{"id":"https://openalex.org/W2964142276","doi":"https://doi.org/10.1109/access.2019.2930345","title":"An Efficient Forensics Architecture in Software-Defined Networking-IoT Using Blockchain Technology","display_name":"An Efficient Forensics Architecture in Software-Defined Networking-IoT Using Blockchain Technology","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2964142276","doi":"https://doi.org/10.1109/access.2019.2930345","mag":"2964142276"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2930345","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2930345","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2019.2930345","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009683602","display_name":"Mehran Pourvahab","orcid":"https://orcid.org/0000-0002-0034-5506"},"institutions":[{"id":"https://openalex.org/I4210098966","display_name":"Islamic Azad University Rasht Branch","ror":"https://ror.org/0151gh112","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I4210098966"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mehran Pourvahab","raw_affiliation_strings":["Department of Computer Engineering, Rasht Branch, Islamic Azad University, Rasht, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rasht Branch, Islamic Azad University, Rasht, Iran","institution_ids":["https://openalex.org/I4210098966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102933327","display_name":"Gholamhossein Ekbatanifard","orcid":"https://orcid.org/0000-0003-3216-0511"},"institutions":[{"id":"https://openalex.org/I33162209","display_name":"Islamic Azad University, Lahijan Branch","ror":"https://ror.org/03dhqyc75","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I33162209"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Gholamhossein Ekbatanifard","raw_affiliation_strings":["Department of Computer Engineering, Lahijan Branch, Islamic Azad University, Lahijan, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Lahijan Branch, Islamic Azad University, Lahijan, Iran","institution_ids":["https://openalex.org/I33162209"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009683602"],"corresponding_institution_ids":["https://openalex.org/I4210098966"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":19.7033,"has_fulltext":false,"cited_by_count":92,"citation_normalized_percentile":{"value":0.99270068,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"99573","last_page":"99588"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8634068965911865},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7133575081825256},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6356781721115112},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6230113506317139},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.5550982356071472},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.48581504821777344},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.45222005248069763},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.41848015785217285},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4167143702507019},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3978991210460663},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36324599385261536},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.35641276836395264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3013612627983093},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16437125205993652},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12350821495056152}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8634068965911865},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7133575081825256},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6356781721115112},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6230113506317139},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.5550982356071472},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.48581504821777344},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.45222005248069763},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.41848015785217285},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4167143702507019},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3978991210460663},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36324599385261536},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.35641276836395264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3013612627983093},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16437125205993652},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12350821495056152}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2930345","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2930345","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b993c83652664b688963bfe5c690a7a6","is_oa":true,"landing_page_url":"https://doaj.org/article/b993c83652664b688963bfe5c690a7a6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 99573-99588 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2930345","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2930345","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321389","display_name":"Islamic Azad University","ror":"https://ror.org/01kzn7k21"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W2081478993","https://openalex.org/W2294658213","https://openalex.org/W2392113277","https://openalex.org/W2536325433","https://openalex.org/W2603574138","https://openalex.org/W2604096638","https://openalex.org/W2606467208","https://openalex.org/W2624744148","https://openalex.org/W2626851879","https://openalex.org/W2753585338","https://openalex.org/W2757817063","https://openalex.org/W2760972063","https://openalex.org/W2762355049","https://openalex.org/W2765660575","https://openalex.org/W2771922044","https://openalex.org/W2774100094","https://openalex.org/W2774185715","https://openalex.org/W2774541916","https://openalex.org/W2776552421","https://openalex.org/W2781688509","https://openalex.org/W2783337179","https://openalex.org/W2785774871","https://openalex.org/W2786376170","https://openalex.org/W2789950367","https://openalex.org/W2791003909","https://openalex.org/W2791289577","https://openalex.org/W2792775858","https://openalex.org/W2793346081","https://openalex.org/W2794111571","https://openalex.org/W2796307943","https://openalex.org/W2796465757","https://openalex.org/W2799075412","https://openalex.org/W2799728809","https://openalex.org/W2800102799","https://openalex.org/W2803007868","https://openalex.org/W2805383889","https://openalex.org/W2807050405","https://openalex.org/W2808656692","https://openalex.org/W2810381494","https://openalex.org/W2845081339","https://openalex.org/W2862280443","https://openalex.org/W2867058325","https://openalex.org/W2872613152","https://openalex.org/W2884222531","https://openalex.org/W2885362146","https://openalex.org/W2887712656","https://openalex.org/W2890627666","https://openalex.org/W2914492849","https://openalex.org/W2922111521","https://openalex.org/W2943695687","https://openalex.org/W2946701076","https://openalex.org/W6748536023"],"related_works":["https://openalex.org/W2972427363","https://openalex.org/W2121070677","https://openalex.org/W2161391695","https://openalex.org/W4238452393","https://openalex.org/W1500698787","https://openalex.org/W188028618","https://openalex.org/W2489557937","https://openalex.org/W1970399788","https://openalex.org/W4385257722","https://openalex.org/W2111038567"],"abstract_inverted_index":{"A":[0],"Potential":[1],"solution":[2],"for":[3,33,105,169],"solving":[4],"forensic":[5,157,214],"is":[6,17,53,78,97,159,174],"the":[7,84,106,131,138,163,181,201,204,210,220],"use":[8,162],"of":[9,29,86,194,212],"blockchain":[10,16,52,90,202],"in":[11,41,67,80,89,155,203],"software-defined":[12],"networking":[13],"(SDN).":[14],"The":[15,92,141,151,192],"a":[18,177],"distributed":[19,153],"peer-to-peer":[20],"network":[21],"that":[22,82,179],"can":[23],"be":[24,147],"utilized":[25],"on":[26,103,189,200],"SDN-based":[27,94],"Internet":[28,112],"Things":[30],"(IoT)":[31],"environments":[32],"security":[34,245],"provisioning.":[35],"Hence,":[36],"to":[37,133,136,161,184,219],"meet":[38],"some":[39,56],"challenges":[40],"digital":[42],"forensics":[43,76],"such":[44,58],"as":[45,59],"data":[46],"integrity,":[47],"evidence":[48],"deletion":[49],"or":[50],"alteration,":[51],"used.":[54],"However,":[55],"problems":[57],"poor":[60],"attack":[61],"detection":[62],"and":[63,119,198,216,238,244],"slow":[64],"processing":[65,239],"existed":[66],"previous":[68],"works.":[69],"To":[70],"address":[71],"these":[72],"issues,":[73],"an":[74],"efficient":[75],"architecture":[77,96,158,215],"proposed":[79,93,205],"SDN-IoT":[81,206],"establishes":[83],"Chain":[85],"Custody":[87],"(CoC)":[88],"technology.":[91],"IoT":[95],"initiated":[98],"with":[99,176],"flow":[100,144],"table":[101],"rules":[102,145],"switches":[104,129,135],"three":[107],"different":[108],"traffics":[109],"Voice":[110],"over":[111],"Protocol":[113,117,123],"(VoIP),":[114],"File":[115],"Transfer":[116,122],"(FTP),":[118],"Hyper":[120],"Text":[121],"(HTTP).":[124],"In":[125],"this":[126,156],"work,":[127],"overloaded":[128],"migrate":[130],"packets":[132,142,187],"nearby":[134],"balance":[137],"packet":[139,190],"flow.":[140],"disobeying":[143],"will":[146],"discarded":[148],"by":[149,233],"switches.":[150],"blockchain-based":[152],"controller":[154,173],"designed":[160],"Linear":[164],"Homomorphic":[165],"Signature":[166],"(LHS)":[167],"algorithm":[168],"validating":[170],"users.":[171],"Each":[172],"fed":[175],"classifier":[178],"uses":[180],"Neuro":[182],"Multi-fuzzy":[183],"classify":[185],"malicious":[186],"based":[188],"features.":[191],"logs":[193],"events":[195],"are":[196],"used":[197],"stored":[199],"architecture.":[207],"We":[208],"evaluated":[209],"performance":[211,225,231],"our":[213],"compared":[217],"it":[218],"existing":[221],"model":[222],"using":[223],"various":[224],"measures.":[226],"Our":[227],"evaluation":[228],"results":[229],"demonstrate":[230],"improvement":[232],"reducing":[234],"delay,":[235],"response":[236],"time":[237],"time,":[240],"increasing":[241],"throughput,":[242],"accuracy,":[243],"parameters.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
