{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:53:09Z","timestamp":1754599989459,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031714665"},{"type":"electronic","value":"9783031714672"}],"license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71467-2_37","type":"book-chapter","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T08:02:43Z","timestamp":1731484963000},"page":"465-480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection and Localization of Malicious Nodes in Internet of Things Based on SDN"],"prefix":"10.1007","author":[{"given":"Xiao","family":"Jingxu","sequence":"first","affiliation":[]},{"given":"Chang","family":"Chaowen","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Ma","family":"Yingying","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Chenli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"issue":"8","key":"37_CR1","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","volume":"107","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Jia, Y., Liu, C., et al.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608\u20131631 (2019)","journal-title":"Proc. IEEE"},{"issue":"24","key":"37_CR2","doi-asserted-by":"publisher","first-page":"8226","DOI":"10.3390\/s21248226","volume":"21","author":"AM Alwakeel","year":"2021","unstructured":"Alwakeel, A.M.: An overview of fog computing and edge computing security and privacy issues. Sensors 21(24), 8226 (2021)","journal-title":"Sensors"},{"issue":"2","key":"37_CR3","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1109\/COMST.2021.3062546","volume":"23","author":"P Ranaweera","year":"2021","unstructured":"Ranaweera, P., Jurcut, A.D., Liyanage, M.: Survey on multi-access edge computing security and privacy. IEEE Commun. Surv. Tutorials 23(2), 1078\u20131124 (2021)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Kang, J. J., Fahd, K., Venkatraman, S., Trujillo-Rasua, R., Haskell-Dowland, P.: Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks. In 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20136. IEEE (November 2019)","DOI":"10.1109\/ITNAC46935.2019.9077977"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Mckeown, N.: Software-defined networking. In: IEEE International Conference on Computer Communications, pp. 30\u201332 (2009)","DOI":"10.1145\/1530748.1530749"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Javanmardi, S., Shojafar, M., Mohammadi, R., et al.: An SDN perspective IoT-Fog security: a survey. Comput. Netw. 229, 109732 (2023)","DOI":"10.1016\/j.comnet.2023.109732"},{"issue":"1","key":"37_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JCN.2019.000046","volume":"22","author":"N Kiran","year":"2019","unstructured":"Kiran, N., Pan, C., Wang, S., et al.: Joint resource allocation and computation offloading in mobile edge computing for SDN based wireless networks. J. Commun. Netw. 22(1), 1\u201311 (2019)","journal-title":"J. Commun. Netw."},{"issue":"10","key":"37_CR8","first-page":"3108","volume":"42","author":"J Lu","year":"2018","unstructured":"Lu, J., Luan, W., Liu, R., et al.: Architecture of distribution internet of things based on widespread sensing & software defined technology. Grid Technol. 42(10), 3108\u20133115 (2018)","journal-title":"Grid Technol."},{"issue":"5","key":"37_CR9","doi-asserted-by":"publisher","first-page":"4278","DOI":"10.1109\/JIOT.2019.2956241","volume":"7","author":"J Gao","year":"2019","unstructured":"Gao, J., Agyekum, K.O.B.O., Sifah, E.B., et al.: A blockchain-SDN-enabled Internet of vehicles environment for fog computing and 5G networks. IEEE Internet Things J. 7(5), 4278\u20134291 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"37_CR10","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart, P., Daly, D., Gibb, G., et al.: P4: programming protocol-independent packet processors. ACM SIGCOMM Comput. Commun. Rev. 44(3), 87\u201395 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"37_CR11","unstructured":"Sadiq, K.A., Thompson, A.F., Ayeni, O.A.: Mitigating DDoS Attacks in Cloud Network using Fog and SDN: A Conceptual Security Framework"},{"key":"37_CR12","doi-asserted-by":"publisher","first-page":"107678","DOI":"10.1109\/ACCESS.2019.2932438","volume":"7","author":"TG Nguyen","year":"2019","unstructured":"Nguyen, T.G., Phan, T.V., Nguyen, B.T., So-In, C., Baig, Z.A., Sanguanpong, S.: Search: a collaborative and intelligent nids architecture for sdn-based cloud iot networks. IEEE Access 7, 107678\u2013107694 (2019)","journal-title":"IEEE Access"},{"issue":"12","key":"37_CR13","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.005.2100992","volume":"60","author":"MT Khan","year":"2022","unstructured":"Khan, M.T., Akhunzada, A., Zeadally, S.: Proactive defense for fog-to-things critical infrastructure. IEEE Commun. Mag. 60(12), 44\u201349 (2022)","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"37_CR14","doi-asserted-by":"publisher","first-page":"4278","DOI":"10.1109\/JIOT.2019.2956241","volume":"7","author":"J Gao","year":"2019","unstructured":"Gao, J., et al.: A blockchain-SDN-enabled internet of vehicles environment for fog computing and 5G networks. IEEE Internet Things J. 7(5), 4278\u20134291 (2019)","journal-title":"IEEE Internet Things J."},{"key":"37_CR15","doi-asserted-by":"publisher","first-page":"56656","DOI":"10.1109\/ACCESS.2019.2913682","volume":"7","author":"L Xie","year":"2019","unstructured":"Xie, L., Ding, Y., Yang, H., Wang, X.: Blockchain-based secure and trustwor-thy internet of things in SDN-enabled 5G-VANETs. IEEE Access 7, 56656\u201356666 (2019)","journal-title":"IEEE Access"},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Oh, J., et al.: A secure data sharing based on key aggregate searchable encryption in fog-enabled IoT environment. IEEE Trans. Netw. Sci. Eng. 9(6),\u00a0 4468\u20134481\u00a0(2022)","DOI":"10.1109\/TNSE.2022.3204991"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Torres-Charles, C.A., Carrizales-Espinoza, D.E., Sanchez-Gallegos, D.D., et al.: SecMesh: an efficient information security method for stream processing in edge-fog-cloud. In: Proceedings of the 2022 7th International Conference on Cloud Computing and Internet of Things, pp. 8\u201316 (2022)","DOI":"10.1145\/3569507.3569509"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Mohan, K.V.M., Kodati, S.,\u00a0 Krishna, V.: Securing SDN enabled IoT scenario infrastructure of fog networks from attacks. In: 2022 Second International Conference on Artificial Intelligence and Smart Energy, ICAIS, pp. 1239\u20131243.\u00a0IEEE (2022)","DOI":"10.1109\/ICAIS53314.2022.9742727"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, P., Xu, S., Yang, Z., et al.: FOCES: detecting forwarding anomalies in software defined networks. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 830\u2013840.\u00a0IEEE (2018)","DOI":"10.1109\/ICDCS.2018.00085"},{"issue":"3","key":"37_CR20","doi-asserted-by":"publisher","first-page":"341","DOI":"10.3233\/JCS-200094","volume":"29","author":"G Hessam","year":"2021","unstructured":"Hessam, G., Saba, G., Alkhayat, M.I.: A new approach for detecting violation of data plane integrity in software defined networks. J. Comput. Secur. 29(3), 341\u2013358 (2021)","journal-title":"J. Comput. Secur."},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Kim, T.H.J., Basescu, C., Jia, L., et al.: Lightweight source authentication and path validation. In: Proceedings of the 2014 ACM Conference on SIGCOMM, pp. 271\u2013282 (2014)","DOI":"10.1145\/2619239.2626323"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Sasaki, T., Pappas, C., Lee, T., et al.: SDNsec: forwarding accountability for the SDN data plane. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u201310. IEEE (2016)","DOI":"10.1109\/ICCCN.2016.7568569"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Zuo, Z., Chang, C., Zhang, Y., et al.: P4Label: packet forwarding control mechanism based on P4 for software-defined networking. J. Ambient Intell. Humanized Comput., 1\u201314 (2020)","DOI":"10.1007\/s12652-020-01719-3"},{"issue":"3","key":"37_CR24","first-page":"88","volume":"43","author":"P Wu","year":"2022","unstructured":"Wu, P., Chang, C., Zuo, Z., et al.: SDN packet forwarding verification based on address overloading. J. Commun. 43(3), 88\u2013100 (2022)","journal-title":"J. Commun."}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71467-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T08:08:37Z","timestamp":1731485317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71467-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"ISBN":["9783031714665","9783031714672"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71467-2_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,14]]},"assertion":[{"value":"14 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}