, 5(1), 117–134. Fonyi, S. (2020). Overview of 5G security and vulnerabilities. The Cyber Defense Review, 5(1), 117–134.
87.
go back to reference Kim, H. (2020). 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur., 10(2), 1–15. Kim, H. (2020). 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur., 10(2), 1–15.
88.
go back to reference Hussain, B., et al. (2020). Deep learning-based DDoS-attack detection for cyber–physical system over 5G network. IEEE Transactions on Industrial Informatics, 17(2), 860–870.CrossRef Hussain, B., et al. (2020). Deep learning-based DDoS-attack detection for cyber–physical system over 5G network. IEEE Transactions on Industrial Informatics, 17(2), 860–870.CrossRef
89.
go back to reference Choi, S., et al., (2019). 5G K-SimNet: End-to-End performance evaluation of 5G cellular systems. In 2019 16th IEEE annual consumer communications & networking conference (CCNC). IEEE. Choi, S., et al., (2019). 5G K-SimNet: End-to-End performance evaluation of 5G cellular systems. In 2019 16th IEEE annual consumer communications & networking conference (CCNC). IEEE.
90.
go back to reference Dutta, A. K., & Singh, M. (2023). Challenges and opportunities in enabling secure 5G positioning. In 2023 15th international conference on COMmunication Systems & NETworkS (COMSNETS). EEE. Dutta, A. K., & Singh, M. (2023). Challenges and opportunities in enabling secure 5G positioning. In 2023 15th international conference on COMmunication Systems & NETworkS (COMSNETS). EEE.
91.
go back to reference Salahdine, F., Han, T., & Zhang, N. (2023). Security in 5G and beyond recent advances and future challenges. Security and Privacy, 6(1), e271.CrossRef Salahdine, F., Han, T., & Zhang, N. (2023). Security in 5G and beyond recent advances and future challenges. Security and Privacy, 6(1), e271.CrossRef
92.
go back to reference Hu, Y., et al., (2021). Fuzzing method based on selection mutation of partition weight table for 5G core network NGAP protocol. In International conference on innovative mobile and internet services in ubiquitous computing. Springer. Hu, Y., et al., (2021). Fuzzing method based on selection mutation of partition weight table for 5G core network NGAP protocol. In International conference on innovative mobile and internet services in ubiquitous computing. Springer.
93.
go back to reference Choi, V. K., et al. (2022). When danger strikes: A linguistic tool for tracking America’s collective response to threats. Proceedings of the National Academy of Sciences, 119(4), e2113891119.MathSciNetCrossRef Choi, V. K., et al. (2022). When danger strikes: A linguistic tool for tracking America’s collective response to threats. Proceedings of the National Academy of Sciences, 119(4), e2113891119.MathSciNetCrossRef
95.
go back to reference Li, J., Yang, X., & Sitzenfrei, R. (2020). Rethinking the framework of smart water system: A review. Water, 12(2), 412.CrossRef Li, J., Yang, X., & Sitzenfrei, R. (2020). Rethinking the framework of smart water system: A review. Water, 12(2), 412.CrossRef
97.
go back to reference Alfaw, A. H., & Al-Omary, A. (2022). 5G security threats. In 2022 international conference on data analytics for business and industry (ICDABI). IEEE. Alfaw, A. H., & Al-Omary, A. (2022). 5G security threats. In 2022 international conference on data analytics for business and industry (ICDABI). IEEE.
98.
go back to reference Haque, M. R., et al. (2022). Unprecedented smart algorithm for uninterrupted SDN services during DDoS attack. Computers, Materials & Continua, 70(1), 875–894.CrossRef Haque, M. R., et al. (2022). Unprecedented smart algorithm for uninterrupted SDN services during DDoS attack. Computers, Materials & Continua, 70(1), 875–894.CrossRef
101.
go back to reference Seok, B., et al. (2020). Secure D2D communication for 5G IoT network based on lightweight cryptography. Applied Sciences, 10(1), 217.CrossRef Seok, B., et al. (2020). Secure D2D communication for 5G IoT network based on lightweight cryptography. Applied Sciences, 10(1), 217.CrossRef
102.
go back to reference Valadares, D. C., et al., Security challenges and recommendations in 5G-IoT scenarios Valadares, D. C., et al., Security challenges and recommendations in 5G-IoT scenarios
104.
go back to reference Abdelhaq, M., Hassan, R., & Alsaqour, R. (2011). Using dendritic cell algorithm to detect the resource consumption attack over MANET. In Software engineering and computer systems: second international conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27–29, 2011, Proceedings, Part III 2. Springer. Abdelhaq, M., Hassan, R., & Alsaqour, R. (2011). Using dendritic cell algorithm to detect the resource consumption attack over MANET. In Software engineering and computer systems: second international conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27–29, 2011, Proceedings, Part III 2. Springer.
105.
go back to reference Kumar, G. E. P., Lydia, M., & Levron, Y. (2022). Security challenges in 5G and IoT networks: A review. Secure Communication for 5G and IoT Networks, 1-13. Kumar, G. E. P., Lydia, M., & Levron, Y. (2022). Security challenges in 5G and IoT networks: A review. Secure Communication for 5G and IoT Networks, 1-13.
106.
go back to reference Wang, E. K., et al. (2020). Voice-transfer attacking on industrial voice control systems in 5G-aided IIoT domain. IEEE Transactions on Industrial Informatics, 17, 7085–7092.CrossRef Wang, E. K., et al. (2020). Voice-transfer attacking on industrial voice control systems in 5G-aided IIoT domain. IEEE Transactions on Industrial Informatics, 17, 7085–7092.CrossRef
108.
go back to reference Amgoune, H. & Mazri, T. (2022). 5G implementation in Ibn Tofail university. In Innovations in smart cities applications volume 5: The proceedings of the 6th international conference on smart city applications. Springer. Amgoune, H. & Mazri, T. (2022). 5G implementation in Ibn Tofail university. In Innovations in smart cities applications volume 5: The proceedings of the 6th international conference on smart city applications. Springer.
109.
110.
go back to reference Iqbal, W., et al. (2020). An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet of Things Journal, 7(10), 10250–10276.CrossRef Iqbal, W., et al. (2020). An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet of Things Journal, 7(10), 10250–10276.CrossRef
111.
go back to reference Velasco, L., et al. (2021). End-to-end intent-based networking. IEEE Communications Magazine, 59(10), 106–112.CrossRef Velasco, L., et al. (2021). End-to-end intent-based networking. IEEE Communications Magazine, 59(10), 106–112.CrossRef
114.
go back to reference Moorthy, V., Venkataraman, R., & Gururajan, R. (2020). Bayesian trust analysis of flooding attacks in distributed software defined networking nodes. Journal of Ambient Intelligence and Humanized Computing, 12(7), 7489–7498.CrossRef Moorthy, V., Venkataraman, R., & Gururajan, R. (2020). Bayesian trust analysis of flooding attacks in distributed software defined networking nodes. Journal of Ambient Intelligence and Humanized Computing, 12(7), 7489–7498.CrossRef
115.
go back to reference (2020). Redundant rule detection for software-defined networking. KSII Transactions on Internet and Information Systems, 14(6). (2020). Redundant rule detection for software-defined networking. KSII Transactions on Internet and Information Systems, 14(6).
116.
go back to reference Chica, J .C. C., Imbachi, J. C., & Vega, J. F. B. (2020). Security in SDN: A comprehensive survey. Journal of Network and Computer Applications, 159, 102595. Chica, J .C. C., Imbachi, J. C., & Vega, J. F. B. (2020). Security in SDN: A comprehensive survey. Journal of Network and Computer Applications, 159, 102595.
117.
go back to reference Sasirekha, V., et al. (2023). An innovative and scalable SDN architecture for wireless sensor networks. In AIP conference proceedings. AIP Publishing LLC. Sasirekha, V., et al. (2023). An innovative and scalable SDN architecture for wireless sensor networks. In AIP conference proceedings. AIP Publishing LLC.
118.
go back to reference Adebayo, A., & Rawat, D. B. (2020). Deceptor-in-the-middle (DitM): Cyber deception for security in wireless network virtualization. In 2020 IEEE 17th annual consumer communications & networking conference (CCNC). IEEE. Adebayo, A., & Rawat, D. B. (2020). Deceptor-in-the-middle (DitM): Cyber deception for security in wireless network virtualization. In 2020 IEEE 17th annual consumer communications & networking conference (CCNC). IEEE.
119.
go back to reference Islam, M. M., et al. (2021). Software-defined vehicular network (SDVN): A survey on architecture and routing. Journal of Systems Architecture, 114, 101961.CrossRef Islam, M. M., et al. (2021). Software-defined vehicular network (SDVN): A survey on architecture and routing. Journal of Systems Architecture, 114, 101961.CrossRef
120.
go back to reference Krishnan, P., Duttagupta, S., & Buyya, R. (2021). OpenPATH: Application aware high-performance software-defined switching framework. Journal of Network and Computer Applications, 193, 103196.CrossRef Krishnan, P., Duttagupta, S., & Buyya, R. (2021). OpenPATH: Application aware high-performance software-defined switching framework. Journal of Network and Computer Applications, 193, 103196.CrossRef
121.
go back to reference Rawal, B. S., et al., (2021). Network augmentation by dynamically splitting the switching function in SDN. In 2021 IEEE international conference on communications workshops (ICC Workshops). IEEE. Rawal, B. S., et al., (2021). Network augmentation by dynamically splitting the switching function in SDN. In 2021 IEEE international conference on communications workshops (ICC Workshops). IEEE.
122.
go back to reference Park, T., & Shin, S. (2021). Mobius: Packet re-processing hardware architecture for rich policy handling on a network processor. Journal of Network and Systems Management, 29(1), 1–26.CrossRef Park, T., & Shin, S. (2021). Mobius: Packet re-processing hardware architecture for rich policy handling on a network processor. Journal of Network and Systems Management, 29(1), 1–26.CrossRef
123.
go back to reference Zhang, T., Zhu, X., & Wu, C. (2023). Reinforcement-learning-based software-defined edge task allocation algorithm. Electronics, 12(3), 773.CrossRef Zhang, T., Zhu, X., & Wu, C. (2023). Reinforcement-learning-based software-defined edge task allocation algorithm. Electronics, 12(3), 773.CrossRef
124.
go back to reference Liu, E., Zhao, Y., & Efunogbon, A. (2023). Medical imaging and healthcare applications using 5G. Cloud computing in medical imaging (pp. 91–109). Auerbach Publications.CrossRef Liu, E., Zhao, Y., & Efunogbon, A. (2023). Medical imaging and healthcare applications using 5G. Cloud computing in medical imaging (pp. 91–109). Auerbach Publications.CrossRef
126.
go back to reference Sahlabadi, M., et al. (2023). Process mining discovery techniques for software architecture lightweight evaluation framework. Computers, Materials\ & Continua, 74(3), 5777–5797.CrossRef Sahlabadi, M., et al. (2023). Process mining discovery techniques for software architecture lightweight evaluation framework. Computers, Materials\ & Continua, 74(3), 5777–5797.CrossRef
127.
go back to reference Kulkarni, M., Baddeley, M., & Haque, I. (2021). Embedded vs. external controllers in software-defined IoT networks. In 2021 IEEE 7th international conference on network softwarization (NetSoft). IEEE. Kulkarni, M., Baddeley, M., & Haque, I. (2021). Embedded vs. external controllers in software-defined IoT networks. In 2021 IEEE 7th international conference on network softwarization (NetSoft). IEEE.
128.
go back to reference Haxhibeqiri, J., et al. (2021). In-band network monitoring technique to support SDN-based wireless networks. IEEE Transactions on Network and Service Management, 18(1), 627–641.MathSciNetCrossRef Haxhibeqiri, J., et al. (2021). In-band network monitoring technique to support SDN-based wireless networks. IEEE Transactions on Network and Service Management, 18(1), 627–641.MathSciNetCrossRef
129.
go back to reference Kakkavas, G., et al. (2021). Network tomography for efficient monitoring in SDN-enabled 5G networks and beyond: Challenges and opportunities. IEEE Communications Magazine, 59(3), 70–76.CrossRef Kakkavas, G., et al. (2021). Network tomography for efficient monitoring in SDN-enabled 5G networks and beyond: Challenges and opportunities. IEEE Communications Magazine, 59(3), 70–76.CrossRef
130.
go back to reference Sahlabadi, M., et al. (2022). Lightweight software architecture evaluation for industry: A comprehensive review. Sensors, 22(3), 1252.CrossRef Sahlabadi, M., et al. (2022). Lightweight software architecture evaluation for industry: A comprehensive review. Sensors, 22(3), 1252.CrossRef
131.
go back to reference Todorov, D., Valchanov, H., & Aleksieva, V. (2021). Simple routing algorithm with link discovery between source and destination hosts in SDN networks. In 2021 International conference automatics and informatics (ICAI). IEEE. Todorov, D., Valchanov, H., & Aleksieva, V. (2021). Simple routing algorithm with link discovery between source and destination hosts in SDN networks. In 2021 International conference automatics and informatics (ICAI). IEEE.
133.
go back to reference Padrenuestro, V., & Mendes, A. (2023). Analysis of topological characteristics impacting the allocation of controllers in an SD-WAN network. In Optimization, learning algorithms and applications: second international conference, OL2A 2022, Póvoa de Varzim, Portugal, October 24–25, 2022, Proceedings, Springer. Padrenuestro, V., & Mendes, A. (2023). Analysis of topological characteristics impacting the allocation of controllers in an SD-WAN network. In Optimization, learning algorithms and applications: second international conference, OL2A 2022, Póvoa de Varzim, Portugal, October 24–25, 2022, Proceedings, Springer.
134.
go back to reference Dawadi, B. R., et al. (2020). Legacy network integration with SDN-IP implementation towards a multi-domain SoDIP6 network environment. Electronics, 9(9), 1454.CrossRef Dawadi, B. R., et al. (2020). Legacy network integration with SDN-IP implementation towards a multi-domain SoDIP6 network environment. Electronics, 9(9), 1454.CrossRef
135.
go back to reference Bannour, F., Souihi, S., & Mellouk, A. (2023). Software-defined networking 2: Extending SDN control to large-scale networks. Wiley. Bannour, F., Souihi, S., & Mellouk, A. (2023). Software-defined networking 2: Extending SDN control to large-scale networks. Wiley.
136.
go back to reference Hasan, M. K., et al. (2022). Blockchain technology on smart grid, energy trading, and big data: Security issues, challenges, and recommendations. Wireless Communications and Mobile Computing, 2022, 1–26.CrossRef Hasan, M. K., et al. (2022). Blockchain technology on smart grid, energy trading, and big data: Security issues, challenges, and recommendations. Wireless Communications and Mobile Computing, 2022, 1–26.CrossRef
137.
go back to reference Rana, S. K., et al. (2022). Blockchain technology and artificial intelligence based decentralized access control model to enable secure interoperability for healthcare. Sustainability, 14(15), 9471.CrossRef Rana, S. K., et al. (2022). Blockchain technology and artificial intelligence based decentralized access control model to enable secure interoperability for healthcare. Sustainability, 14(15), 9471.CrossRef
138.
go back to reference Chaganti, R., et al. (2023). Deep learning approach for SDN-enabled intrusion detection system in IoT networks. Information, 14(1), 41.CrossRef Chaganti, R., et al. (2023). Deep learning approach for SDN-enabled intrusion detection system in IoT networks. Information, 14(1), 41.CrossRef
139.
go back to reference Bak, D., et al., (2020). Logical network separation and update inducing techniques of non-updated vaccine host by creating flow rule in SDN. In International conference on innovative mobile and internet services in ubiquitous computing. Springer. Bak, D., et al., (2020). Logical network separation and update inducing techniques of non-updated vaccine host by creating flow rule in SDN. In International conference on innovative mobile and internet services in ubiquitous computing. Springer.
140.
go back to reference Al Hayajneh, A., Bhuiyan, M. Z. A., & McAndrew, I. (2020). Improving internet of things (IoT) security with software-defined networking (SDN). Computers, 9(1), 8.CrossRef Al Hayajneh, A., Bhuiyan, M. Z. A., & McAndrew, I. (2020). Improving internet of things (IoT) security with software-defined networking (SDN). Computers, 9(1), 8.CrossRef
141.
go back to reference Kim, J., et al., Systematizing attacks and defenses in software-defined networking: A survey. 2023. Kim, J., et al., Systematizing attacks and defenses in software-defined networking: A survey. 2023.
142.
go back to reference Neto, E. P., Silva, F. S. D., Schneider, L. M., Neto, A. V., & Immich, R. (2021). Seamless mano of multi-vendor sdn controllers across federated multi-domains. Computer Networks, 186, 107752. Neto, E. P., Silva, F. S. D., Schneider, L. M., Neto, A. V., & Immich, R. (2021). Seamless mano of multi-vendor sdn controllers across federated multi-domains. Computer Networks, 186, 107752.
143.
go back to reference Gonzaga, R., & Sampaio, P. N. M. (2020). Mitigating man in the middle attacks within context-based SDNs. In 8th international workshop on ADVANCEs in ICT infrastructures and services (ADVANCE 2020). Gonzaga, R., & Sampaio, P. N. M. (2020). Mitigating man in the middle attacks within context-based SDNs. In 8th international workshop on ADVANCEs in ICT infrastructures and services (ADVANCE 2020).
145.
go back to reference Abdali, T.-A.N., et al. (2021). Fog computing advancement: Concept, architecture, applications, advantages, and open issues. IEEE Access, 9, 75961–75980.CrossRef Abdali, T.-A.N., et al. (2021). Fog computing advancement: Concept, architecture, applications, advantages, and open issues. IEEE Access, 9, 75961–75980.CrossRef
146.
go back to reference Duy, P. T., et al., (2019). Sdnlog-foren: Ensuring the integrity and tamper resistance of log files for sdn forensics using blockchain. In 2019 6th NAFOSTED conference on information and computer science (NICS). IEEE. Duy, P. T., et al., (2019). Sdnlog-foren: Ensuring the integrity and tamper resistance of log files for sdn forensics using blockchain. In 2019 6th NAFOSTED conference on information and computer science (NICS). IEEE.
147.
go back to reference Karimi, M., & Krishnamurthy, P. (2021). Software defined ambit of data integrity for the internet of things. In 2021 IEEE/ACM 21st International symposium on cluster, cloud and internet computing (CCGrid). IEEE. Karimi, M., & Krishnamurthy, P. (2021). Software defined ambit of data integrity for the internet of things. In 2021 IEEE/ACM 21st International symposium on cluster, cloud and internet computing (CCGrid). IEEE.
148.
go back to reference Madhawa, S., Balakrishnan, P., & Arumugam, U. (2019). Roll forward validation based decision tree classification for detecting data integrity attacks in industrial internet of things. Journal of Intelligent & Fuzzy Systems, 36(3), 2355–2366.CrossRef Madhawa, S., Balakrishnan, P., & Arumugam, U. (2019). Roll forward validation based decision tree classification for detecting data integrity attacks in industrial internet of things. Journal of Intelligent & Fuzzy Systems, 36(3), 2355–2366.CrossRef
149.
go back to reference Sharma, G., & Gawade, S. (2023). Toward security in software-defined networks with trust and monitoring. Holistic approach to quantum cryptography in cyber security (pp. 1–22). CRC Press. Sharma, G., & Gawade, S. (2023). Toward security in software-defined networks with trust and monitoring. Holistic approach to quantum cryptography in cyber security (pp. 1–22). CRC Press.
150.
go back to reference Vohra, H., et al., A low overhead and scalable authentication and encryption scheme for medical wireless sensor networks. Vohra, H., et al., A low overhead and scalable authentication and encryption scheme for medical wireless sensor networks.
152.
go back to reference Hasan, M. K., Habib, A. A., Islam, S., Balfaqih, M., Alfawaz, K. M., & Singh, D. (2023). Smart grid communication networks for electric vehicles empowering distributed energy generation: Constraints, challenges, and recommendations. Energies, 16(3), 1140 Hasan, M. K., Habib, A. A., Islam, S., Balfaqih, M., Alfawaz, K. M., & Singh, D. (2023). Smart grid communication networks for electric vehicles empowering distributed energy generation: Constraints, challenges, and recommendations. Energies, 16(3), 1140
153.
go back to reference Shafique, A., et al. (2022). Multi-hop similarity-based-clustering framework for IoT-oriented software-defined wireless sensor networks. IET Wireless Sensor Systems, 12(2), 67–80.CrossRef Shafique, A., et al. (2022). Multi-hop similarity-based-clustering framework for IoT-oriented software-defined wireless sensor networks. IET Wireless Sensor Systems, 12(2), 67–80.CrossRef
155.
go back to reference Fang, L., et al. (2019). THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network. IEEE Internet of Things Journal, 7(7), 5745–5759.CrossRef Fang, L., et al. (2019). THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network. IEEE Internet of Things Journal, 7(7), 5745–5759.CrossRef
157.
go back to reference Fouladi, R. F., Ermiş, O., & Anarim, E. (2022). A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN. Computer Networks, 214, 109140.CrossRef Fouladi, R. F., Ermiş, O., & Anarim, E. (2022). A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN. Computer Networks, 214, 109140.CrossRef
159.
go back to reference Sahoo, K. S., et al. (2020). An evolutionary SVM model for DDOS attack detection in software defined networks. IEEE Access, 8, 132502–132513.CrossRef Sahoo, K. S., et al. (2020). An evolutionary SVM model for DDOS attack detection in software defined networks. IEEE Access, 8, 132502–132513.CrossRef
160.
go back to reference Tang, T. A., et al. (2020). DeepIDS: Deep learning approach for intrusion detection in software defined networking. Electronics, 9(9), 1533.CrossRef Tang, T. A., et al. (2020). DeepIDS: Deep learning approach for intrusion detection in software defined networking. Electronics, 9(9), 1533.CrossRef
161.
go back to reference Dey, S. K., & Rahman, M. M. (2019). Effects of machine learning approach in flow-based anomaly detection on software-defined networking. Symmetry, 12(1), 7.CrossRef Dey, S. K., & Rahman, M. M. (2019). Effects of machine learning approach in flow-based anomaly detection on software-defined networking. Symmetry, 12(1), 7.CrossRef
162.
go back to reference Abdulsamad, A. A., & Salih, T. A. (2023). IoT security improvement based on SDN controller. Eurasian Journal of Engineering and Technology, 14, 49–56. Abdulsamad, A. A., & Salih, T. A. (2023). IoT security improvement based on SDN controller. Eurasian Journal of Engineering and Technology, 14, 49–56.
163.
go back to reference Vidhani, S. M., & Vidhate, A. V. (2022).Security challenges in 5G network: A technical features survey and analysis. In 2022 5th international conference on advances in science and technology (ICAST). IEEE. Vidhani, S. M., & Vidhate, A. V. (2022).Security challenges in 5G network: A technical features survey and analysis. In 2022 5th international conference on advances in science and technology (ICAST). IEEE.
164.
go back to reference Abdulkarem, H. S., & Dawod, A. (2020). DDoS attack detection and mitigation at SDN data plane layer. In 2020 2nd global power, energy and communication conference (GPECOM), IEEE. Abdulkarem, H. S., & Dawod, A. (2020). DDoS attack detection and mitigation at SDN data plane layer. In 2020 2nd global power, energy and communication conference (GPECOM), IEEE.
165.
go back to reference Bhayo, J., Hameed, S., & Shah, S. A. (2020). An efficient counter-based DDoS attack detection framework leveraging software defined IoT (SD-IoT). IEEE Access, 8, 221612–221631.CrossRef Bhayo, J., Hameed, S., & Shah, S. A. (2020). An efficient counter-based DDoS attack detection framework leveraging software defined IoT (SD-IoT). IEEE Access, 8, 221612–221631.CrossRef
166.
go back to reference Meena, R. C., et al. (2022). HyPASS: Design of hybrid-SDN prevention of attacks of source spoofing with host discovery and address validation. Physical Communication, 55, 101902.CrossRef Meena, R. C., et al. (2022). HyPASS: Design of hybrid-SDN prevention of attacks of source spoofing with host discovery and address validation. Physical Communication, 55, 101902.CrossRef
167.
go back to reference Khalid, M., et al. (2023). Towards SDN-based smart contract solution for IoT access control. Computer Communications, 198, 1–31.CrossRef Khalid, M., et al. (2023). Towards SDN-based smart contract solution for IoT access control. Computer Communications, 198, 1–31.CrossRef
168.
go back to reference Kumar, K. P., & Sivanesan, P. (2022). Flow rule-based routing protocol management system in software-defined IoT sensor network for IoT applications. International Journal of Communication Systems, 35(11), e5182.CrossRef Kumar, K. P., & Sivanesan, P. (2022). Flow rule-based routing protocol management system in software-defined IoT sensor network for IoT applications. International Journal of Communication Systems, 35(11), e5182.CrossRef
169.
go back to reference Duy, P. T., et al. (2022). B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain. Journal of Information Security and Applications, 64, 103080.CrossRef Duy, P. T., et al. (2022). B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain. Journal of Information Security and Applications, 64, 103080.CrossRef
170.
go back to reference Abdulqadder, I. H., et al., (2021). An effective lightweight intrusion detection system with blockchain to mitigate attacks in SDN/NFV enabled cloud. In 2021 6th international conference for convergence in technology (I2CT). IEEE. Abdulqadder, I. H., et al., (2021). An effective lightweight intrusion detection system with blockchain to mitigate attacks in SDN/NFV enabled cloud. In 2021 6th international conference for convergence in technology (I2CT). IEEE.
171.
go back to reference Wazirali, R., Ahmad, R., & Abu-Ein, A.A.-K. (2021). Sustaining accurate detection of phishing URLs using SDN and feature selection approaches. Computer Networks, 201, 108591.CrossRef Wazirali, R., Ahmad, R., & Abu-Ein, A.A.-K. (2021). Sustaining accurate detection of phishing URLs using SDN and feature selection approaches. Computer Networks, 201, 108591.CrossRef
172.
go back to reference Chang, D., et al., (2019). An E-ABAC-based SDN access control method. In 2019 6th International conference on information science and control engineering (ICISCE). IEEE. Chang, D., et al., (2019). An E-ABAC-based SDN access control method. In 2019 6th International conference on information science and control engineering (ICISCE). IEEE.
173.
go back to reference Kavin, B. P., et al. (2022). Performance evaluation of stateful firewall-enabled SDN with flow-based scheduling for distributed controllers. Electronics, 11(19), 3000.CrossRef Kavin, B. P., et al. (2022). Performance evaluation of stateful firewall-enabled SDN with flow-based scheduling for distributed controllers. Electronics, 11(19), 3000.CrossRef
174.
go back to reference Liu, Z., & Zou, Z. (2020). Analysis of network topology and deployment mode of 5G wireless access network. Computer Communications, 160, 34–42.CrossRef Liu, Z., & Zou, Z. (2020). Analysis of network topology and deployment mode of 5G wireless access network. Computer Communications, 160, 34–42.CrossRef
175.
go back to reference Rahman, A., et al. (2023). Impacts of blockchain in software-defined internet of things ecosystem with network function virtualization for smart applications: Present perspectives and future directions. International Journal of Communication Systems. https://doi.org/10.1002/dac.5429CrossRef Rahman, A., et al. (2023). Impacts of blockchain in software-defined internet of things ecosystem with network function virtualization for smart applications: Present perspectives and future directions. International Journal of Communication Systems. https://​doi.​org/​10.​1002/​dac.​5429CrossRef
176.
go back to reference Tilwari, V., et al., (2021). Mobility and queue length aware routing approach for network stability and load balancing in MANET. In 2021 International conference on electrical engineering and informatics (ICEEI). IEEE. Tilwari, V., et al., (2021). Mobility and queue length aware routing approach for network stability and load balancing in MANET. In 2021 International conference on electrical engineering and informatics (ICEEI). IEEE.
177.
go back to reference Paolucci, F., et al. (2021). Enhancing 5G SDN/NFV edge with P4 data plane programmability. IEEE Network, 35(3), 154–160.CrossRef Paolucci, F., et al. (2021). Enhancing 5G SDN/NFV edge with P4 data plane programmability. IEEE Network, 35(3), 154–160.CrossRef
178.
go back to reference Selvi, K. T., & Thamilselvan, R. (2021). Dynamic resource allocation for SDN and edge computing based 5G network. In 2021 Third international conference on intelligent communication technologies and virtual mobile networks (ICICV). IEEE. Selvi, K. T., & Thamilselvan, R. (2021). Dynamic resource allocation for SDN and edge computing based 5G network. In 2021 Third international conference on intelligent communication technologies and virtual mobile networks (ICICV). IEEE.
179.
go back to reference Kim, Y. H., Gil, J. M., & Kim, D. (2020). A location-aware network virtualization and reconfiguration for 5G core network based on SDN and NFV. International Journal of Communication Systems, 34(2), e4160. Kim, Y. H., Gil, J. M., & Kim, D. (2020). A location-aware network virtualization and reconfiguration for 5G core network based on SDN and NFV. International Journal of Communication Systems, 34(2), e4160.
180.
go back to reference Cicioğlu, M. (2021). Multi-criteria handover management using entropy-based SAW method for SDN-based 5G small cells. Wireless Networks, 27(4), 2947–2959.CrossRef Cicioğlu, M. (2021). Multi-criteria handover management using entropy-based SAW method for SDN-based 5G small cells. Wireless Networks, 27(4), 2947–2959.CrossRef
181.
go back to reference Sharma, S., et al. (2021). Light-trail design for 5G backhaul: Architecture, SDN impact and coordinated multipoint. Journal of Lightwave Technology, 39(17), 5383–5396.MathSciNetCrossRef Sharma, S., et al. (2021). Light-trail design for 5G backhaul: Architecture, SDN impact and coordinated multipoint. Journal of Lightwave Technology, 39(17), 5383–5396.MathSciNetCrossRef
182.
go back to reference Luong, D. K., et al., (2020). Metaheuristic approaches to the joint controller and gateway placement in 5G-satellite SDN networks. In ICC 2020 - 2020 IEEE International conference on communications (ICC). IEEE. Luong, D. K., et al., (2020). Metaheuristic approaches to the joint controller and gateway placement in 5G-satellite SDN networks. In ICC 2020 - 2020 IEEE International conference on communications (ICC). IEEE.
183.
go back to reference Saibharath, S., Mishra, S., & Hota, C. (2023). Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing. Computer Communications, 202, 110–123.CrossRef Saibharath, S., Mishra, S., & Hota, C. (2023). Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing. Computer Communications, 202, 110–123.CrossRef
184.
go back to reference Ali, M. N., et al. (2023). Low rate DDoS detection using weighted federated learning in SDN control plane in IoT network. Applied Sciences, 13(3), 1431.CrossRef Ali, M. N., et al. (2023). Low rate DDoS detection using weighted federated learning in SDN control plane in IoT network. Applied Sciences, 13(3), 1431.CrossRef
186.
go back to reference Rathore, S., Park, J. H., & Chang, H. (2021). Deep learning and blockchain-empowered security framework for intelligent 5G-enabled IoT. IEEE Access, 9, 90075–90083.CrossRef Rathore, S., Park, J. H., & Chang, H. (2021). Deep learning and blockchain-empowered security framework for intelligent 5G-enabled IoT. IEEE Access, 9, 90075–90083.CrossRef
187.
go back to reference Abdulqadder, I. H., et al. (2021). Deployment of robust security scheme in SDN based 5G network over NFV enabled cloud environment. IEEE Transactions on Emerging Topics in Computing, 9(2), 866–877.CrossRef Abdulqadder, I. H., et al. (2021). Deployment of robust security scheme in SDN based 5G network over NFV enabled cloud environment. IEEE Transactions on Emerging Topics in Computing, 9(2), 866–877.CrossRef
188.
go back to reference Torkzaban, N., et al., (2020). Joint satellite gateway placement and routing for integrated satellite-terrestrial networks. In ICC 2020-2020 IEEE international conference on communications (ICC). IEEE. Torkzaban, N., et al., (2020). Joint satellite gateway placement and routing for integrated satellite-terrestrial networks. In ICC 2020-2020 IEEE international conference on communications (ICC). IEEE.
189.
go back to reference Shu, Z., & Taleb, T. (2020). A novel QoS framework for network slicing in 5G and beyond networks based on SDN and NFV. IEEE Network, 34(3), 256–263.CrossRef Shu, Z., & Taleb, T. (2020). A novel QoS framework for network slicing in 5G and beyond networks based on SDN and NFV. IEEE Network, 34(3), 256–263.CrossRef
190.
go back to reference Kato, N., et al. (2020). Ten challenges in advancing machine learning technologies toward 6G. IEEE Wireless Communications, 27(3), 96–103.CrossRef Kato, N., et al. (2020). Ten challenges in advancing machine learning technologies toward 6G. IEEE Wireless Communications, 27(3), 96–103.CrossRef
191.
go back to reference Kaur, K., Mangat, V., & Kumar, K. (2020). A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture. Computer Science Review, 38, 100298.CrossRef Kaur, K., Mangat, V., & Kumar, K. (2020). A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture. Computer Science Review, 38, 100298.CrossRef
192.
go back to reference Kandil, M., et al., (2022). Q-learning and simulated annealing-based routing for software-defined networks. In 2022 International conference on computer and applications (ICCA). IEEE. Kandil, M., et al., (2022). Q-learning and simulated annealing-based routing for software-defined networks. In 2022 International conference on computer and applications (ICCA). IEEE.
193.
go back to reference Lata, M., & Kumar, V. (2021). Standards and regulatory compliances for IoT security. International Journal of Service Science, Management, Engineering, and Technology, 12(5), 133–147.CrossRef Lata, M., & Kumar, V. (2021). Standards and regulatory compliances for IoT security. International Journal of Service Science, Management, Engineering, and Technology, 12(5), 133–147.CrossRef
194.
go back to reference Ponmagal, R. S., et al. (2020). Optimized virtual network function provisioning technique for mobile edge cloud computing. Journal of Ambient Intelligence and Humanized Computing, 12(6), 5807–5815.CrossRef Ponmagal, R. S., et al. (2020). Optimized virtual network function provisioning technique for mobile edge cloud computing. Journal of Ambient Intelligence and Humanized Computing, 12(6), 5807–5815.CrossRef
195.
go back to reference Van Dinh, D., et al., (2020). ICT enabling technologies for smart cities, In 2020 22nd international conference on advanced communication technology (ICACT). IEEE. Van Dinh, D., et al., (2020). ICT enabling technologies for smart cities, In 2020 22nd international conference on advanced communication technology (ICACT). IEEE.
196.
go back to reference Van Rossem, S., et al. (2018). Introducing development features for virtualized network services. IEEE Communications Magazine, 56(8), 184–192.CrossRef Van Rossem, S., et al. (2018). Introducing development features for virtualized network services. IEEE Communications Magazine, 56(8), 184–192.CrossRef
197.
go back to reference Moustafa, N. (2021). A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustainable Cities and Society, 72, 102994.CrossRef Moustafa, N. (2021). A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustainable Cities and Society, 72, 102994.CrossRef
198.
go back to reference Islam, M. S., et al., (2020). Secure IoT data analytics in cloud via intel SGX. In 2020 IEEE 13th international conference on cloud computing (CLOUD), IEEE. Islam, M. S., et al., (2020). Secure IoT data analytics in cloud via intel SGX. In 2020 IEEE 13th international conference on cloud computing (CLOUD), IEEE.
199.
go back to reference Masiuk, A., et al., (2018). Resource management method in LTE heterogeneous networks. In 2018 14th International conference on advanced trends in radioelecrtronics, telecommunications and computer engineering (TCSET). IEEE. Masiuk, A., et al., (2018). Resource management method in LTE heterogeneous networks. In 2018 14th International conference on advanced trends in radioelecrtronics, telecommunications and computer engineering (TCSET). IEEE.
200.
go back to reference Song, H., et al., (2020). Design of a security service orchestration framework for NFV. In Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, Springer International Publishing. pp. 37–52. Song, H., et al., (2020). Design of a security service orchestration framework for NFV. In Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, Springer International Publishing. pp. 37–52.
201.
go back to reference Islam, M. J., et al. (2021). SDoT-NFV: A distributed sdn based security system with IoT for smart city environments. GUB Journal of Science and Engineering, 7, 27–35.CrossRef Islam, M. J., et al. (2021). SDoT-NFV: A distributed sdn based security system with IoT for smart city environments. GUB Journal of Science and Engineering, 7, 27–35.CrossRef
202.
go back to reference Youssef, Q., Yassine, M., & Haqiq, A. Secure software defined networks controller storage using intel software guard extensions. Youssef, Q., Yassine, M., & Haqiq, A. Secure software defined networks controller storage using intel software guard extensions.
203.
go back to reference Lin, G., et al., (2019). Security function virtualization based moving target defense of SDN-enabled smart grid. In ICC 2019-2019 IEEE International conference on communications (ICC). IEEE. Lin, G., et al., (2019). Security function virtualization based moving target defense of SDN-enabled smart grid. In ICC 2019-2019 IEEE International conference on communications (ICC). IEEE.
204.
go back to reference Islam, A., Debnath, A., Ghose, M., & Chakraborty, S. (2021). A survey on task offloading in multi-access edge computing. Journal of Systems Architecture, 118, 102225. Islam, A., Debnath, A., Ghose, M., & Chakraborty, S. (2021). A survey on task offloading in multi-access edge computing. Journal of Systems Architecture, 118, 102225.
205.
go back to reference Kiran, N., et al. (2019). Joint resource allocation and computation offloading in mobile edge computing for SDN based wireless networks. Journal of Communications and Networks, 22(1), 1–11.CrossRef Kiran, N., et al. (2019). Joint resource allocation and computation offloading in mobile edge computing for SDN based wireless networks. Journal of Communications and Networks, 22(1), 1–11.CrossRef
206.
go back to reference Shah, S. D. A., et al. (2022). SDN-based service mobility management in MEC-enabled 5G and beyond vehicular networks. IEEE Internet of Things Journal, 9(15), 13425–13442.CrossRef Shah, S. D. A., et al. (2022). SDN-based service mobility management in MEC-enabled 5G and beyond vehicular networks. IEEE Internet of Things Journal, 9(15), 13425–13442.CrossRef
207.
go back to reference Govindarajan, K., et al., (2022). Closed loop optimization of 5G network slices. In Proceedings of the 23rd international middleware conference industrial track. Govindarajan, K., et al., (2022). Closed loop optimization of 5G network slices. In Proceedings of the 23rd international middleware conference industrial track.
208.
go back to reference Yang, J., et al. (2022). An efficient and robust zero watermarking algorithm. Multimedia Tools and Applications, 81(14), 20127–20145.CrossRef Yang, J., et al. (2022). An efficient and robust zero watermarking algorithm. Multimedia Tools and Applications, 81(14), 20127–20145.CrossRef
209.
go back to reference Garg, P., & Jain, A. (2023). A robust technique for biometric image authentication using invisible watermarking. Multimedia Tools and Applications, 82(2), 2237–2253.CrossRef Garg, P., & Jain, A. (2023). A robust technique for biometric image authentication using invisible watermarking. Multimedia Tools and Applications, 82(2), 2237–2253.CrossRef
210.
go back to reference Tan, K., et al. (2022). Decentralized convex optimization for joint task offloading and resource allocation of vehicular edge computing systems. IEEE Transactions on Vehicular Technology, 71(12), 13226–13241.CrossRef Tan, K., et al. (2022). Decentralized convex optimization for joint task offloading and resource allocation of vehicular edge computing systems. IEEE Transactions on Vehicular Technology, 71(12), 13226–13241.CrossRef
211.
go back to reference Sonmez, C., Ozgovde, A., & Ersoy, C. (2019). Fuzzy workload orchestration for edge computing. IEEE Transactions on Network and Service Management, 16(2), 769–782.CrossRef Sonmez, C., Ozgovde, A., & Ersoy, C. (2019). Fuzzy workload orchestration for edge computing. IEEE Transactions on Network and Service Management, 16(2), 769–782.CrossRef
212.
go back to reference Garg, S., et al. (2021). Security in IoT-driven mobile edge computing: New paradigms, challenges, and opportunities. IEEE Network, 35(5), 298–305.CrossRef Garg, S., et al. (2021). Security in IoT-driven mobile edge computing: New paradigms, challenges, and opportunities. IEEE Network, 35(5), 298–305.CrossRef
213.
go back to reference Qiu, T., et al. (2019). SIGMM: A novel machine learning algorithm for spammer identification in industrial mobile cloud computing. IEEE Transactions on Industrial Informatics, 15(4), 2349–2359.CrossRef Qiu, T., et al. (2019). SIGMM: A novel machine learning algorithm for spammer identification in industrial mobile cloud computing. IEEE Transactions on Industrial Informatics, 15(4), 2349–2359.CrossRef
214.
go back to reference Varadhaganapathy, S., et al., (2022). Modular encryption standard to improve security of health information in mobile cloud computing. In Proceedings of third doctoral symposium on computational intelligence: DoSCI 2022. Springer. Varadhaganapathy, S., et al., (2022). Modular encryption standard to improve security of health information in mobile cloud computing. In Proceedings of third doctoral symposium on computational intelligence: DoSCI 2022. Springer.
215.
go back to reference Liu, H., & Wang, B. (2020). Mitigating file-injection attacks with natural language processing. In Proceedings of the sixth international workshop on security and privacy analytics. ACM. Liu, H., & Wang, B. (2020). Mitigating file-injection attacks with natural language processing. In Proceedings of the sixth international workshop on security and privacy analytics. ACM.
217.
go back to reference Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642.CrossRef Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642.CrossRef
218.
go back to reference Krishna, S. N., & Sabitha, R. (2021). A multi-level security model for partitioning workflows over federated clouds. Annals of the Romanian Society for Cell Biology, 1907–1913. Krishna, S. N., & Sabitha, R. (2021). A multi-level security model for partitioning workflows over federated clouds. Annals of the Romanian Society for Cell Biology, 1907–1913.
219.
go back to reference Le, T. T. N., & Phuong, T. V. X. (2020). Privacy preserving jaccard similarity by cloud-assisted for classification. Wireless Personal Communications, 112(3), 1875–1892.CrossRef Le, T. T. N., & Phuong, T. V. X. (2020). Privacy preserving jaccard similarity by cloud-assisted for classification. Wireless Personal Communications, 112(3), 1875–1892.CrossRef
220.
go back to reference Bentajer, A., et al. (2019). An IBE-based design for assured deletion in cloud storage. Cryptologia, 43(3), 254–265.CrossRef Bentajer, A., et al. (2019). An IBE-based design for assured deletion in cloud storage. Cryptologia, 43(3), 254–265.CrossRef
221.
go back to reference Yadav, K., & Mahalkari, A. A Review on cloud data storage security using cryptographic technique. Yadav, K., & Mahalkari, A. A Review on cloud data storage security using cryptographic technique.
222.
go back to reference Liu, Z., et al. (2022). Satellite network task deployment method based on SDN and ICN. Sensors, 22(14), 5439.CrossRef Liu, Z., et al. (2022). Satellite network task deployment method based on SDN and ICN. Sensors, 22(14), 5439.CrossRef
223.
go back to reference Taleb, T., Afolabi, I., Samdanis, K., & Yousaf, F. Z. (2019). On multi-domain network slicing orchestration architecture and federated resource control. IEEE Network, 33(5), 242–252. Taleb, T., Afolabi, I., Samdanis, K., & Yousaf, F. Z. (2019). On multi-domain network slicing orchestration architecture and federated resource control. IEEE Network, 33(5), 242–252.
224.
go back to reference Lacava, A., et al., (2022). Programmable and customized intelligence for traffic steering in 5G networks using Open RAN architectures. arXiv preprint arXiv:2209.14171. Lacava, A., et al., (2022). Programmable and customized intelligence for traffic steering in 5G networks using Open RAN architectures. arXiv preprint arXiv:​2209.​14171.​
225.
go back to reference Kuklinski, S., & Tomaszewski, L. (2019). Key performance indicators for 5G network slicing. In 2019 IEEE Conference on network softwarization (NetSoft). IEEE. Kuklinski, S., & Tomaszewski, L. (2019). Key performance indicators for 5G network slicing. In 2019 IEEE Conference on network softwarization (NetSoft). IEEE.
226.
go back to reference Addad, R. A., et al. (2020). Network slice mobility in next generation mobile systems: Challenges and potential solutions. IEEE Network, 34(1), 84–93.CrossRef Addad, R. A., et al. (2020). Network slice mobility in next generation mobile systems: Challenges and potential solutions. IEEE Network, 34(1), 84–93.CrossRef
227.
go back to reference Ko, H., et al., (2020). Hierarchical identifier (HID)-based 5G architecture with backup slice. In 2020 21st Asia-Pacific network operations and management symposium (APNOMS). IEEE. Ko, H., et al., (2020). Hierarchical identifier (HID)-based 5G architecture with backup slice. In 2020 21st Asia-Pacific network operations and management symposium (APNOMS). IEEE.
228.
go back to reference Fang, D., Qian, Y., & Hu, R. Q. (2018). Security for 5G mobile wireless networks. IEEE Access, 6, 4850–4874.CrossRef Fang, D., Qian, Y., & Hu, R. Q. (2018). Security for 5G mobile wireless networks. IEEE Access, 6, 4850–4874.CrossRef
229.
go back to reference Ziani, A., & Medouri, A. (2021). A survey of security and privacy for 5G networks. In Emerging trends in ICT for sustainable development, Springer International Publishing. p. 201–208. Ziani, A., & Medouri, A. (2021). A survey of security and privacy for 5G networks. In Emerging trends in ICT for sustainable development, Springer International Publishing. p. 201–208.
230.
go back to reference Park, S., et al. (2021). 5G security threat assessment in real networks. Sensors (Basel, Switzerland), 21(16), 5524.CrossRef Park, S., et al. (2021). 5G security threat assessment in real networks. Sensors (Basel, Switzerland), 21(16), 5524.CrossRef
231.
go back to reference Ksentini, A., & Frangoudis, P. A. (2020). Toward slicing-enabled multi-access edge computing in 5G. IEEE Network, 34(2), 99–105.CrossRef Ksentini, A., & Frangoudis, P. A. (2020). Toward slicing-enabled multi-access edge computing in 5G. IEEE Network, 34(2), 99–105.CrossRef
232.
go back to reference Barmpounakis, S., et al. (2020). Network slicing-enabled RAN management for 5G: Cross layer control based on SDN and SDR. Computer Networks, 166, 106987.CrossRef Barmpounakis, S., et al. (2020). Network slicing-enabled RAN management for 5G: Cross layer control based on SDN and SDR. Computer Networks, 166, 106987.CrossRef
233.
go back to reference Mu, H., & Li, Y. (2019). An assured deletion scheme for encrypted data in internet of things. Advances in Mechanical Engineering, 11(2), 168781401982714.MathSciNetCrossRef Mu, H., & Li, Y. (2019). An assured deletion scheme for encrypted data in internet of things. Advances in Mechanical Engineering, 11(2), 168781401982714.MathSciNetCrossRef
235.
go back to reference Qaffas, A. A., et al. (2023). Adaptive population-based multi-objective optimization in SDN controllers for cost optimization. Physical Communication, 58, 102006.CrossRef Qaffas, A. A., et al. (2023). Adaptive population-based multi-objective optimization in SDN controllers for cost optimization. Physical Communication, 58, 102006.CrossRef
236.
go back to reference Muñoz, R., et al., (2020). Sdn/nfv control and orchestration of dynamic optical beamforming services for beyond 5G fronthaul networks. In 2020 European conference on optical communications (ECOC). IEEE. Muñoz, R., et al., (2020). Sdn/nfv control and orchestration of dynamic optical beamforming services for beyond 5G fronthaul networks. In 2020 European conference on optical communications (ECOC). IEEE.
237.
go back to reference Rahimi, P., et al. (2022). Joint radio resource allocation and beamforming optimization for industrial internet of things in software-defined networking-based virtual fog-radio access network 5G-and-beyond wireless environments. IEEE Transactions on Industrial Informatics, 18(6), 4198–4209.MathSciNetCrossRef Rahimi, P., et al. (2022). Joint radio resource allocation and beamforming optimization for industrial internet of things in software-defined networking-based virtual fog-radio access network 5G-and-beyond wireless environments. IEEE Transactions on Industrial Informatics, 18(6), 4198–4209.MathSciNetCrossRef
238.
go back to reference Lin, Y., et al. (2023). Flexible, highly thermally conductive and electrically insulating phase change materials for advanced thermal management of 5G base stations and thermoelectric generators. Nano-Micro Letters, 15(1), 31.CrossRef Lin, Y., et al. (2023). Flexible, highly thermally conductive and electrically insulating phase change materials for advanced thermal management of 5G base stations and thermoelectric generators. Nano-Micro Letters, 15(1), 31.CrossRef
240.
go back to reference Datsika, E., et al. (2021). SDN-enabled resource management for converged Fi-Wi 5G Fronthaul. IEEE Journal on Selected Areas in Communications, 33, 2772–2788.CrossRef Datsika, E., et al. (2021). SDN-enabled resource management for converged Fi-Wi 5G Fronthaul. IEEE Journal on Selected Areas in Communications, 33, 2772–2788.CrossRef
241.
go back to reference Savitha, K. (2023). Efficient VANET handover scheme using SSDN by incorporating media independent handover framework. Measurement: Sensors, 26, 100684. Savitha, K. (2023). Efficient VANET handover scheme using SSDN by incorporating media independent handover framework. Measurement: Sensors, 26, 100684.
243.
go back to reference Hindia, M., et al. (2021). Robust schemes to enhance energy consumption efficiency for millimeter wave-based microcellular network in congested urban environments. International Journal of Electronics and Telecommunications, 67, 417–424. Hindia, M., et al. (2021). Robust schemes to enhance energy consumption efficiency for millimeter wave-based microcellular network in congested urban environments. International Journal of Electronics and Telecommunications, 67, 417–424.
244.
go back to reference Chekired, D. A., et al. (2019). 5G-slicing-enabled scalable SDN core network: Toward an ultra-low latency of autonomous driving service. IEEE Journal on Selected Areas in Communications, 37(8), 1769–1782.CrossRef Chekired, D. A., et al. (2019). 5G-slicing-enabled scalable SDN core network: Toward an ultra-low latency of autonomous driving service. IEEE Journal on Selected Areas in Communications, 37(8), 1769–1782.CrossRef
246.
go back to reference Mathew, A., Srinivasan, M., & Murthy, C. S. R. (2019). Packet generation schemes and network latency implications in SDN-enabled 5G C-RANs: Queuing model based analysis. In 2019 IEEE 30th annual international symposium on personal, indoor and mobile radio communications (PIMRC). IEEE. Mathew, A., Srinivasan, M., & Murthy, C. S. R. (2019). Packet generation schemes and network latency implications in SDN-enabled 5G C-RANs: Queuing model based analysis. In 2019 IEEE 30th annual international symposium on personal, indoor and mobile radio communications (PIMRC). IEEE.
247.
go back to reference Shobowale, K., et al. (2023). Latest advances on security architecture for 5G technology and services. International Journal of Software Engineering and Computer Systems, 9(1), 27–38.CrossRef Shobowale, K., et al. (2023). Latest advances on security architecture for 5G technology and services. International Journal of Software Engineering and Computer Systems, 9(1), 27–38.CrossRef
248.
go back to reference de Dios, O. G., et al., (2023). Beyond 5G domainless network operation enabled by Multiband: Toward optical continuum architectures. arXiv preprint arXiv:2302.08244. de Dios, O. G., et al., (2023). Beyond 5G domainless network operation enabled by Multiband: Toward optical continuum architectures. arXiv preprint arXiv:​2302.​08244.​
249.
go back to reference Oliveira, T. F., Xavier-de-Souza, S., & Silveira, L. F. (2021). Improving energy efficiency on SDN control-plane using multi-core controllers. Energies, 14(11), 3161.CrossRef Oliveira, T. F., Xavier-de-Souza, S., & Silveira, L. F. (2021). Improving energy efficiency on SDN control-plane using multi-core controllers. Energies, 14(11), 3161.CrossRef
250.
go back to reference Hasan, M. K., et al. (2021). Review of electric vehicle energy storage and management system: Standards, issues, and challenges. Journal of Energy Storage, 41, 102940.CrossRef Hasan, M. K., et al. (2021). Review of electric vehicle energy storage and management system: Standards, issues, and challenges. Journal of Energy Storage, 41, 102940.CrossRef
251.
go back to reference Tipantuna, C., & Hesselbach, X. (2020). NFV/SDN enabled architecture for efficient adaptive management of renewable and non-renewable energy. IEEE Open Journal of the Communications Society, 1, 357–380.CrossRef Tipantuna, C., & Hesselbach, X. (2020). NFV/SDN enabled architecture for efficient adaptive management of renewable and non-renewable energy. IEEE Open Journal of the Communications Society, 1, 357–380.CrossRef
252.
go back to reference Moosavi, R., et al. (2021). Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks. Computer Networks, 200, 108492.CrossRef Moosavi, R., et al. (2021). Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks. Computer Networks, 200, 108492.CrossRef
253.
go back to reference Dixit, V., et al., Survey on SD-WAN: An open-source implementation for enterprise networking services. Dixit, V., et al., Survey on SD-WAN: An open-source implementation for enterprise networking services.
254.
go back to reference Behravesh, R., et al. (2021). Time-sensitive mobile user association and SFC placement in MEC-enabled 5G networks. IEEE Transactions on Network and Service Management, 18(3), 3006–3020.CrossRef Behravesh, R., et al. (2021). Time-sensitive mobile user association and SFC placement in MEC-enabled 5G networks. IEEE Transactions on Network and Service Management, 18(3), 3006–3020.CrossRef
255.
go back to reference Preciado Rojas, D. F., & Mitschele-Thiel, A. (2020). A scalable SON coordination framework for 5G. In NOMS 2020-2020 IEEE/IFIP network operations and management symposium. IEEE. Preciado Rojas, D. F., & Mitschele-Thiel, A. (2020). A scalable SON coordination framework for 5G. In NOMS 2020-2020 IEEE/IFIP network operations and management symposium. IEEE.
256.
go back to reference Moosavi, R., Parsaeefard, S., Maddah-Ali, M. A., Shah-Mansouri, V., Khalaj, B. H., & Bennis, M. (2020). Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks. Computer Networks, 200, 108492. Moosavi, R., Parsaeefard, S., Maddah-Ali, M. A., Shah-Mansouri, V., Khalaj, B. H., & Bennis, M. (2020). Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks. Computer Networks, 200, 108492.
257.
go back to reference Zafeiropoulos, A., et al., (2020). Benchmarking and profiling 5G verticals' applications: An industrial IoT use case. In 2020 6th IEEE conference on network softwarization (NetSoft). IEEE. Zafeiropoulos, A., et al., (2020). Benchmarking and profiling 5G verticals' applications: An industrial IoT use case. In 2020 6th IEEE conference on network softwarization (NetSoft). IEEE.
259.
go back to reference Botez, R., et al. (2021). SDN-based network slicing mechanism for a scalable 4G/5G core network: A kubernetes approach. Sensors, 21(11), 3773.CrossRef Botez, R., et al. (2021). SDN-based network slicing mechanism for a scalable 4G/5G core network: A kubernetes approach. Sensors, 21(11), 3773.CrossRef
260.
go back to reference Salva-Garcia, P., et al. (2020). Scalable virtual network video-optimizer for adaptive real-time video transmission in 5G networks. IEEE Transactions on Network and Service Management, 17(2), 1068–1081.CrossRef Salva-Garcia, P., et al. (2020). Scalable virtual network video-optimizer for adaptive real-time video transmission in 5G networks. IEEE Transactions on Network and Service Management, 17(2), 1068–1081.CrossRef
261.
go back to reference Akkari, N., & Dimitriou, N. (2020). Mobility management solutions for 5G networks: Architecture and services. Computer Networks, 169, 107082.CrossRef Akkari, N., & Dimitriou, N. (2020). Mobility management solutions for 5G networks: Architecture and services. Computer Networks, 169, 107082.CrossRef
262.
go back to reference Alghamdi, K., & Braun, R. (2020). Software defined network (SDN) and OpenFlow protocol in 5G network. Communications and Network, 12, 28–40.CrossRef Alghamdi, K., & Braun, R. (2020). Software defined network (SDN) and OpenFlow protocol in 5G network. Communications and Network, 12, 28–40.CrossRef
263.
go back to reference Alidadi, A., Arab, S., & Askari, T. (2022). A novel optimized routing algorithm for QoS traffic engineering in SDN-based mobile networks. ICT Express, 8(1), 130–134.CrossRef Alidadi, A., Arab, S., & Askari, T. (2022). A novel optimized routing algorithm for QoS traffic engineering in SDN-based mobile networks. ICT Express, 8(1), 130–134.CrossRef
264.
go back to reference Escolar, A. M., Calero, J. M. A., & Wang, Q. (2020). Scalable software switch based service function chaining for 5G network slicing. In 2020 IEEE International conference on communications workshops (ICC Workshops). IEEE. Escolar, A. M., Calero, J. M. A., & Wang, Q. (2020). Scalable software switch based service function chaining for 5G network slicing. In 2020 IEEE International conference on communications workshops (ICC Workshops). IEEE.
265.
go back to reference Prasad, J. R., Bendale, S. P., & Prasad, R.S. (2021). Semantic internet of things (IoT) interoperability using software defined network (SDN) and network function virtualization (NFV). Semantic IoT: Theory and Applications. Studies in Computational Intelligence 941 Prasad, J. R., Bendale, S. P., & Prasad, R.S. (2021). Semantic internet of things (IoT) interoperability using software defined network (SDN) and network function virtualization (NFV). Semantic IoT: Theory and Applications. Studies in Computational Intelligence 941
266.
go back to reference Dubey, D., Singh, T. P., & Bhattacharjee, A. (2021). Design of ATM Network Architecture that interoperate with Higher Level Protocols in 5G environment. In 2021 third international conference on inventive research in computing applications (ICIRCA). IEEE. Dubey, D., Singh, T. P., & Bhattacharjee, A. (2021). Design of ATM Network Architecture that interoperate with Higher Level Protocols in 5G environment. In 2021 third international conference on inventive research in computing applications (ICIRCA). IEEE.
267.
go back to reference Sudha, P., & Rekha, P. Priority-aware service broker virtual machine allocation policy using SDN. Sudha, P., & Rekha, P. Priority-aware service broker virtual machine allocation policy using SDN.
268.
go back to reference Gaba, G. S., et al. (2021). Secure device-to-device communications for 5G enabled internet of things applications. Computer Communications, 169, 114–128.CrossRef Gaba, G. S., et al. (2021). Secure device-to-device communications for 5G enabled internet of things applications. Computer Communications, 169, 114–128.CrossRef
270.
go back to reference Iavich, M., et al., (2021). The novel system of attacks detection in 5G. In Advanced information networking and applications, Springer International Publishing. p. 580–591. Iavich, M., et al., (2021). The novel system of attacks detection in 5G. In Advanced information networking and applications, Springer International Publishing. p. 580–591.
271.
go back to reference Cao, B., Sun, Z., Zhang, J., & Gu, Y. (2021). Resource allocation in 5G IoV architecture based on SDN and fog-cloud computing. IEEE Transactions on Intelligent Transportation Systems, 22(6), 3832–3840. Cao, B., Sun, Z., Zhang, J., & Gu, Y. (2021). Resource allocation in 5G IoV architecture based on SDN and fog-cloud computing. IEEE Transactions on Intelligent Transportation Systems, 22(6), 3832–3840.
272.
go back to reference Sodhro, A. H., et al. (2021). Towards 5G-enabled self adaptive green and reliable communication in intelligent transportation system. IEEE Transactions on Intelligent Transportation Systems, 22(8), 5223–5231.CrossRef Sodhro, A. H., et al. (2021). Towards 5G-enabled self adaptive green and reliable communication in intelligent transportation system. IEEE Transactions on Intelligent Transportation Systems, 22(8), 5223–5231.CrossRef
Metadata
Title
Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions
Authors
Syed Hussain Ali Kazmi
Faizan Qamar
Rosilah Hassan
Kashif Nisar
Bhawani Shankar Chowdhry
Publication date
19-04-2023
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10402-7

Other articles of this Issue 4/2023

Wireless Personal Communications 4/2023 Go to the issue