{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T08:39:10Z","timestamp":1776415150610,"version":"3.51.2"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s12243-025-01133-w","type":"journal-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T06:04:41Z","timestamp":1763445881000},"page":"997-1014","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SDN-API-Sec-Fast: a performance-enhanced conflict-free blockchain-based authorization for cross-domain SDNs"],"prefix":"10.1007","volume":"80","author":[{"given":"Majd","family":"Latah","sequence":"first","affiliation":[]},{"given":"Kubra","family":"Kalkan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,18]]},"reference":[{"issue":"1","key":"1133_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2014","unstructured":"Kreutz D, Ramos FM, Verissimo PE, Rothenberg CE, Azodolmolky S, Uhlig S (2014) Software-defined networking: a comprehensive survey. Proc IEEE 103(1):14\u201376","journal-title":"Proc IEEE"},{"issue":"1","key":"1133_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/COMST.2014.2330903","volume":"17","author":"W Xia","year":"2014","unstructured":"Xia W, Wen Y, Foh CH, Niyato D, Xie H (2014) A survey on software-defined networking. IEEE Communications Surveys & Tutorials 17(1):27\u201351","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"1133_CR3","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/COMST.2017.2782482","volume":"20","author":"F Bannour","year":"2017","unstructured":"Bannour F, Souihi S, Mellouk A (2017) Distributed SDN control: survey, taxonomy, and challenges. IEEE Communications Surveys & Tutorials 20(1):333\u2013354","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1133_CR4","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.comnet.2018.04.011","volume":"140","author":"J Hua","year":"2018","unstructured":"Hua J, Zhao L, Zhang S, Liu Y, Ge X, Zhong S (2018) Topology-preserving traffic engineering for hierarchical multi-domain SDN. Comput Netw 140:62\u201377","journal-title":"Comput Netw"},{"key":"1133_CR5","doi-asserted-by":"crossref","unstructured":"Benson T, Akella A, Maltz DA (2010) Network traffic characteristics of data centers in the wild. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 267\u2013280","DOI":"10.1145\/1879141.1879175"},{"key":"1133_CR6","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jnca.2017.03.004","volume":"87","author":"FX Wibowo","year":"2017","unstructured":"Wibowo FX, Gregory MA, Ahmed K, Gomez KM (2017) Multi-domain software defined networking: research status and challenges. J Netw Comput Appl 87:32\u201345","journal-title":"J Netw Comput Appl"},{"key":"1133_CR7","doi-asserted-by":"crossref","unstructured":"Zhang H, Chen X, Lan X, Jin H, Cao Q (2020) BTCAS: a blockchain-based thoroughly cross-domain authentication scheme. Journal of Information Security and Applications 55","DOI":"10.1016\/j.jisa.2020.102538"},{"issue":"4","key":"1133_CR8","doi-asserted-by":"publisher","first-page":"634","DOI":"10.3390\/electronics9040634","volume":"9","author":"X Jia","year":"2020","unstructured":"Jia X, Hu N, Su S, Yin S, Zhao Y, Cheng X, Zhang C (2020) IRBA: an identity-based cross-domain authentication scheme for the Internet of Things. Electronics 9(4):634","journal-title":"Electronics"},{"key":"1133_CR9","doi-asserted-by":"crossref","unstructured":"Alam M, Zhang X, Khan K, Ali G (2011) xDAuth: a scalable and lightweight framework for cross domain access control and delegation. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, pp. 31\u201340","DOI":"10.1145\/1998441.1998447"},{"issue":"5","key":"1133_CR10","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/MNET.101.2000532","volume":"35","author":"A Rashid","year":"2021","unstructured":"Rashid A, Masood A, Abbas H, Zhang Y (2021) Blockchain-based public key infrastructure: a transparent digital certification mechanism for secure communication. IEEE Network 35(5):220\u2013225","journal-title":"IEEE Network"},{"issue":"6","key":"1133_CR11","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MNET.011.2000085","volume":"34","author":"Y Li","year":"2020","unstructured":"Li Y, Yu Y, Lou C, Guizani N, Wang L (2020) Decentralized public key infrastructures atop blockchain. IEEE Network 34(6):133\u2013139","journal-title":"IEEE Network"},{"key":"1133_CR12","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/j.future.2017.08.025","volume":"107","author":"B Qin","year":"2020","unstructured":"Qin B, Huang J, Wang Q, Luo X, Liang B, Shi W (2020) Cecoin: a decentralized PKI mitigating MitM attacks. Futur Gener Comput Syst 107:805\u2013815","journal-title":"Futur Gener Comput Syst"},{"key":"1133_CR13","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557\u2013564. Ieee","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"1133_CR14","doi-asserted-by":"publisher","first-page":"2901","DOI":"10.1007\/s12083-021-01127-0","volume":"14","author":"SN Khan","year":"2021","unstructured":"Khan SN, Loukil F, Ghedira-Guegan C, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: applications, challenges, and future trends. Peer-to-peer Networking and Applications 14:2901\u20132925","journal-title":"Peer-to-peer Networking and Applications"},{"issue":"4","key":"1133_CR15","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352\u2013375","journal-title":"Int J Web Grid Serv"},{"issue":"3","key":"1133_CR16","doi-asserted-by":"publisher","first-page":"4627","DOI":"10.1109\/JIOT.2018.2871394","volume":"6","author":"C Qiu","year":"2018","unstructured":"Qiu C, Yu FR, Yao H, Jiang C, Xu F, Zhao C (2018) Blockchain-based software-defined industrial internet of things: a dueling deep Q-learning approach. IEEE Internet Things J 6(3):4627\u20134639","journal-title":"IEEE Internet Things J"},{"key":"1133_CR17","doi-asserted-by":"crossref","unstructured":"Benisi NZ, Aminian M, Javadi B (2020) Blockchain-based decentralized storage networks: a survey. J Netw Comput Appl 162","DOI":"10.1016\/j.jnca.2020.102656"},{"key":"1133_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113385","volume":"154","author":"SMH Bamakan","year":"2020","unstructured":"Bamakan SMH, Motavali A, Bondarti AB (2020) A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst Appl 154:113385","journal-title":"Expert Syst Appl"},{"key":"1133_CR19","doi-asserted-by":"crossref","unstructured":"Latah M, Kalkan K (2020) DPSec: a blockchain-based data plane authentication protocol for SDNs. In: 2020 Second International Conference on Blockchain Computing and Applications (BCCA), pp. 22\u201329. IEEE","DOI":"10.1109\/BCCA50787.2020.9274449"},{"key":"1133_CR20","doi-asserted-by":"crossref","unstructured":"Latah M, Kalkan K (2024) SDN-API-Sec: a conflict-free BC-based authorization for cross-domain SDNs. In: 2024 8th Cyber Security in Networking Conference. IEEE","DOI":"10.1109\/CSNet64211.2024.10851743"},{"key":"1133_CR21","doi-asserted-by":"crossref","unstructured":"Mendiboure L, Chalouf MA, Krief F (2018) Towards a blockchain-based SD-IOV for applications authentication and trust management. In: International Conference on Internet of Vehicles, pp. 265\u2013277. Springer","DOI":"10.1007\/978-3-030-05081-8_19"},{"issue":"15","key":"1133_CR22","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.3390\/electronics10151787","volume":"10","author":"E Barka","year":"2021","unstructured":"Barka E, Dahmane S, Kerrache CA, Khayat M, Sallabi F (2021) STHM: a secured and trusted healthcare monitoring architecture using SDN and blockchain. Electronics 10(15):1787","journal-title":"Electronics"},{"issue":"7","key":"1133_CR23","doi-asserted-by":"publisher","first-page":"996","DOI":"10.3390\/electronics11070996","volume":"11","author":"S Algarni","year":"2022","unstructured":"Algarni S, Eassa F, Almarhabi K, Algarni A, Albeshri A (2022) BCNBI: a blockchain-based security framework for northbound interface in software-defined networking. Electronics 11(7):996","journal-title":"Electronics"},{"key":"1133_CR24","doi-asserted-by":"crossref","unstructured":"Duy PT, Do Hoang H, Nguyen AG-T, Pham V-H et al (2022) B-DAC: a decentralized access control framework on northbound interface for securing SDN using blockchain. Journal of Information Security and Applications 64","DOI":"10.1016\/j.jisa.2021.103080"},{"key":"1133_CR25","doi-asserted-by":"publisher","first-page":"18207","DOI":"10.1109\/ACCESS.2020.2968492","volume":"8","author":"H Liu","year":"2020","unstructured":"Liu H, Han D, Li D (2020) Fabric-IoT: a blockchain-based access control system in IoT. IEEE Access 8:18207\u201318218","journal-title":"IEEE Access"},{"key":"1133_CR26","doi-asserted-by":"publisher","first-page":"117836","DOI":"10.1109\/ACCESS.2022.3217201","volume":"10","author":"MT De Oliveira","year":"2022","unstructured":"De Oliveira MT, Reis LHA, Verginadis Y, Mattos DMF, Olabarriaga SD (2022) SmartAccess: attribute-based access control system for medical records based on smart contracts. IEEE Access 10:117836\u2013117854","journal-title":"IEEE Access"},{"key":"1133_CR27","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.cose.2019.03.016","volume":"84","author":"DDF Maesa","year":"2019","unstructured":"Maesa DDF, Mori P, Ricci L (2019) A blockchain based approach for the definition of auditable access control systems. Computers & Security 84:93\u2013119","journal-title":"Computers & Security"},{"key":"1133_CR28","unstructured":"Standard O (2013) eXtensible Access Control Markup Language (XACML) Version 3.0. A:(22 January 2013). URl: http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html"},{"key":"1133_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101741","volume":"92","author":"N Lu","year":"2020","unstructured":"Lu N, Zhang Y, Shi W, Kumari S, Choo K-KR (2020) A secure and scalable data integrity auditing scheme based on hyperledger fabric. Computers & Security 92:101741","journal-title":"Computers & Security"},{"key":"1133_CR30","doi-asserted-by":"crossref","unstructured":"Rescorla E (2018) RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3. Internet Engineering Task Force. https:\/\/www.rfc-editor.org\/rfc\/rfc8446.txt","DOI":"10.17487\/RFC8446"},{"key":"1133_CR31","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuellar J, Drielsma PH, Heam P-C, Kouchnarenko O, Mantovani J et al (2005) The tool for the automated validation of internet security protocols and applications. In: International Conference on Computer Aided Verification, pp. 281\u2013285. Springer","DOI":"10.1007\/11513988_27"},{"key":"1133_CR32","unstructured":"Li N, Wang Q, Rao P, Lin D, Bertino E, Lobo J (2008) A formal language for specifying policy combining algorithms in access control. CERIAS.(Cited on pages 88 and 112.), Tech. Rep., 2008\u20139"},{"key":"1133_CR33","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.scico.2013.05.003","volume":"83","author":"CDPK Ramli","year":"2014","unstructured":"Ramli CDPK, Nielson HR, Nielson F (2014) The logic of xacml. Sci Comput Program 83:80\u2013105","journal-title":"Sci Comput Program"},{"key":"1133_CR34","unstructured":"Chevrotain Library. https:\/\/chevrotain.io\/docs\/. [Online accessed 05 Feb 2023]"},{"key":"1133_CR35","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10207-016-0317-1","volume":"16","author":"RA Shaikh","year":"2017","unstructured":"Shaikh RA, Adi K, Logrippo L (2017) A data classification method for inconsistency and incompleteness detection in access control policy sets. Int J Inf Secur 16:91\u2013113","journal-title":"Int J Inf Secur"},{"key":"1133_CR36","volume":"22","author":"G Liu","year":"2021","unstructured":"Liu G, Pei W, Tian Y, Liu C, Li S (2021) A novel conflict detection method for abac security policies. J Ind Inf Integr 22:100200","journal-title":"J Ind Inf Integr"},{"key":"1133_CR37","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi, K., Jayalakshmi, V.: Identifying considerable anomalies and conflicts in abac security policies. In: 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 1273\u20131280 (2021). IEEE","DOI":"10.1109\/ICICCS51141.2021.9432162"},{"key":"1133_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103301","volume":"70","author":"S Kern","year":"2022","unstructured":"Kern S, Baumer T, Groll S, Fuchs L, Pernul G (2022) Optimization of access control policies. Journal of Information Security and Applications 70:103301","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"1133_CR39","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Des Codes Crypt 19(2):173\u2013193","journal-title":"Des Codes Crypt"},{"key":"1133_CR40","doi-asserted-by":"crossref","unstructured":"Jia M, He K, Chen J, Du R, Chen W, Tian Z, Ji S (2021) Process: Privacy-preserving on-chain certificate status service. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications, pp. 1\u201310 . IEEE","DOI":"10.1109\/INFOCOM42981.2021.9488858"},{"issue":"1","key":"1133_CR41","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur 1(1):36\u201363","journal-title":"Int J Inf Secur"},{"key":"1133_CR42","unstructured":"Caliper. https:\/\/www.hyperledger.org\/projects\/caliper\/. [Online accessed 03-May-2022]"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-025-01133-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-025-01133-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-025-01133-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T07:39:10Z","timestamp":1776411550000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-025-01133-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,18]]},"references-count":42,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["1133"],"URL":"https:\/\/doi.org\/10.1007\/s12243-025-01133-w","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,18]]},"assertion":[{"value":"23 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}