{"id":"https://openalex.org/W4285813826","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825045","title":"TopoTrust: A Blockchain-based Trustless and Secure Topology Discovery in SDNs","display_name":"TopoTrust: A Blockchain-based Trustless and Secure Topology Discovery in SDNs","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813826","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825045"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9825045","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825045","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017539250","display_name":"Mohamed Lamine Adjou","orcid":null},"institutions":[{"id":"https://openalex.org/I157169809","display_name":"University of Sciences and Technology Houari Boumediene","ror":"https://ror.org/02kb89c09","country_code":"DZ","type":"education","lineage":["https://openalex.org/I157169809"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Mohamed Lamine Adjou","raw_affiliation_strings":["University of Sciences and Technology Houari Boumediene,Algiers,Algeria","University of Sciences and Technology Houari Boumediene, Algiers, Algeria"],"affiliations":[{"raw_affiliation_string":"University of Sciences and Technology Houari Boumediene,Algiers,Algeria","institution_ids":["https://openalex.org/I157169809"]},{"raw_affiliation_string":"University of Sciences and Technology Houari Boumediene, Algiers, Algeria","institution_ids":["https://openalex.org/I157169809"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076377250","display_name":"Chafika Benza\u00efd","orcid":"https://orcid.org/0000-0001-5841-2014"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Chafika Benzaid","raw_affiliation_strings":["University of Oulu,Oulu,Finland","University of Oulu, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Oulu,Finland","institution_ids":["https://openalex.org/I98381234"]},{"raw_affiliation_string":"University of Oulu, Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087043869","display_name":"Tarik Taleb","orcid":"https://orcid.org/0000-0003-1119-1239"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Tarik Taleb","raw_affiliation_strings":["University of Oulu,Oulu,Finland","University of Oulu, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Oulu,Finland","institution_ids":["https://openalex.org/I98381234"]},{"raw_affiliation_string":"University of Oulu, Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017539250"],"corresponding_institution_ids":["https://openalex.org/I157169809"],"apc_list":null,"apc_paid":null,"fwci":1.0824,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.72648035,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1107","last_page":"1112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.7906816005706787},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7792458534240723},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7485991716384888},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6032744646072388},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5960146188735962},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5247790217399597},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.503297746181488},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.49276450276374817},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.4817521572113037},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4607784152030945},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4532438814640045},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43529731035232544},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4127275347709656},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2542077898979187},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21051260828971863}],"concepts":[{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.7906816005706787},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7792458534240723},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7485991716384888},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6032744646072388},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5960146188735962},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5247790217399597},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.503297746181488},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.49276450276374817},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.4817521572113037},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4607784152030945},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4532438814640045},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43529731035232544},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4127275347709656},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2542077898979187},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21051260828971863},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9825045","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825045","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:oulu.fi:nbnfi-fe2022092660094","is_oa":false,"landing_page_url":"http://urn.fi/urn:nbn:fi-fe2022092660094","pdf_url":null,"source":{"id":"https://openalex.org/S4306400284","display_name":"University of Oulu Repository (University of Oulu)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98381234","host_organization_name":"University of Oulu","host_organization_lineage":["https://openalex.org/I98381234"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1824793925","display_name":"6G Flagship - 6G-Enabled Wireless Smart Society & Ecosystem","funder_award_id":"346208","funder_id":"https://openalex.org/F4320321108","funder_display_name":"Academy of Finland"},{"id":"https://openalex.org/G4621981016","display_name":null,"funder_award_id":"346208","funder_id":"https://openalex.org/F4320321108","funder_display_name":"Academy of Finland"}],"funders":[{"id":"https://openalex.org/F4320321108","display_name":"Academy of Finland","ror":"https://ror.org/05k73zm37"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1984451560","https://openalex.org/W2043079332","https://openalex.org/W2084915558","https://openalex.org/W2146191242","https://openalex.org/W2495947746","https://openalex.org/W2753585338","https://openalex.org/W2787463343","https://openalex.org/W2790712558","https://openalex.org/W2963099222","https://openalex.org/W2980161131","https://openalex.org/W2983407907","https://openalex.org/W3006006160","https://openalex.org/W3006614673","https://openalex.org/W3130493776","https://openalex.org/W3214121147","https://openalex.org/W4200571688","https://openalex.org/W4211068006","https://openalex.org/W4248175462"],"related_works":["https://openalex.org/W2809541058","https://openalex.org/W2055658744","https://openalex.org/W4301858902","https://openalex.org/W4220837700","https://openalex.org/W2949881910","https://openalex.org/W2891274976","https://openalex.org/W2077545426","https://openalex.org/W2791075267","https://openalex.org/W2305888825","https://openalex.org/W2012852954"],"abstract_inverted_index":{"The":[0,79,102],"Software":[1],"Defined":[2],"Network":[3],"(SDN)":[4],"architecture":[5],"decouples":[6],"the":[7,11,23,31,36,39,143],"control":[8,32],"functionality":[9],"from":[10],"forwarding":[12,40],"devices":[13],"and":[14,38,53,74,115,119,123,128],"implements":[15],"it":[16,109],"in":[17,89],"a":[18,48,60,90,134],"separate":[19],"entity":[20],"known":[21],"as":[22],"controller.":[24],"This":[25],"raises":[26],"new":[27],"concerns":[28],"on":[29,59],"securing":[30],"messages":[33],"exchanged":[34],"between":[35],"controller":[37,97],"devices.":[41],"In":[42],"this":[43],"paper,":[44],"we":[45],"propose":[46],"TopoTrust,":[47],"novel":[49],"fully":[50],"trustless":[51],"authenticity":[52],"integrity":[54],"verification":[55],"mechanism":[56],"that":[57,108],"relies":[58],"Blockchain":[61],"protocol":[62,106],"to":[63,87,121,142],"detect":[64,112],"network":[65],"topology":[66],"poisoning":[67],"attacks,":[68],"namely":[69],"Host":[70],"Tracking":[71],"Service":[72],"(HTS)":[73],"OpenFlow":[75],"Discovery":[76],"Protocol":[77],"(OFDP).":[78],"key":[80],"merit":[81],"of":[82,104,125],"TopoTrust":[83],"is":[84,100],"its":[85],"ability":[86],"operate":[88],"zero":[91],"trust":[92],"SDN":[93],"environment":[94],"where":[95],"no":[96],"or":[98],"switch":[99],"trusted.":[101],"evaluation":[103],"our":[105],"shows":[107],"can":[110],"successfully":[111],"any":[113],"spoofing-based":[114],"packet":[116],"tampering":[117],"attacks;":[118],"up":[120],"96%":[122],"100%":[124],"Fast":[126],"Relocation":[127],"Link":[129],"Fabrication":[130],"attacks":[131],"respectively":[132],"within":[133],"short":[135],"detection":[136],"time,":[137],"while":[138],"introducing":[139],"small":[140],"overhead":[141],"network.":[144]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
