{"id":"https://openalex.org/W2803624812","doi":"https://doi.org/10.1155/2018/2916356","title":"A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network","display_name":"A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network","publication_year":2018,"publication_date":"2018-05-23","ids":{"openalex":"https://openalex.org/W2803624812","doi":"https://doi.org/10.1155/2018/2916356","mag":"2803624812"},"language":"en","primary_location":{"id":"doi:10.1155/2018/2916356","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2916356","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/2916356.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2018/2916356.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449211","display_name":"Yulong Wang","orcid":"https://orcid.org/0000-0003-0759-2208"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yulong Wang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-0759-2208","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019766801","display_name":"Junjie Yi","orcid":"https://orcid.org/0000-0003-3046-2161"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjie Yi","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3046-2161","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jun Guo","orcid":"https://orcid.org/0000-0001-6255-519X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Guo","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-6255-519X","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031568529","display_name":"Yanbo Qiao","orcid":"https://orcid.org/0000-0003-0395-6027"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanbo Qiao","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053489254","display_name":"Mingyue Qi","orcid":"https://orcid.org/0000-0002-5557-5667"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyue Qi","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-5557-5667","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101690963","display_name":"Qingyu Chen","orcid":"https://orcid.org/0000-0002-1193-8913"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyu Chen","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-1193-8913","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100449211"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.7901,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75373802,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.9182624816894531},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8796667456626892},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7409827709197998},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5438152551651001},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5015513896942139},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4345250427722931},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40439465641975403}],"concepts":[{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.9182624816894531},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8796667456626892},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7409827709197998},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5438152551651001},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5015513896942139},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4345250427722931},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40439465641975403},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/2916356","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2916356","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/2916356.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ec7f6824022b4b14bee352b09863a28b","is_oa":false,"landing_page_url":"https://doaj.org/article/ec7f6824022b4b14bee352b09863a28b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/2916356","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2916356","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/2916356.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1902142362","display_name":null,"funder_award_id":"2015AA017201","funder_id":"https://openalex.org/F4320335773","funder_display_name":"National High-tech Research and Development Program"}],"funders":[{"id":"https://openalex.org/F4320309636","display_name":"University of Minnesota","ror":"https://ror.org/03grvy078"},{"id":"https://openalex.org/F4320335773","display_name":"National High-tech Research and Development Program","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2803624812.pdf","grobid_xml":"https://content.openalex.org/works/W2803624812.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W1612694023","https://openalex.org/W2010947830","https://openalex.org/W2013977265","https://openalex.org/W2109419397","https://openalex.org/W2110722699","https://openalex.org/W2147118406","https://openalex.org/W2161455936","https://openalex.org/W3087134121","https://openalex.org/W3216884487"],"related_works":["https://openalex.org/W2390777183","https://openalex.org/W1882848237","https://openalex.org/W4252772812","https://openalex.org/W2809881945","https://openalex.org/W2253962881","https://openalex.org/W2364877999","https://openalex.org/W2385763152","https://openalex.org/W2368465938","https://openalex.org/W2010370265","https://openalex.org/W2128638079"],"abstract_inverted_index":{"Traffic":[0],"analysis":[1,210,222],"is":[2,69,115],"an":[3,130,176],"effective":[4],"mean":[5],"for":[6,43,73,104,111],"gathering":[7],"intelligence":[8],"from":[9],"within":[10,109],"a":[11,24,70,100,180],"large":[12],"enterprise\u2019s":[13],"local":[14],"network.":[15,88,113,206],"Adversaries":[16],"are":[17],"able":[18],"to":[19,49,139,156,186],"monitor":[20],"all":[21,51],"traffic":[22,221],"traversing":[23],"switch":[25],"by":[26,81],"exploiting":[27],"just":[28],"one":[29],"vulnerability":[30,62],"in":[31,57,63,78,149,168,175,204],"it":[32],"and":[33,40,120,135,151,172,193,211],"obtain":[34],"valuable":[35],"information":[36],"(e.g.,":[37],"online":[38],"hosts":[39],"ongoing":[41],"sessions)":[42],"further":[44],"attacking,":[45],"while":[46],"administrators":[47],"have":[48],"patch":[50],"switches":[52],"as":[53,55,99,195,197],"soon":[54],"possible":[56],"hope":[58],"of":[59,86,125,144,160,209,220],"eliminating":[60],"the":[61,75,87,106,123,141,145,157,161,169,189,218],"time.":[64],"Moving":[65],"Target":[66],"Defense":[67],"(MTD)":[68],"new":[71],"paradigm":[72],"reobtaining":[74],"upper":[76],"hand":[77],"network":[79,170,227],"defense":[80],"dynamically":[82],"changing":[83,105],"attack":[84],"surfaces":[85],"In":[89],"this":[90],"paper,":[91],"we":[92],"propose":[93],"U-TRI":[94,114,128,164,185,215],"(unlinkability":[95],"through":[96],"random":[97,154,182],"identifier)":[98],"moving":[101],"target":[102],"technique":[103],"information-leaking":[107],"identifiers":[108,167,192],"PDUs":[110],"SDN":[112,205],"based":[116],"on":[117,226],"VIRO":[118],"protocol":[119],"implemented":[121],"with":[122,223],"help":[124],"OpenFlow":[126],"protocol.":[127],"employs":[129],"independent,":[131],"binary":[132],"tree-structured,":[133],"periodically":[134],"randomly":[136],"updating":[137],"identifier":[138,183],"replace":[140],"first":[142],"part":[143,159],"static":[146],"MAC":[147,162],"address":[148],"PDU,":[150],"assigns":[152],"unstructured":[153,177],"values":[155],"remaining":[158],"address.":[163],"also":[165],"obfuscates":[166],"layer":[171,174],"transport":[173],"manner.":[178],"Such":[179],"semistructured":[181],"enables":[184],"significantly":[187],"weaken":[188],"linkage":[190],"between":[191],"end-hosts":[194],"well":[196],"communication":[198,203],"sessions,":[199],"thus":[200],"providing":[201],"anonymous":[202],"The":[207],"result":[208],"experiments":[212],"indicates":[213],"that":[214],"dramatically":[216],"increases":[217],"difficulty":[219],"acceptable":[224],"burdens":[225],"performance.":[228]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
