{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:05:02Z","timestamp":1743069902874,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030611422"},{"type":"electronic","value":"9783030611439"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61143-9_19","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T11:03:15Z","timestamp":1604574195000},"page":"233-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving IoT Security with Software Defined Networking (SDN)"],"prefix":"10.1007","author":[{"given":"Abdelaali","family":"Tioutiou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ouafaa","family":"Diouri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,11,6]]},"reference":[{"unstructured":"Nag-Chowdhury, S., Manohar-Kuhikar, K., Dhawan, S.: IoT architecture: a survey. In: 21st IRF International Conference, pp. 35\u201338 (2015)","key":"19_CR1"},{"doi-asserted-by":"crossref","unstructured":"Vermesan, O., et al.: Internet of Things strategic research and innovation agenda. In: Vermesan, O., Friess, P. (eds.) Internet of Things - Converging Technologies for Smart Environments and Integrated Ecosystems, pp. 7\u2013152. River Publishers (2013)","key":"19_CR2","DOI":"10.1201\/9781003338659-2"},{"issue":"1","key":"19_CR3","first-page":"1","volume":"4","author":"A Ghasempour","year":"2019","unstructured":"Ghasempour, A.: Internet of Things in smart grid: architecture, applications, services, key technologies, and challenges. Invent. J. 4(1), 1\u201312 (2019)","journal-title":"Invent. J."},{"doi-asserted-by":"crossref","unstructured":"Ghasempour, A.: Optimum number of aggregators based on power consumption, cost, and network lifetime in advanced metering infrastructure architecture for smart grid Internet of Things. In: IEEE Annual Consumer Communications & Networking Conference, Las Vegas, pp. 295-6 (2016)","key":"19_CR4","DOI":"10.1109\/CCNC.2016.7444787"},{"doi-asserted-by":"crossref","unstructured":"Ferrando, R., Stacey, P.: Classification of device behaviour in Internet of Things infrastructures: towards distinguishing the abnormal from security threats. In: International Conference on Internet of Things and Machine Learning, Liverpool, pp. 1\u20138 (2017)","key":"19_CR5","DOI":"10.1145\/3109761.3109791"},{"unstructured":"Durand, J.: Le SDN pour les nuls. 11e Journ\u00e9es RESeaux (JRES), pp. 1\u201312 (2015)","key":"19_CR6"},{"doi-asserted-by":"crossref","unstructured":"Kim, H., Feamster, N.: Improving network management with software defined networking. In: IEEE Communications Magazine, pp. 14\u2013119 (2013)","key":"19_CR7","DOI":"10.1109\/MCOM.2013.6461195"},{"unstructured":"Open Networking Foundation (eds.): SDN Architecture, pp 1\u201368 (2014)","key":"19_CR8"},{"unstructured":"Shaghaghi, A., Ali-Kaafar, M., Buyya, R., Jha, S.: Software-defined network (SDN) data plane security: issues, solutions and future directions. J. Cluster Comput. pp. 1\u201324 (2018)","key":"19_CR9"},{"doi-asserted-by":"crossref","unstructured":"Shin, M., Nam, K., Kim, H.: The software defined networking (SDN): a reference architecture and open APIs. In: 2012 International Conference on ICT Convergence (ICTC), pp. 360\u2013361 (2012)","key":"19_CR10","DOI":"10.1109\/ICTC.2012.6386859"},{"key":"19_CR11","first-page":"6122","volume":"6","author":"KK Patel","year":"2016","unstructured":"Patel, K.K., Patel, S.M.: Internet of Things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6, 6122\u20136131 (2016)","journal-title":"Int. J. Eng. Sci. Comput."},{"doi-asserted-by":"crossref","unstructured":"Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C.: Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things. In: HotNets 2015, pp. 1\u20137 (2015)","key":"19_CR12","DOI":"10.1145\/2834050.2834095"},{"unstructured":"Mocana Blog: 5 key challenges in securing resource-constrained IoT devices. www.mocana.com\/blog\/5-key-challenges-in-securing-resource-constrained-iot-devices","key":"19_CR13"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4614-9278-8_4","volume":"2014","author":"M Tsugawa","year":"2014","unstructured":"Tsugawa, M., Matsunaga, A., Fortes, J.: Cloud computing security: what changes with software-defined networking? Secure Cloud Comput. 2014, 77\u201393 (2014)","journal-title":"Secure Cloud Comput."},{"doi-asserted-by":"crossref","unstructured":"Hu, Z., Wang, M., Yan, X., Yin, Y., Luo, Z.: A comprehensive security architecture for SDN. In: 18th International Conference on Intelligence in Next Generation Networks, pp. 30\u201337 (2015)","key":"19_CR15","DOI":"10.1109\/ICIN.2015.7073803"},{"doi-asserted-by":"crossref","unstructured":"Ferraris, D., Fernandez-Gago, C., Lopez, J.: A trust-by-design framework for the Internet of Things. In: 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20134 (2018)","key":"19_CR16","DOI":"10.1109\/NTMS.2018.8328674"},{"issue":"4","key":"19_CR17","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/s10796-014-9538-x","volume":"18","author":"S Sicari","year":"2014","unstructured":"Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D., Coen-Porisini, A.: A security-and quality-aware system architecture for Internet of Things. Inf. Syst. Front. 18(4), 665\u2013677 (2014). https:\/\/doi.org\/10.1007\/s10796-014-9538-x","journal-title":"Inf. Syst. Front."}],"container-title":["Communications in Computer and Information Science","Advanced Communication Systems and Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61143-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T20:00:04Z","timestamp":1669492804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61143-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030611422","9783030611439"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61143-9_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACOSIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Communication Systems and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acosis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acosis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.22","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}