{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:21:08Z","timestamp":1772727668025,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s10586-021-03309-0","type":"journal-article","created":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T16:08:39Z","timestamp":1622563719000},"page":"3011-3026","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["A novel mechanism to handle address spoofing attacks in SDN based IoT"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4141-0079","authenticated-orcid":false,"given":"Hamza","family":"Aldabbas","sequence":"first","affiliation":[]},{"given":"Rashid","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,1]]},"reference":[{"issue":"5","key":"3309_CR1","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125\u20131142 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3309_CR2","doi-asserted-by":"publisher","first-page":"4374","DOI":"10.1109\/ACCESS.2016.2596705","volume":"4","author":"W Ding","year":"2016","unstructured":"Ding, W., Yan, Z., Deng, R.H.: A survey on future internet security architectures. IEEE Access 4, 4374\u20134393 (2016)","journal-title":"IEEE Access"},{"key":"3309_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"3309_CR4","first-page":"791","volume":"8","author":"J Jain","year":"2017","unstructured":"Jain, J., Pal, P.R.: A recent study over cyber security and its elements. Int. J. 8, 791\u2013793 (2017)","journal-title":"Int. J."},{"issue":"5","key":"3309_CR5","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang, Y., et al.: A survey on security and privacy issues in internet-of-things. IEEE Internet of Things J. 4(5), 1250\u20131258 (2017)","journal-title":"IEEE Internet of Things J."},{"issue":"4","key":"3309_CR6","doi-asserted-by":"publisher","first-page":"3259","DOI":"10.1109\/COMST.2018.2837161","volume":"20","author":"R Amin","year":"2018","unstructured":"Amin, R., Reisslein, M., Shah, N.: Hybrid SDN networks: a survey of existing approaches. IEEE Commun.Surv. Tutor. 20(4), 3259\u20133306 (2018)","journal-title":"IEEE Commun.Surv. Tutor."},{"issue":"6","key":"3309_CR7","doi-asserted-by":"publisher","first-page":"604","DOI":"10.3390\/electronics8060604","volume":"8","author":"R Amin","year":"2019","unstructured":"Amin, R., Shah, N., Mehmood, W.: Enforcing optimal ACL policies using K-partite graph in hybrid SDN. Electronics 8(6), 604 (2019). https:\/\/doi.org\/10.3390\/electronics8060604","journal-title":"Electronics"},{"key":"3309_CR8","doi-asserted-by":"publisher","first-page":"9437","DOI":"10.1109\/ACCESS.2016.2641482","volume":"4","author":"R Amin","year":"2016","unstructured":"Amin, R., Shah, N., Shah, B., Alfandi, O.: Auto-configuration of ACL policy in case of topology change in hybrid SDN. IEEE Access 4, 9437\u20139450 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2641482","journal-title":"IEEE Access"},{"issue":"6","key":"3309_CR9","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1109\/JIOT.2017.2746186","volume":"4","author":"S Bera","year":"2017","unstructured":"Bera, S., Misra, S., Vasilakos, A.V.: Software-defined networking for internet of things: a survey. IEEE Internet Things J. 4(6), 1994\u20132008 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3309_CR10","doi-asserted-by":"crossref","unstructured":"S. Shin and G. Gu, \"Attacking software-defined networks: A first feasibility study,\" In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013, pp. 165\u2013166.","DOI":"10.1145\/2491185.2491220"},{"key":"3309_CR11","doi-asserted-by":"crossref","unstructured":"Shafi, Q. and Basit, A., 2019, January. DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. In 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (pp. 624\u2013628). IEEE.","DOI":"10.1109\/IBCAST.2019.8667147"},{"key":"3309_CR12","doi-asserted-by":"crossref","unstructured":"Cox, H., Clark, R. J., Owen, H. L. 2016. Leveraging sdn for arp security. In SoutheastCon, 2016, pp. 1-8.","DOI":"10.1109\/SECON.2016.7506644"},{"key":"3309_CR13","doi-asserted-by":"crossref","unstructured":"Shimanaka, Toru, S., Ryusuke Masuoka, R., Hay, B. 2019. Cyber deception architecture: covert attack reconnaissance using a safe SDN approach. In Proceedings of the 52nd Hawaii International Conference on System Sciences.","DOI":"10.24251\/HICSS.2019.876"},{"key":"3309_CR14","doi-asserted-by":"crossref","unstructured":"Riahi, A., Natalizio, E., Challal, Y., Mitton, N., Iera, A. 2014. A systemic and cognitive approach for IoT security. In 2014 International Conference on Computing, Networking and Communications (ICNC), pp. 183-188","DOI":"10.1109\/ICCNC.2014.6785328"},{"key":"3309_CR15","doi-asserted-by":"crossref","unstructured":"Minoli, D., Sohraby, K., Kouns, J. 2017. IoT security (IoTSec) considerations, requirements, and architectures. In 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1006\u20131007","DOI":"10.1109\/CCNC.2017.7983271"},{"key":"3309_CR16","doi-asserted-by":"crossref","unstructured":"Mukherjee, B., Neupane, R. L., Calyam, P. 2017. End-to-End IoT security middleware for cloud-fog communication. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 151\u2013156","DOI":"10.1109\/CSCloud.2017.62"},{"key":"3309_CR17","first-page":"55","volume":"4","author":"P Gaona-Garc\u00eda","year":"2017","unstructured":"Gaona-Garc\u00eda, P., Montenegro-Marin, C., Prieto, J.D., Nieto, Y.V.: Analysis of security mechanisms based on clusters IoT environments. Int. J. Interact. Multimed. Artif. Intell. 4, 55 (2017)","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"issue":"6","key":"3309_CR18","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.1109\/TNS.2017.2682188","volume":"64","author":"K Hu","year":"2017","unstructured":"Hu, K., Houbing, Lu., Wang, Xu., Li, F., Wang, X., Geng, T., Yang, H., Liu, S., Han, L., Jin, Ge.: A front-end electronics prototype based on gigabit ethernet for the ATLAS small-strip thin gap chamber. IEEE Trans. Nucl. Sci. 64(6), 1232\u20131237 (2017)","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"3309_CR19","doi-asserted-by":"publisher","first-page":"107678","DOI":"10.1109\/ACCESS.2019.2932438","volume":"7","author":"TG Nguyen","year":"2019","unstructured":"Nguyen, T.G., Phan, T.V., Nguyen, B.T., So-In, C., Baig, Z.A., Sanguanpong, S.: Search: a collaborative and intelligent nids architecture for sdn-based cloud IoT networks. IEEE Access 7, 107678\u2013107694 (2019)","journal-title":"IEEE Access"},{"key":"3309_CR20","unstructured":"Mininet. Retrieved from, http:\/\/mininet.org\/"},{"key":"3309_CR21","unstructured":"Noxrepo. Retrieved from, https:\/\/github.com\/noxrepo\/pox"},{"issue":"2","key":"3309_CR22","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.icte.2019.11.002","volume":"6","author":"M Latah","year":"2020","unstructured":"Latah, M., Toker, L.: Minimizing false positive rate for DoS attack detection: a hybrid SDN-based approach. ICT Exp. 6(2), 125\u2013127 (2020)","journal-title":"ICT Exp."},{"key":"3309_CR23","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/JIOT.2015.2480421","volume":"3","author":"K Sood","year":"2016","unstructured":"Sood, K., Yu, S., Xiang, Y.: Software-defined wireless networking opportunities and challenges for internet-of-things: a review. IEEE Internet Things J. 3, 453\u2013463 (2016)","journal-title":"IEEE Internet Things J."},{"key":"3309_CR24","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.comnet.2018.07.020","volume":"143","author":"O Salman","year":"2018","unstructured":"Salman, O., Elhajj, I., Chehab, A., Kayssi, A.: IoT survey: an SDN and fog computing perspective. Comput. Netw. 143, 221\u2013246 (2018)","journal-title":"Comput. Netw."},{"issue":"1","key":"3309_CR25","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/COMST.2018.2866942","volume":"21","author":"J Xie","year":"2019","unstructured":"Xie, J., et al.: A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges. IEEE Commun. Surv. Tutor. 21(1), 393\u2013430 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3309_CR26","doi-asserted-by":"publisher","first-page":"160536","DOI":"10.1109\/ACCESS.2019.2950945","volume":"7","author":"Y Xu","year":"2019","unstructured":"Xu, Y., et al.: Efficient DDoS detection based on K-FKNN in software defined networks. IEEE Access 7, 160536\u2013160545 (2019)","journal-title":"IEEE Access"},{"key":"3309_CR27","first-page":"562","volume":"8","author":"F Ubaid","year":"2017","unstructured":"Ubaid, F., Amin, R., Ubaid, F.B., Iqbal, M.M.: Mitigating address spoofing attacks in hybrid Sdn. Int. J. Adv. Comput. Sci. Appl. 8, 562\u2013570 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"3309_CR28","doi-asserted-by":"crossref","unstructured":"L Wang, Q Li, Y Jiang, J Wu. 2016. Towards mitigating link flooding attack via incremental SDN deployment. In 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 397\u2013402","DOI":"10.1109\/ISCC.2016.7543772"},{"key":"3309_CR29","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.future.2019.08.007","volume":"102","author":"ZA Baig","year":"2020","unstructured":"Baig, Z.A., Sanguanpong, S., Firdous, S.N., Nguyen, T.G., So-In, C.: Averaged dependence estimators for DoS attack detection in IoT networks. Future Gener. Comput. Syst. 102, 198\u2013209 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"3309_CR30","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-71761-6_6","volume-title":"SDN and NFV Security","author":"Q Ilyas","year":"2018","unstructured":"Ilyas, Q., Khondoker, R.: Security analysis of floodlight, zeroSDN, beacon and POX SDN controllers. In: Khondoker, R. (ed.) SDN and NFV Security, pp. 85\u201398. Springer, Cham (2018)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03309-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03309-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03309-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T18:17:39Z","timestamp":1635617859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03309-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,1]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["3309"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03309-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,1]]},"assertion":[{"value":"26 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}