{"id":"https://openalex.org/W3036096975","doi":"https://doi.org/10.1109/giots49054.2020.9119638","title":"Blockchain-Aided Flow Insertion and Verification in Software Defined Networks","display_name":"Blockchain-Aided Flow Insertion and Verification in Software Defined Networks","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3036096975","doi":"https://doi.org/10.1109/giots49054.2020.9119638","mag":"3036096975"},"language":"en","primary_location":{"id":"doi:10.1109/giots49054.2020.9119638","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots49054.2020.9119638","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Global Internet of Things Summit (GIoTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2006.14513","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jiejun Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jiejun Hu","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Martin Reed","orcid":null},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Martin Reed","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mays Al-Naday","orcid":null},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mays Al-Naday","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"last","author":{"id":null,"display_name":"Nikolaos Thomos","orcid":null},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nikolaos Thomos","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":2.2257,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.90617786,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6222000122070312},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5949000120162964},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5598999857902527},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5415999889373779},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.5351999998092651},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.49880000948905945},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.47609999775886536},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.42239999771118164},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4153999984264374}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7365000247955322},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6255000233650208},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6222000122070312},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5949000120162964},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5598999857902527},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5415999889373779},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.5351999998092651},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.49880000948905945},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.47609999775886536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44929999113082886},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.42239999771118164},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4153999984264374},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.38339999318122864},{"id":"https://openalex.org/C186766456","wikidata":"https://www.wikidata.org/wiki/Q612457","display_name":"Flow control (data)","level":2,"score":0.3824000060558319},{"id":"https://openalex.org/C145595949","wikidata":"https://www.wikidata.org/wiki/Q7371619","display_name":"Routing control plane","level":2,"score":0.3637000024318695},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3619999885559082},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.35190001130104065},{"id":"https://openalex.org/C2780365114","wikidata":"https://www.wikidata.org/wiki/Q169478","display_name":"MATLAB","level":2,"score":0.3472999930381775},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3174999952316284},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2754000127315521},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/giots49054.2020.9119638","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots49054.2020.9119638","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Global Internet of Things Summit (GIoTS)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2006.14513","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2006.14513","pdf_url":"https://arxiv.org/pdf/2006.14513","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2006.14513","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2006.14513","pdf_url":"https://arxiv.org/pdf/2006.14513","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1485535210","https://openalex.org/W2604122668","https://openalex.org/W2611565958","https://openalex.org/W2753580776","https://openalex.org/W2757817063","https://openalex.org/W2803627894","https://openalex.org/W2890103652","https://openalex.org/W2893121585","https://openalex.org/W2901337819","https://openalex.org/W2912278425","https://openalex.org/W2913127416","https://openalex.org/W2954485493","https://openalex.org/W2962761920","https://openalex.org/W2964302640","https://openalex.org/W2973021057","https://openalex.org/W2973414267","https://openalex.org/W2979946095","https://openalex.org/W2999393238","https://openalex.org/W3003185282","https://openalex.org/W3009258166"],"related_works":[],"abstract_inverted_index":{"The":[0,209],"Internet":[1],"of":[2,29,36,46,55,110,120,130,183,196,220,233],"Things":[3],"(IoT)":[4],"connected":[5,30],"by":[6,25,177],"Software":[7],"Defined":[8],"Networking":[9],"(SDN)":[10],"promises":[11],"to":[12,16,76,147,155,224],"bring":[13],"great":[14],"benefits":[15,45],"cyber-physical":[17],"systems.":[18],"However,":[19],"the":[20,26,43,53,61,82,131,157,184,194,214,218,221,226,231],"increased":[21],"attack":[22],"surface":[23],"offered":[24],"growing":[27],"number":[28],"vulnerable":[31],"devices":[32],"and":[33,103,105],"complex":[34],"nature":[35],"SDN":[37,62,116],"control":[38,63],"plane":[39,64],"applications":[40],"could":[41],"overturn":[42],"huge":[44],"such":[47],"a":[48,68,93,142,153,171,179,204],"system.":[49],"This":[50],"paper":[51],"addresses":[52],"vulnerability":[54],"some":[56],"unspecified":[57],"security":[58],"flaw":[59],"in":[60,81,167],"application":[65],"(such":[66],"as":[67,163],"zero-day":[69],"software":[70],"vulnerability)":[71],"which":[72],"can":[73],"be":[74],"exploited":[75],"insert":[77],"malicious":[78],"flow":[79,101,138],"rules":[80],"switch":[83,100],"that":[84,98,213],"do":[85],"not":[86],"match":[87],"network":[88],"policies.":[89],"Specifically,":[90],"we":[91,151,199],"propose":[92],"blockchain-as-a-service":[94],"(BaaS)":[95],"based":[96,188,206],"framework":[97],"supports":[99],"verification":[102],"insertion;":[104],"additionally":[106],"provides":[107],"straightforward":[108,125],"deployment":[109],"blockchain":[111,132,144,158,222],"technology":[112],"within":[113],"an":[114,121],"existing":[115],"infrastructure.":[117],"While":[118],"use":[119],"external":[122],"BaaS":[123],"brings":[124],"deployment,":[126],"it":[127],"obscures":[128],"knowledge":[129],"agents":[133,159,223],"who":[134],"are":[135],"responsible":[136],"for":[137],"conformance":[139],"testing":[140],"through":[141],"smart":[143],"contract,":[145],"leading":[146],"potential":[148],"exploitation.":[149],"Thus,":[150],"design":[152],"strategy":[154],"prevent":[156],"from":[160],"acting":[161],"arbitrarily,":[162],"this":[164,176],"would":[165],"result":[166],"what":[168],"is":[169],"termed":[170],"\u201cmoral":[172],"hazard\u201d.":[173],"We":[174],"achieve":[175],"developing":[178],"novel":[180],"mathematical":[181],"model":[182,202],"fair":[185],"reward":[186],"scheme":[187],"on":[189],"game":[190],"theory.":[191],"To":[192],"understand":[193],"performance":[195],"our":[197,201],"system,":[198],"evaluate":[200],"using":[203],"Matlab":[205],"simulation":[207,210],"framework.":[208],"results":[211],"demonstrate":[212],"proposed":[215],"algorithm":[216],"balances":[217],"needs":[219],"maximise":[225],"overall":[227],"social":[228],"welfare,":[229],"i.e.":[230],"sum":[232],"profits":[234],"across":[235],"all":[236],"parties.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2020-06-25T00:00:00"}
