{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:40:54Z","timestamp":1773279654683,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12083-024-01714-x","type":"journal-article","created":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T05:01:51Z","timestamp":1715317311000},"page":"2354-2370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["HostSec: A blockchain-based authentication framework for SDN hosts"],"prefix":"10.1007","volume":"17","author":[{"given":"Majd","family":"Latah","sequence":"first","affiliation":[]},{"given":"Kubra","family":"Kalkan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,10]]},"reference":[{"key":"1714_CR1","first-page":"1","volume-title":"2013 IEEE SDN For Future Networks and Services (SDN4FNS)","author":"S Scott-HaywardS","year":"2013","unstructured":"Scott-HaywardS S, O\u2019Callaghan G, Sezer S (2013) SDN security: a survey. 2013 IEEE SDN For Future Networks and Services (SDN4FNS). IEEE, pp 1\u20137"},{"key":"1714_CR2","doi-asserted-by":"crossref","unstructured":"Kreutz D, Ramos FM, Verissimo P (2013) Towards secure and dependable software-defined networks. Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 55\u201360","DOI":"10.1145\/2491185.2491199"},{"issue":"10","key":"1714_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MCOM.001.1900060","volume":"57","author":"B Yigit","year":"2019","unstructured":"Yigit B, Gur G, Tellenbach B, Alagoz F (2019) Secured communication channels in software-defined networks. IEEE Commun Mag 57(10):63\u201369","journal-title":"IEEE Commun Mag"},{"key":"1714_CR4","doi-asserted-by":"publisher","first-page":"108075","DOI":"10.1016\/j.comnet.2021.108075","volume":"193","author":"Q Zhou","year":"2021","unstructured":"Zhou Q, Yu J, Li D (2021) A dynamic and lightweight framework to secure source addresses in the SDN-based networks. Comput Netw 193:108075","journal-title":"Comput Netw"},{"key":"1714_CR5","doi-asserted-by":"crossref","first-page":"102595","DOI":"10.1016\/j.jnca.2020.102595","volume":"159","author":"JCC Chica","year":"2020","unstructured":"Chica JCC, Imbachi JC, Vega JFB (2020) J Netw Comput Appl. Journal of Network and Computer Applications 159:102595","journal-title":"Journal of Network and Computer Applications"},{"key":"1714_CR6","doi-asserted-by":"publisher","first-page":"109423","DOI":"10.1016\/j.comnet.2022.109423","volume":"219","author":"M Latah","year":"2022","unstructured":"Latah M, Kalkan K (2022) CWT-DPA: component-wise waiting time for bc-enabled data plane authentication. Comput Netw 219:109423","journal-title":"Comput Netw"},{"issue":"3","key":"1714_CR7","doi-asserted-by":"publisher","first-page":"4627","DOI":"10.1109\/JIOT.2018.2871394","volume":"6","author":"C Qiu","year":"2018","unstructured":"Qiu C, Yu FR, Yao H, Jiang C, Xu F, Zhao C (2018) Blockchain-based software-defined industrial internet of things: a dueling deep q-learning approach. IEEE Internet Things J 6(3):4627\u20134639","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"1714_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.23919\/JCC.2019.06.004","volume":"16","author":"H Yang","year":"2019","unstructured":"Yang H, Liang Y, Yao Q, Guo S, Yu A, Zhang J (2019) Blockchain-based secure distributed control for software defined optical networking. China Commun 16(6):42\u201354","journal-title":"China Commun"},{"key":"1714_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/BCCA50787.2020.9274449","volume-title":"2020 Second International Conference on Blockchain Computing and Applications (BCCA)","author":"M Latah","year":"2020","unstructured":"Latah M, Kalkan K (2020) DPSEC: a blockchain-based data plane authentication protocol for SDNs. 2020 Second International Conference on Blockchain Computing and Applications (BCCA). IEEE, pp 22\u201329"},{"key":"1714_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"International Conference on Computer Aided Verification","author":"A Armando","year":"2005","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Drielsma PH, H\u00e9am P-C, Kouchnarenko O, Mantovani J et al (2005) The AVISPA tool for the automated validation of internet security protocols and applications. International Conference on Computer Aided Verification. Springer, pp 281\u2013285"},{"key":"1714_CR11","unstructured":"Mininet. http:\/\/mininet.org\/. Accessed 3 May 2022"},{"key":"1714_CR12","unstructured":"Ryu. https:\/\/www.hyperledger.org\/use\/fabric\/. Accessed 3 May 2022"},{"key":"1714_CR13","unstructured":"Open vSwitch. https:\/\/www.openvswitch.org\/. Accessed 3 May 2022"},{"key":"1714_CR14","unstructured":"Hyperledger Fabric. https:\/\/www.hyperledger.org\/use\/fabric\/. Accessed 3 May 2022"},{"key":"1714_CR15","unstructured":"Open Quantum Safe Library. https:\/\/openquantumsafe.org\/liboqs\/. Accessed 3 May 2022"},{"issue":"11","key":"1714_CR16","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s12243-016-0505-z","volume":"71","author":"DMF Mattos","year":"2016","unstructured":"Mattos DMF, Duarte OCMB (2016) Authflow: authentication and access control mechanism for software defined networking. Ann Telecommun 71(11):607\u2013615","journal-title":"Ann Telecommun"},{"key":"1714_CR17","first-page":"1","volume-title":"2017 IEEE International Conference on Communications (ICC)","author":"F Hauser","year":"2017","unstructured":"Hauser F, Schmidt M, Menth M (2017) Establishing a session database for SDN using 802.1 x and multiple authentication resources. 2017 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20137"},{"key":"1714_CR18","doi-asserted-by":"crossref","unstructured":"Shashidhara R, Ahuja N, Lajuvanthi M, Akhila S, Das AK, Rodrigues JJ (2021) SDN\u2010chain: Privacy\u2010preserving protocol for software defined networks using blockchain. Secur Priv 4(6):e178","DOI":"10.1002\/spy2.178"},{"key":"1714_CR19","unstructured":"Jiasi W, Jian W, Jia-Nan L, Yue Z (2019) Secure software-defined networking based on blockchain. Preprint at http:\/\/arxiv.org\/abs\/1906.04342"},{"key":"1714_CR20","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/WF-IoT.2018.8355139","volume-title":"2018 IEEE 4th World Forum on Internet of Things (WF-IoT)","author":"K Kataoka","year":"2018","unstructured":"Kataoka K, Gangwar S, Podili P (2018) Trust list: internet-wide and distributed IoT traffic management using blockchain and SDN. 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE, pp 296\u2013201"},{"issue":"2","key":"1714_CR21","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TNSE.2019.2937481","volume":"8","author":"A Yazdinejad","year":"2019","unstructured":"Yazdinejad A, Parizi RM, Dehghantanha A, Choo K-KR (2019) Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Trans Netw Sci Eng 8(2):1120\u20131132","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1714_CR22","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-19379-8_20","volume-title":"Public Key Cryptography\u2013PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings 14","author":"S Halevi","year":"2011","unstructured":"Halevi S, Krawczyk H (2011) One-pass HMQV and asymmetric key-wrapping. Public Key Cryptography\u2013PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings 14. Springer, pp 317\u2013334"},{"issue":"2","key":"1714_CR23","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"issue":"7","key":"1714_CR24","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal I, Sirer EG (2018) Majority is not enough: Bitcoin mining is vulnerable. Commun ACM 61(7):95\u2013102","journal-title":"Commun ACM"},{"key":"1714_CR25","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigano","year":"2006","unstructured":"Vigano L (2006) Automated security protocol analysis with the AVISPA tool. Electron Notes Theor Comput Sci 155:61\u201386","journal-title":"Electron Notes Theor Comput Sci"},{"key":"1714_CR26","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. Proceedings of the Thirteenth EuroSys Conference. ACM, pp 1\u201315","DOI":"10.1145\/3190508.3190538"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01714-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01714-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01714-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T08:30:06Z","timestamp":1718699406000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01714-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,10]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["1714"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01714-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,10]]},"assertion":[{"value":"12 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors have read and agreed to publish the final version of this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}