{"id":"https://openalex.org/W1980395376","doi":"https://doi.org/10.1109/cns.2013.6682712","title":"Secure hierarchical Virtual Private LAN Services for provider provisioned networks","display_name":"Secure hierarchical Virtual Private LAN Services for provider provisioned networks","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W1980395376","doi":"https://doi.org/10.1109/cns.2013.6682712","mag":"1980395376"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2013.6682712","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2013.6682712","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068169019","display_name":"Madhusanka Liyanage","orcid":"https://orcid.org/0000-0003-4786-030X"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Madhusanka Liyanage","raw_affiliation_strings":["Centre for Wireless Communication, University of Oulu, Finland","Centre for Wireless Communication, University of Oulu, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"Centre for Wireless Communication, University of Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]},{"raw_affiliation_string":"Centre for Wireless Communication, University of Oulu, Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059694865","display_name":"Mika Ylianttila","orcid":"https://orcid.org/0000-0002-8079-5514"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Mika Ylianttila","raw_affiliation_strings":["Centre for Wireless Communication, University of Oulu, Finland","Centre for Wireless Communication, University of Oulu, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"Centre for Wireless Communication, University of Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]},{"raw_affiliation_string":"Centre for Wireless Communication, University of Oulu, Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089526719","display_name":"Andrei Gurtov","orcid":"https://orcid.org/0000-0002-9829-9287"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Andrei Gurtov","raw_affiliation_strings":["Department of Computer Science and Engineering, Aalto University, Finland","Department of Computer Science and Engineering, Aalto University, Aalto, Finland#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Aalto University, Finland","institution_ids":["https://openalex.org/I9927081"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Aalto University, Aalto, Finland#TAB#","institution_ids":["https://openalex.org/I9927081"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068169019"],"corresponding_institution_ids":["https://openalex.org/I98381234"],"apc_list":null,"apc_paid":null,"fwci":1.4187,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.82875981,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"233","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8126575946807861},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7869881987571716},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.6848233342170715},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.650001585483551},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4458412528038025},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4304012358188629},{"id":"https://openalex.org/keywords/network-address","display_name":"Network address","score":0.4185553193092346},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.41260573267936707},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3346174955368042},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15280446410179138}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8126575946807861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7869881987571716},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.6848233342170715},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.650001585483551},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4458412528038025},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4304012358188629},{"id":"https://openalex.org/C2776599810","wikidata":"https://www.wikidata.org/wiki/Q4418000","display_name":"Network address","level":2,"score":0.4185553193092346},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.41260573267936707},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3346174955368042},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15280446410179138}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns.2013.6682712","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2013.6682712","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W153022470","https://openalex.org/W1490417850","https://openalex.org/W1677315679","https://openalex.org/W1918971960","https://openalex.org/W2018101610","https://openalex.org/W2115627086","https://openalex.org/W2125116386","https://openalex.org/W2147877969","https://openalex.org/W2165413796","https://openalex.org/W2237788678","https://openalex.org/W2238438598","https://openalex.org/W2257081961","https://openalex.org/W2260273397","https://openalex.org/W2281187555","https://openalex.org/W2341360271","https://openalex.org/W2517580848","https://openalex.org/W2518604961","https://openalex.org/W3145671319","https://openalex.org/W4244000467","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2061163215","https://openalex.org/W1547381300","https://openalex.org/W766823313","https://openalex.org/W4246788328","https://openalex.org/W1559849566","https://openalex.org/W2565480447","https://openalex.org/W3144736223","https://openalex.org/W1570276646","https://openalex.org/W2007131366","https://openalex.org/W2044704364"],"abstract_inverted_index":{"Virtual":[0,12],"Private":[1,13],"LAN":[2],"Service":[3],"(VPLS)":[4],"is":[5,57,185],"a":[6,62,84,90,98,111,167],"widely":[7],"used":[8,27],"Layer":[9],"2":[10],"(L2)":[11],"Network":[14],"(VPN)":[15],"service.":[16],"Initially,":[17],"VPLS":[18,42,63,91,101,113],"architectures":[19,43,80],"were":[20,26],"proposed":[21,45,183],"as":[22,121,158,160],"flat":[23],"architectures.":[24],"They":[25],"only":[28],"for":[29,89],"small":[30],"and":[31,129,145,169],"medium":[32],"scale":[33],"networks":[34],"due":[35],"to":[36,46,82,131],"the":[37,52,55,67,77,132,142,151,156,161,170,173,178,182],"lack":[38],"of":[39,61,87,153,163,181],"scalability.":[40],"Hierarchical":[41],"are":[44],"overcome":[47],"these":[48],"scalability":[49,148],"issues.":[50],"On":[51],"other":[53],"hand,":[54],"security":[56,88,118,146],"an":[58,72],"indispensable":[59],"factor":[60],"since":[64],"it":[65],"delivers":[66],"private":[68],"user":[69],"frames":[70],"via":[71],"untrusted":[73],"public":[74],"network.":[75,92,171],"However,":[76],"existing":[78],"hierarchical":[79,100],"unable":[81],"provide":[83],"sufficient":[85],"level":[86],"In":[93],"this":[94],"paper,":[95],"we":[96],"propose":[97],"novel":[99],"architecture":[102,184],"based":[103,189],"on":[104],"Host":[105],"Identity":[106],"Protocol":[107],"(HIP).":[108],"It":[109],"provides":[110,141],"secure":[112,126],"network":[114,157],"by":[115,149],"delivering":[116],"vital":[117],"features":[119],"such":[120],"authentication,":[122],"confidentiality,":[123],"integrity,":[124],"availability,":[125],"control":[127,179],"protocol":[128,180],"robustness":[130],"known":[133],"attacks.":[134,190],"The":[135],"simulations":[136],"verify":[137],"that":[138,177],"our":[139],"proposal":[140],"control,":[143],"forwarding":[144],"plane":[147],"reducing":[150],"number":[152,162],"tunnels":[154],"in":[155],"well":[159],"keys":[164],"stored":[165],"at":[166],"node":[168],"Finally,":[172],"simulation":[174],"results":[175],"confirm":[176],"protected":[186],"from":[187],"IP":[188]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
