{"id":"https://openalex.org/W4401509344","doi":"https://doi.org/10.1109/iccworkshops59551.2024.10615557","title":"Security Enhanced Framework for Network Access Control in Distributed Software-Defined Networks","display_name":"Security Enhanced Framework for Network Access Control in Distributed Software-Defined Networks","publication_year":2024,"publication_date":"2024-06-09","ids":{"openalex":"https://openalex.org/W4401509344","doi":"https://doi.org/10.1109/iccworkshops59551.2024.10615557"},"language":"en","primary_location":{"id":"doi:10.1109/iccworkshops59551.2024.10615557","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccworkshops59551.2024.10615557","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091246326","display_name":"Pushpita Chatterjee","orcid":"https://orcid.org/0000-0002-0775-5540"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Pushpita Chatterjee","raw_affiliation_strings":["Howard University,Department of EE and CS,Washington,DC,USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Department of EE and CS,Washington,DC,USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":null},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda B Rawat","raw_affiliation_strings":["Howard University,Department of EE and CS,Washington,DC,USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Department of EE and CS,Washington,DC,USA","institution_ids":["https://openalex.org/I137853757"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091246326"],"corresponding_institution_ids":["https://openalex.org/I137853757"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13858784,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1816","last_page":"1821"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7917097806930542},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5919593572616577},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5595284104347229},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.5581070780754089},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5132312774658203},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4792190194129944},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.42162367701530457},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4142685830593109},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15012016892433167},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.1335168480873108},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.06476786732673645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7917097806930542},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5919593572616577},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5595284104347229},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.5581070780754089},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5132312774658203},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4792190194129944},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.42162367701530457},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4142685830593109},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15012016892433167},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.1335168480873108},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.06476786732673645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccworkshops59551.2024.10615557","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccworkshops59551.2024.10615557","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2284002665","display_name":null,"funder_award_id":"W911NF-20-2-0277","funder_id":"https://openalex.org/F4320313488","funder_display_name":"Howard University"}],"funders":[{"id":"https://openalex.org/F4320313488","display_name":"Howard University","ror":"https://ror.org/05gt1vc06"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W3160301098","https://openalex.org/W3197470694","https://openalex.org/W3201868317","https://openalex.org/W3213203497","https://openalex.org/W4200597468","https://openalex.org/W4210878212","https://openalex.org/W4285507209","https://openalex.org/W4312801180","https://openalex.org/W4313462074","https://openalex.org/W4313526219","https://openalex.org/W4323365451","https://openalex.org/W4324093415","https://openalex.org/W4327767971","https://openalex.org/W4383466386","https://openalex.org/W4384525647","https://openalex.org/W4385477999","https://openalex.org/W4389521835","https://openalex.org/W4391547499"],"related_works":["https://openalex.org/W1996683534","https://openalex.org/W2350037705","https://openalex.org/W3023964565","https://openalex.org/W2526209010","https://openalex.org/W2072517583","https://openalex.org/W1658613573","https://openalex.org/W2362468486","https://openalex.org/W1978526213","https://openalex.org/W2383860150","https://openalex.org/W2024568155"],"abstract_inverted_index":{"Software-defined":[0],"networking":[1],"(SDN)":[2],"has":[3],"emerged":[4],"as":[5,29],"a":[6,49,182,194],"transformative":[7],"paradigm":[8],"by":[9,47],"redefining":[10],"traditional":[11],"network":[12,139],"architectures":[13],"through":[14],"its":[15],"dynamic":[16,38,58,132],"and":[17,37,61,89,106,114,141,156,163,173,192,201],"programmable":[18],"nature.":[19],"However,":[20],"this":[21],"evolution":[22],"brings":[23],"forth":[24],"unprecedented":[25],"security":[26,50],"challenges,":[27],"such":[28],"vulnerabilities":[30],"in":[31,160],"the":[32,93,96,119,125,154,178,188,198],"control":[33,101,129],"plane,":[34],"unauthorized":[35,122],"access,":[36],"data":[39,133,159,176],"flow":[40,136],"risks.":[41],"This":[42,186],"paper":[43,94,126],"addresses":[44],"these":[45],"challenges":[46],"proposing":[48],"framework":[51,180],"for":[52,77,131,149],"developing":[53],"robust":[54,183],"authentication,":[55],"precise":[56],"authorization,":[57],"access":[59,100,108,116,128,171],"control,":[60],"secure":[62,150,175,195],"communication":[63,151],"encryption.":[64],"The":[65,110,144],"proposed":[66,179],"work":[67,145],"initiates":[68],"an":[69],"in-depth":[70],"exploration":[71],"of":[72,98,112,121,158,203],"state-of-the-art":[73],"authentication":[74,83,168],"methods":[75],"tailored":[76],"SDN":[78,204],"entities,":[79],"which":[80],"introduces":[81,127],"multi-layered":[82],"that":[84],"incorporates":[85],"digital":[86],"certificates,":[87],"tokens,":[88],"biometrics.":[90],"In":[91],"addition,":[92],"discusses":[95],"implementation":[97],"role-based":[99],"(RBAC)":[102],"to":[103,152,197],"precisely":[104],"define":[105],"manage":[107],"permissions.":[109],"integration":[111],"RBAC":[113],"fine-grained":[115],"controls":[117],"mitigates":[118],"risk":[120],"operations.":[123],"Furthermore,":[124],"measures":[130],"flow,":[134,177],"including":[135],"table":[137],"security,":[138],"segmentation,":[140],"traffic":[142],"filtering.":[143],"investigates":[146],"encryption":[147],"protocols":[148],"ensure":[153],"confidentiality":[155],"integrity":[157],"both":[161],"southbound":[162],"northbound":[164],"channels.":[165],"By":[166],"mitigating":[167],"vulnerabilities,":[169],"refining":[170],"controls,":[172],"ensuring":[174],"provides":[181],"defense":[184],"mechanism.":[185],"minimizes":[187],"potential":[189],"attack":[190],"surface":[191],"contributes":[193],"foundation":[196],"effective":[199],"deployment":[200],"management":[202],"architectures.":[205]},"counts_by_year":[],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
