Advertisement

Mobile Networks and Applications

, Volume 21, Issue 5, pp 729–743 | Cite as

Software-Defined Mobile Networks Security

  • Min Chen
  • Yongfeng Qian
  • Shiwen Mao
  • Wan Tang
  • Ximin Yang
Article

Abstract

The future 5G wireless is triggered by the higher demand on wireless capacity. With Software Defined Network (SDN), the data layer can be separated from the control layer. The development of relevant studies about Network Function Virtualization (NFV) and cloud computing has the potential of offering a quicker and more reliable network access for growing data traffic. Under such circumstances, Software Defined Mobile Network (SDMN) is presented as a promising solution for meeting the wireless data demands. This paper provides a survey of SDMN and its related security problems. As SDMN integrates cloud computing, SDN, and NFV, and works on improving network functions, performance, flexibility, energy efficiency, and scalability, it is an important component of the next generation telecommunication networks. However, the SDMN concept also raises new security concerns. We explore relevant security threats and their corresponding countermeasures with respect to the data layer, control layer, application layer, and communication protocols. We also adopt the STRIDE method to classify various security threats to better reveal them in the context of SDMN. This survey is concluded with a list of open security challenges in SDMN.

Keywords

Software defined mobile network (SDMN) OpenFlow Network function virtualization (NFV) Security 

Notes

Acknowledgments

This work was supported by the Program of International S&T Cooperation of MOST (No.2013DFA11140, No. 2013CFA051), the National Natural Science Foundation of China (grant No.61210010, No.61300231, 61572220). Mao’s work is supported in part by the US NSF (Grant CNS-0953513) and by the Wireless Engineering Research and Education Center at Auburn University.

References

  1. 1.
    Sama MR, Contreras LM, Kaippallimalil J, Akiyoshi I, Qian H, Ni H (2015) Software-defined control of the virtualized mobile packet core. IEEE Commun Mag 53(2):107–115CrossRefGoogle Scholar
  2. 2.
    Ge X, Yang B, Ye J, Mao G, Wang C-X, Han T (2015) Spatial Spectrum and Energy Efficiency of Random Cellular Networks. IEEE Trans Commun 63(3):1019–1030CrossRefGoogle Scholar
  3. 3.
    Bernardos C, La Oliva A, Serrano P, Banchs A, Contreras LM, Jin H, Zúñiga JC (2014) An architecture for software defined wireless networking. IEEE Wirel Commun 21(3):52–61CrossRefGoogle Scholar
  4. 4.
    Ge X, Huang K, Wang C-X, Hong X, Yang X (2011) Capacity Analysis of a Multi-Cell Multi-Antenna Cooperative Cellular Network with Co-Channel Interference. IEEE Trans Wirel Commun 10(10):3298–3309CrossRefGoogle Scholar
  5. 5.
    He J, Wen Y, Huang J, Wu D (2014) On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s Pricing Models. IEEE Transactions on Circuits and Systems for Video Technology 24(4):669–680CrossRefGoogle Scholar
  6. 6.
    Chávez-Santiago R, Szydełko M, Kliks A, Foukalas F, Haddad Y, Nolan KE, Kelly MY, Masonta MT, Balasingham I (2015) 5G: The convergence of wireless communications. Wirel Pers Commun:1–26Google Scholar
  7. 7.
    Naudts B, Kind M, Westphal F-J, Verbrugge S, Colle D, Pickavet M (2012) Techno-economic analysis of software defined networking as architecture for the virtualization of a mobile network. In: 2012 European Workshop on Software Defined Networking (EWSDN). IEEE, pp 67–72Google Scholar
  8. 8.
    Nunes B, Mendonca M, Nguyen X-N, Obraczka K, Turletti T, et al. (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials 16(3):1617–1634CrossRefGoogle Scholar
  9. 9.
    Checko A, Christiansen HL, Yan Y, Scolari L, Kardaras G, Berger MS, Dittmann L (2014) Cloud RAN for mobile networks – a technology overview. IEEE Communications Surveys & Tutorials 17(1):405–426CrossRefGoogle Scholar
  10. 10.
    Xiao J, Hu R, Qian Y, Gong L, Wang B (2013) Expanding lte network spectrum with cognitive radios: From concept to implementation. IEEE Wirel Commun 20(2):12–19CrossRefGoogle Scholar
  11. 11.
    Manzalini A, Saracco R, Buyukkoc C, et al. (2014) Software-defined networks for future networks and services: main technical challenges and business implications, SDN4FNS. IEEEGoogle Scholar
  12. 12.
    Kreutz D, Ramos F, Verissimo P (2013) Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 55–60Google Scholar
  13. 13.
    Hakiri A, Gokhale A, Berthou P, Schmidt DC, Gayraud T (2014) Software-defined networking: Challenges and research opportunities for future internet. Comput Netw 75(24):453–471CrossRefGoogle Scholar
  14. 14.
    Shin S, Porras PA, Yegneswaran V, Fong MW, Gu G, Tyson M (2013) Fresco: Modular composable security services for software-defined networks. In: NDSSGoogle Scholar
  15. 15.
    Kreutz D, Bessani A, Feitosa E, Cunha H (2014) Towards secure and dependable authentication and authorization infrastructures. In: 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, pp 43–52Google Scholar
  16. 16.
    Principles and practices for securing software-defined networks, 2015. www.opennetworking.org
  17. 17.
    Kreutz D, Ramos FM, Esteves Verissimo P, Esteve Rothenberg C, Azodolmolky S, Uhlig S (2015) Software-defined networking: A comprehensive survey. proc IEEE 103(1):14–76CrossRefGoogle Scholar
  18. 18.
    Yap K-K, Sherwood R, Kobayashi M, Huang T-Y, Chan M, Handigol N, McKeown N, Parulkar G (2010) Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures. ACM, pp 25–32Google Scholar
  19. 19.
    Hernan S, Lambert S, Ostwald T, Shostack A (2006) Uncover security design flaws using the stride approach msdn. microsoft. comGoogle Scholar
  20. 20.
    Wikipedia, Stride(security)–wikipedia, the free encyclopedia, 2015, [Online; accessed 20-July-2015]. [Online]. Available: https://en.wikipedia.org/wiki/STRIDE_(security)
  21. 21.
    Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305(1):357–383MathSciNetCrossRefGoogle Scholar
  22. 22.
    Yazıcı V, Kozat UC, Oguz Sunay M (2014) A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management. IEEE Commun Mag 52(11):76–85CrossRefGoogle Scholar
  23. 23.
    Yang M, Li Y, Hu L, Li B, Jin D, Chen S, Yan Z (2014) Cross-layer software-defined 5G network. Mobile Networks and Applications 20(3):1–10Google Scholar
  24. 24.
    Jin X, Li LE, Vanbever L, Rexford J (2013) Softcell: Scalable and flexible cellular core network architecture. In: Proceedings of the ninth ACM Conference on Emerging Networking Experiments and Technologies. ACM, pp 163–174Google Scholar
  25. 25.
    Costa-Requena J (2014) SDN integration in lte mobile backhaul networks. In: 2014 International Conference on Information Networking (ICOIN). IEEE, pp 264–269Google Scholar
  26. 26.
    Kempf J, Johansson B, Pettersson S, Lüning H, Nilsson T (2012) Moving the mobile evolved packet core to the cloud. In: 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 784–791Google Scholar
  27. 27.
    Sama MR, Ben Hadj Said S, Guillouard K, Suciu L (2014) Enabling network programmability in lte/epc architecture using OpenFlow. In: 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). IEEE, pp 389–396Google Scholar
  28. 28.
    Nagy M, Kotuliak I (2014) Utilizing OpenFlow, SDN and NFV in GPRS core network, in Testbeds and Research Infrastructure: Development of Networks and Communities. Springer, pp 184–193Google Scholar
  29. 29.
    Ge X, Cheng H, Guizani M, Han T (2014) 5G Wireless Backhaul Networks: Challenges and Research Advances. IEEE Netw 28(6):6–11CrossRefGoogle Scholar
  30. 30.
    He J, Xue Z, Wu D, Wu DO, Wen Y (2014) CBM: Online Strategies on Cost-aware Buffer Management for Mobile Video Streaming. IEEE Transactions on Multimedia 16(1): 242–252CrossRefGoogle Scholar
  31. 31.
    Lei L, Zhong Z, Zheng K, Chen J, Meng H (2013) Challenges on Wireless Heterogeneous Networks for Mobile Cloud Computing. IEEE Wirel Commun 20(3):34–44CrossRefGoogle Scholar
  32. 32.
    Zheng K, Wang Y, Wang W, Dohler M, Wang J (2011) Energy-efficient wireless in-home: the need for interference-controlled femtocells. IEEE Wirel Commun 18(6):36–44CrossRefGoogle Scholar
  33. 33.
    Liyanage M, Ylianttila M, Gurtov A (2014) Securing the control channel of software-defined mobile networks. In: 2014 IEEE 15th International Symposium on A World of Wireless Mobile and Multimedia Networks (WoWMoM). IEEE, pp 1–6Google Scholar
  34. 34.
    Wu D, Xue Z, He J (2014) iCloudAccess: Cost-Effective Streaming of Video Games from the Cloud with Low Latency. IEEE Transactions on Circuits and Systems for Video Technology 24(8):1405–1416CrossRefGoogle Scholar
  35. 35.
    He J, Wu D, Zeng Y, Hei X, Wen Y (2013) Toward Optimal Deployment of Cloud-Assisted Video Distribution Services. IEEE Transactions on Circuits and Systems for Video Technology 23(10):1717–1728CrossRefGoogle Scholar
  36. 36.
    Network functions virtualisation (nfv), 2013. [Online]. Available: https://portal.etsi.org/nfv/nfv_white_paper2.pdf
  37. 37.
    Bays LR, Oliveira RR, Barcellos MP, Gaspary LP, Madeira ERM (2015) Virtual network security: Threats, countermeasures, and challenges. Journal of Internet Services and Applications 6(1):1–19CrossRefGoogle Scholar
  38. 38.
    Wolinsky DI, Agrawal A, Boykin PO, Davis JR, Ganguly A, Paramygin V, Sheng YP, Figueiredo RJ (2006) On the design of virtual machine sandboxes for distributed computing in wide-area overlays of virtual workstations. In: 2006 First International Workshop on Virtualization Technology in Distributed Computing, 2006 VTDC. IEEE, pp 8–8Google Scholar
  39. 39.
    Wu H, Ding Y, Winer C, Yao L (2010) Network security for virtual machine in cloud computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT). IEEE, pp 18–21Google Scholar
  40. 40.
    de Oliveira DAS, Wu FS (2009) Protecting kernel code and data with a virtualization-aware collaborative operating system. In: 2009 Annual Computer Security Applications Conference, ACSAC’09. IEEE, pp 451–460Google Scholar
  41. 41.
    Zhang L, Shetty S, Liu P, Jing J (2014) Rootkitdet: Practical end-to-end defense against kernel rootkits in a cloud environment. In: Computer Security-ESORICS 2014. Springer, pp 475– 493Google Scholar
  42. 42.
    Baliga A, Kamat P, Iftode L (2007) Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE, pp 246–251Google Scholar
  43. 43.
    Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR (2014) Security issues in cloud environments: A survey. Int J Inf Secur 13(2):113–170CrossRefGoogle Scholar
  44. 44.
    Nguyen M-D, Chau N-T, Jung S, Jung S (2014) A demonstration of malicious insider attacks inside cloud iaas vendor. International journal of Information and Education Teachnology 4(6)Google Scholar
  45. 45.
    Rocha F, Correia M (2011) Lucy in the sky without diamonds: Stealing confidential data in the cloud. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, pp 129–134Google Scholar
  46. 46.
    Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28 (3):583–592CrossRefGoogle Scholar
  47. 47.
    Yan Q, Yu F (2015) Distributed denial of service attacks in software-defined networking with cloud computing. EEE Commun Mag 53(4):52–59CrossRefGoogle Scholar
  48. 48.
    Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, pp 401–412Google Scholar
  49. 49.
    Liang C, Yu FR (2015) Wireless virtualization for next generation mobile cellular networks. IEEE Wirel Commun 22(1):61–69CrossRefGoogle Scholar
  50. 50.
    Costa-Requena J, Santos JL, Guasch VF, Ahokas K, Premsankar G, Luukkainen S, Pérez OL, Itzazelaia MU, Ahmad I, Liyanage M, et al. (2015) SDN and NFV integration in generalized mobile network architecture. In: 2015 European Conference on Networks and Communications (EuCNC). IEEE, pp 154–158Google Scholar
  51. 51.
    Yang M, Li Y, Li B, Jin D, Chen S (2015) Service-oriented 5G network architecture: an end-to-end software defining approach. Int J Commun SystGoogle Scholar
  52. 52.
    Kloti R, Kotronis V, Smith P (2013) OpenFlow: A security analysis. In: 2013 21st IEEE International Conference on Network Protocols (ICNP). IEEE, pp 1–6Google Scholar
  53. 53.
    Hong S, Xu L, Wang H, Gu G (2015) Poisoning network visibility in software-defined networks: New attacks and countermeasures. In: Network and Distributed System Security (NDSS) Symposium 2015. NDSS, pp 8–11Google Scholar
  54. 54.
    Benton K, Camp LJ, Small C (2013) OpenFlow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 151–152Google Scholar
  55. 55.
    Shin S, Gu G (2013) Attacking software-defined networks: A first feasibility study. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 165–166Google Scholar
  56. 56.
    Shin S, Song Y, Lee T, Lee S, Chung J, Porras P, Yegneswaran V, Noh J, Kang BB (2014) Rosemary: A robust, secure, and high-performance network operating system . ACMGoogle Scholar
  57. 57.
    Schehlmann L, Abt S, Baier H (2014) Blessing or curse? revisiting security aspects of software-defined networking. In: 2014 10th International Conference on Network and Service Management (CNSM). IEEE, pp 382–387Google Scholar
  58. 58.
    Marinho J, Granjal J, Monteiro E (2015) A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security 2015(1):1–14CrossRefGoogle Scholar
  59. 59.
    Naseef M (2014) Vulnerabilities of LTE and LTE-Advanced Communication White PaperGoogle Scholar
  60. 60.
    Qi F, Sun S, Rong B, Hu RQ, Qian Y Cognitive radio based adaptive SON for LTE-a heterogeneous networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), vol 2014. IEEE, pp 4412–4417Google Scholar
  61. 61.
    Lien S-Y, Chen K-C, Liang Y-C, Lin Y (2014) Cognitive radio resource management for future cellular networks. IEEE Wirel Commun 21(1):70–79CrossRefGoogle Scholar
  62. 62.
    Baldini G, Sturman T, Biswas AR, Leschhorn R, Gódor G, Street M (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Communications Surveys & Tutorials 14(2):355–379CrossRefGoogle Scholar
  63. 63.
    Park J-M, Reed JH, Beex A, Clancy TC, Kumar V, Bahrak B (2014) Security and enforcement in spectrum sharing. Proc IEEE 102(3):270–281CrossRefGoogle Scholar
  64. 64.
    Sethi A, Brown TX (2008) Hammer model threat assessment of cognitive radio denial of service attacks. In: 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks 2008, DySPAN 2008. IEEE, pp 1–12Google Scholar
  65. 65.
    Hlavacek D, Chang JM (2014) A layered approach to cognitive radio network security: A survey. Comput Netw 75(24):414– 436CrossRefGoogle Scholar
  66. 66.
    Zhang L, Ding G, Wu Q, Zou Y, Han Z, Wang J (2015) Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communication Surveys & Tutorials 17(3):1342– 1363CrossRefGoogle Scholar
  67. 67.
    Jermyn J, Salles-Loustau G, Zonouz S (2014) An analysis of dos attack strategies against the LTE RAN. Journal of Cyber Security 3(2):159–180CrossRefGoogle Scholar
  68. 68.
    Golde N, Redon K, Borgaonkar R (2012) Weaponizing femtocells: The effect of rogue devices on mobile telecommunications. In: NDSSGoogle Scholar
  69. 69.
    Lichtman M, Reed JH, Clancy TC, Norton M (2013) Vulnerability of lte to hostile interference. In: 2013 IEEE Global Conference on Signal and Information Processing (GlobalSIP). IEEE, pp 285–288Google Scholar
  70. 70.
    Liyanage M, Ahmad I, Ylianttila M, Santos JL, Kantola R, Perez OL, Itzazelaia MU, de Oca EM, Valtierra A, Jimenez C (2015) Security for future software defined mobile networks. In: 9th International Conference on Next Generation Mobile Applications Services and Technologies (NGMAST). IEEE, pp 1–9Google Scholar
  71. 71.
    Zhou H, Wu C, Jiang M, Zhou B, Gao W, Pan T, Huang M (2015) Evolving defense mechanism for future network security. IEEE Commun Mag 53(4):45–51CrossRefGoogle Scholar
  72. 72.
    Gonzales D, Kaplan J, Saltzman E, Winkelman Z, Woods D (2015) Cloud-trust-a security assessment model for infrastructure as a service (IaaS) clouds, IEEE Transactions on Cloud ComputingGoogle Scholar
  73. 73.
    Hu F, Hao Q, Bao K (2014) A survey on software-defined network and OpenFlow: from concept to implementation. IEEE Communications Surveys & Tutorials 16(4):2181–2206CrossRefGoogle Scholar
  74. 74.
    Hu H, Ahn G-J, Han W, Zhao Z (2014) Towards a reliable SDN firewall, Presented as part of the Open Networking Summit 2014 (ONS 2014)Google Scholar
  75. 75.
    Matias J, Garay J, Toledo N, Unzilla J, Jacob E (2015) Toward an SDN-enabled NFV architecture. IEEE Commun Mag 53(4):187–193CrossRefGoogle Scholar
  76. 76.
    Alzahrani AJ, Ghorbani AA (2015) A multi-agent system for smartphone intrusion detection framework. In: Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Vol 1. Springer, pp 101–113Google Scholar
  77. 77.
    El-Gaml EF, ElAttar H, El-Badawy HM (2014) Evaluation of intrusion prevention technique in lte based network. Int J Sci Eng Res 5:1395–1400Google Scholar
  78. 78.
    Liebergeld S, Lange M, Borgaonkar R (2014) Cellpot: A concept for next generation cellular network honeypots. In: Workshop on Security Emergence Network Technology. NDSSGoogle Scholar
  79. 79.
    Yan Z, Zhang P, Vasilakos AV (2015) A security and trust framework for virtualized networks and software-defined networking. Security and Communication NetworksGoogle Scholar
  80. 80.
    Franċois J, Festor O (2015) Anomaly traceback using software defined networking. In: 2015 National Conference on Parallel Computing Technologies (PARCOMPTECH). IEEE, pp 203–208Google Scholar
  81. 81.
    Duan X, Wang X (2015) Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun Mag 53(4):28–35CrossRefGoogle Scholar
  82. 82.
    Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Renzo MD (2015) Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27CrossRefGoogle Scholar
  83. 83.
    Montero D, Yannuzzi M, Shaw A, Jacquin L, Pastor A, Serral-Gracia R, Lioy A, Risso F, Basile C, Sassu R et al (2015) Virtualized security at the network edge: A user-centric approach. IEEE Commun Mag 53(4):176–186CrossRefGoogle Scholar
  84. 84.
    Ding AY, Crowcroft J, Tarkoma S, Flinck H (2014) Software defined networking for security enhancement in wireless mobile networks. Comput Netw 66:94–101CrossRefGoogle Scholar
  85. 85.
    Dhawan M, Poddar R, Mahajan K, Mann V (2015) SPHINX: Detecting security attacks in software-defined networks. In: Proceedings of the 2015 Network and Distributed System Security (NDSS) SymposiumGoogle Scholar
  86. 86.
    Leng J, Zhou Y, Zhang J, Hu C (2015) An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network, arXiv:1504.03095
  87. 87.
    Tri N, Hiep T, Kim K (2015) Assessing the impact of resource attack in software defined network. In: 2015 International Conference on Information Networking (ICOIN). IEEE, pp 420–425Google Scholar
  88. 88.
    Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611CrossRefGoogle Scholar
  89. 89.
    Mobile device security in the workplace: 6 key risks & challenges, 2015. [Online]. Available: http://focus.forsythe.com/articles/55/Mobile-Device-Security-in-the-Workplace-6-Key-Risks-and-Challenges
  90. 90.
    Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRefGoogle Scholar
  91. 91.
    SDN and security, 2015. [Online]. Available: http://onosproject.org/2015/04/03/sdn-and-security-david-jorm/
  92. 92.
    Gudipati A, Perry D, Li LE, Katti S (2013) SoftRAN: Software defined radio access network. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, pp 25–30Google Scholar
  93. 93.
    Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G (2012) A security enforcement kernel for OpenFlow networks. In: Proceedings of the first workshop on Hot topics in software defined networks. ACM, pp 121–126Google Scholar
  94. 94.
    Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122–136CrossRefGoogle Scholar
  95. 95.
    Yang M, Li Y, Jin D, Zeng L, Wu X, Vasilakos AV (2014) Software-defined and virtualized future mobile and wireless networks: a survey. Mobile Networks and Applications 20(1):4–18CrossRefGoogle Scholar
  96. 96.
    Li G, Wu D, Shen J, Li T (2015) Deciphering Privacy Leakage in Microblogging Social Networks: A Measurement Study, Security and Communication NetworksGoogle Scholar
  97. 97.
    Akhunzada A, Ahmed E, Gani A, Khan M, Imran M, Guizani S (2015) Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun Mag 53(4):36–44CrossRefGoogle Scholar
  98. 98.
    Tasch M, Khondoker R, Marx R, Bayarou K (2014) Security analysis of security applications for software defined networks. In: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference. ACM, pp 23–30Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Embedded and Pervasive Computing Lab, School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhanChina
  2. 2.Department of Electrical & Computer EngineeringAuburn UniversityAuburnUSA
  3. 3.College of Computer ScienceSouth-Central University for NationalitiesWuhanChina

Personalised recommendations