A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

[1]  Omprakash Kaiwartya,et al.  Cache agent-based geocasting in VANETs , 2015, Int. J. Inf. Commun. Technol..

[2]  Andrei V. Gurtov,et al.  Securing the control channel of software-defined mobile networks , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[3]  Sakir Sezer,et al.  A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.

[4]  Nor Badrul Anuar,et al.  Secure and dependable software defined networks , 2016, J. Netw. Comput. Appl..

[5]  Guofei Gu,et al.  Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.

[6]  Vainius Dangovas,et al.  SDN-Driven Authentication and Access Control System , 2014 .

[7]  Amardeep Singh,et al.  Introducing Restricted Access Protocol To Enhance The Security And Eliminate Ddos Attack , 2016 .

[8]  Jun Bi,et al.  Source address validation solution with OpenFlow/NOX architecture , 2011, 2011 19th IEEE International Conference on Network Protocols.

[9]  Dianxiang Xu,et al.  Security of Software Defined Networks: A survey , 2015, Comput. Secur..

[10]  Abdul Hanan Abdullah,et al.  Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks , 2014, Sensors.

[11]  T. Moore,et al.  Bitcoin: Economics, Technology, and Governance , 2014 .

[12]  Qi Hao,et al.  A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation , 2014, IEEE Communications Surveys & Tutorials.

[13]  Jeremy Clark,et al.  CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper) , 2012, Financial Cryptography.

[14]  Jörg Becker,et al.  Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency , 2012, WEIS.

[15]  Kostas Pentikousis,et al.  C-BAS: Certificate-Based AAA for SDN Experimental Facilities , 2014, 2014 Third European Workshop on Software Defined Networks.