{"id":"https://openalex.org/W3046111095","doi":"https://doi.org/10.1109/icc40277.2020.9148928","title":"BAGUETTE: Towards a Secure and Cost-effective Switch Upgrade in Hybrid Software-Defined Networks","display_name":"BAGUETTE: Towards a Secure and Cost-effective Switch Upgrade in Hybrid Software-Defined Networks","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3046111095","doi":"https://doi.org/10.1109/icc40277.2020.9148928","mag":"3046111095"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9148928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003970938","display_name":"Wendi Feng","orcid":"https://orcid.org/0000-0002-2540-8120"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wendi Feng","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026436576","display_name":"Zehua Guo","orcid":"https://orcid.org/0000-0001-7314-410X"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zehua Guo","raw_affiliation_strings":["Beijing Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036989858","display_name":"Chuanchang Liu","orcid":"https://orcid.org/0000-0002-0418-9889"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuanchang Liu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006552320","display_name":"Yueming Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I205274468","display_name":"Trinity College Dublin","ror":"https://ror.org/02tyrky19","country_code":"IE","type":"education","lineage":["https://openalex.org/I205274468"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Yueming Zheng","raw_affiliation_strings":["Trinity College Dublin"],"affiliations":[{"raw_affiliation_string":"Trinity College Dublin","institution_ids":["https://openalex.org/I205274468"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046194584","display_name":"Meng Wang","orcid":"https://orcid.org/0000-0002-2829-1976"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100640942","display_name":"Bo Cheng","orcid":"https://orcid.org/0000-0003-2160-2839"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Cheng","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101979694","display_name":"Junliang Chen","orcid":"https://orcid.org/0000-0002-7147-2625"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junliang Chen","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5003970938"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.3087,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.60541537,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upgrade","display_name":"Upgrade","score":0.9581143856048584},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.8770461082458496},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.777610719203949},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.688979983329773},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.661426305770874},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4680107831954956},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4583546221256256},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42040345072746277},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.388803631067276},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3607819676399231},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18699663877487183}],"concepts":[{"id":"https://openalex.org/C2780615140","wikidata":"https://www.wikidata.org/wiki/Q920419","display_name":"Upgrade","level":2,"score":0.9581143856048584},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.8770461082458496},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.777610719203949},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.688979983329773},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.661426305770874},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4680107831954956},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4583546221256256},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42040345072746277},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.388803631067276},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3607819676399231},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18699663877487183}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9148928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W229097380","https://openalex.org/W2040340473","https://openalex.org/W2086154593","https://openalex.org/W2103972037","https://openalex.org/W2105785546","https://openalex.org/W2114623221","https://openalex.org/W2118404561","https://openalex.org/W2126822952","https://openalex.org/W2337969425","https://openalex.org/W2416799949","https://openalex.org/W2466509086","https://openalex.org/W2563755949","https://openalex.org/W2605559139","https://openalex.org/W2829007944","https://openalex.org/W2909519685","https://openalex.org/W2923285122","https://openalex.org/W2949757083","https://openalex.org/W6608852248","https://openalex.org/W6676079207"],"related_works":["https://openalex.org/W3046111095","https://openalex.org/W3040619330","https://openalex.org/W2759153199","https://openalex.org/W4286386328","https://openalex.org/W3194953720","https://openalex.org/W2886777432","https://openalex.org/W2367547703","https://openalex.org/W4229336722","https://openalex.org/W3172174732","https://openalex.org/W3200520605"],"abstract_inverted_index":{"Software-Defined":[0],"Networking":[1],"(SDN),":[2],"providing":[3],"flexible":[4],"controlling":[5],"and":[6,54,85,114,118,167,186,211],"monitoring":[7],"mechanisms":[8],"that":[9,198],"simplifies":[10],"network":[11,23,132,171,210],"management,":[12],"is":[13,28,37,57],"becoming":[14],"prevalent":[15],"in":[16,109],"recent":[17],"years.":[18],"However,":[19],"replacing":[20],"all":[21],"legacy":[22,43,53,189,209],"devices":[24,27,44,82,87,133,166],"with":[25,145,191,208],"SDN-capable":[26],"cost-prohibitive.":[29],"One":[30],"practical":[31],"approach":[32],"for":[33],"the":[34,70,78,110,116,136,153,176,180,217],"SDN":[35,46,55,64,96,112,142,165,193],"deployment":[36,65,113],"to":[38,45,83,128,134,183,202,213],"incrementally":[39],"upgrade":[40,129,148,187],"a":[41,59,130,146],"few":[42,131],"devices.":[47,194],"The":[48,124,150],"network,":[49],"which":[50],"consists":[51],"of":[52,73,81,152,164,216],"devices,":[56],"called":[58],"hybrid":[60,63,111],"SDN.":[61],"Existing":[62],"schemes":[66],"do":[67],"not":[68],"consider":[69,105],"security":[71,107,137,205],"impact":[72],"device":[74,97],"deployment.":[75,219],"They":[76],"use":[77],"same":[79],"type":[80],"upgrade,":[84],"upgraded":[86],"could":[88],"be":[89],"compromised":[90],"if":[91],"an":[92],"attacker":[93],"controls":[94],"one":[95],"by":[98,139],"leveraging":[99],"its":[100],"vulnerabilities.In":[101],"this":[102,106],"paper,":[103],"we":[104,178],"issue":[108],"present":[115],"Secure":[117],"Cost-effective":[119],"Switch":[120],"Upgrade":[121],"(SCESU)":[122],"problem.":[123],"SCESU":[125,154],"problem":[126,155],"aims":[127],"satisfy":[135],"requirement":[138],"using":[140],"multiple":[141],"switch":[143],"types":[144,163],"minimal":[147],"cost.":[149],"complexity":[151],"comes":[156],"from":[157],"common":[158],"vulnerabilities":[159],"shared":[160],"among":[161,170],"different":[162],"attack":[168],"propagations":[169],"nodes.":[172],"To":[173],"efficiently":[174],"solve":[175],"problem,":[177],"propose":[179],"BAGUETTE":[181,199],"algorithm":[182],"judiciously":[184],"choose":[185],"critical":[188],"switches":[190],"selected":[192],"Simulation":[195],"results":[196],"show":[197],"achieves":[200],"up":[201],"about":[203],"92.1%":[204],"enhancement":[206],"compared":[207],"reduces":[212],"11.1%":[214],"cost":[215],"securest":[218]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-02-27T06:17:20.405678","created_date":"2025-10-10T00:00:00"}
