{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:43Z","timestamp":1765622503423,"version":"3.48.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:00:00Z","timestamp":1760400000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:00:00Z","timestamp":1760400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s40860-025-00256-0","type":"journal-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T08:54:57Z","timestamp":1760432097000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Soft Actor-Critic (SAC) and dynamic trust management framework-based automatic policy generation for SDN security"],"prefix":"10.1007","volume":"11","author":[{"given":"D. S.","family":"Sahana","sequence":"first","affiliation":[]},{"given":"S. H.","family":"Brahmananda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,14]]},"reference":[{"key":"256_CR1","doi-asserted-by":"crossref","unstructured":"Bhuiyan ZA, Islam S, Islam MM, Ullah AA, Naz F, Rahman MS (2023) On the (in) security of the control plane of SDN architecture: A survey. IEEE Access","DOI":"10.1109\/ACCESS.2023.3307467"},{"key":"256_CR2","doi-asserted-by":"crossref","unstructured":"Kim J, Seo M, Lee S, Nam J, Yegneswaran V, Porras P, Shin S (2024) Enhancing security in SDN: systematizing attacks and defenses from a penetration perspective. Comput Netw, 110203","DOI":"10.1016\/j.comnet.2024.110203"},{"key":"256_CR3","doi-asserted-by":"crossref","unstructured":"Irshad A, Mallah GA, Bilal M, Chaudhry SA, Shafiq M, Song H (2023) SUSIC: A secure user access control mechanism for SDN-enabled IIoT and cyber-physical systems. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3268474"},{"issue":"18","key":"256_CR4","doi-asserted-by":"publisher","first-page":"17989","DOI":"10.1109\/JIOT.2022.3161935","volume":"9","author":"C Ke","year":"2022","unstructured":"Ke C, Zhu Z, Xiao F, Huang Z, Meng Y (2022) SDN-based privacy and functional authentication scheme for fog nodes of smart healthcare. IEEE Internet Things J 9(18):17989\u201318001","journal-title":"IEEE Internet Things J"},{"key":"256_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.future.2020.11.006","volume":"117","author":"J Li","year":"2021","unstructured":"Li J et al (2021) A fast and scalable authentication scheme in IOT for smart living. Future Generation Comput Syst 117:125\u2013137","journal-title":"Future Generation Comput Syst"},{"key":"256_CR6","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.future.2023.03.045","volume":"145","author":"C Pathmabandu","year":"2023","unstructured":"Pathmabandu C, Grundy J, Chhetri MB, Baig Z (2023) Privacy for iot: informed consent management in smart buildings. Future Generation Comput Syst 145:367\u2013383","journal-title":"Future Generation Comput Syst"},{"issue":"1","key":"256_CR7","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1109\/JSYST.2022.3190297","volume":"17","author":"M Li","year":"2022","unstructured":"Li M, Yuan H, Maple C, Cheng W, Epiphaniou G (2022) Physical layer security analysis of cognitive NOMA internet of things networks. IEEE Syst J 17(1):1045\u20131055","journal-title":"IEEE Syst J"},{"key":"256_CR8","doi-asserted-by":"publisher","first-page":"61385","DOI":"10.1109\/ACCESS.2022.3181546","volume":"10","author":"RS Bhadoria","year":"2022","unstructured":"Bhadoria RS, Zaini HG, Nezami MM, Equbal MD, Mustafa EE, Ghoneim SS (2022) Cone model in resource provisioning for Service-Oriented architecture system: an effective network management to the internet of things. IEEE Access 10:61385\u201361397","journal-title":"IEEE Access"},{"issue":"3","key":"256_CR9","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1007\/s11277-021-08993-0","volume":"122","author":"H Wadhwa","year":"2022","unstructured":"Wadhwa H, Aron R (2022) Resource utilization for IoT oriented framework using zero hour policy. Wireless Pers Commun 122(3):2285\u20132308","journal-title":"Wireless Pers Commun"},{"issue":"19","key":"256_CR10","doi-asserted-by":"publisher","first-page":"18898","DOI":"10.1109\/JIOT.2022.3163228","volume":"9","author":"PR Desai","year":"2022","unstructured":"Desai PR, Mini S, Tosh DK (2022) Edge-based optimal routing in sdn-enabled industrial internet of things. IEEE Internet Things J 9(19):18898\u201318907","journal-title":"IEEE Internet Things J"},{"key":"256_CR11","doi-asserted-by":"crossref","unstructured":"Snehi J, Snehi M, Prasad D, Simaiya S, Kansal I, Baggan V (2022) SDN-Based cloud combining edge computing for IoT infrastructure. Softw Defined Networks: Archit Appl, 497\u2013540","DOI":"10.1002\/9781119857921.ch14"},{"key":"256_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.eng.2021.08.022","volume":"22","author":"C Yang","year":"2023","unstructured":"Yang C, Liao F, Lan S, Wang L, Shen W, Huang GQ (2023) Flexible resource scheduling for software-defined cloud manufacturing with edge computing. Engineering 22:60\u201370","journal-title":"Engineering"},{"issue":"3","key":"256_CR13","doi-asserted-by":"publisher","first-page":"649","DOI":"10.3390\/electronics12030649","volume":"12","author":"S Pal","year":"2023","unstructured":"Pal S, Jhanjhi NZ, Abdulbaqi AS, Akila D, Almazroi AA, Alsubaei FS (2023) A hybrid edge-cloud system for networking service components optimization using the internet of things. Electronics 12(3):649","journal-title":"Electronics"},{"key":"256_CR14","doi-asserted-by":"publisher","first-page":"110109","DOI":"10.1016\/j.comnet.2023.110109","volume":"237","author":"KK Karmakar","year":"2023","unstructured":"Karmakar KK, Varadharajan V, Hitchens M, Tupakula U, Sariputra P (2023) A trust-aware openflow switching framework for software-defined networks (SDN). Comput Netw 237:110109","journal-title":"Comput Netw"},{"key":"256_CR15","doi-asserted-by":"crossref","unstructured":"Iqal ZM, Selamat A, Krejcar O (2023) A comprehensive systematic review of access control in iot: Requirements, Technologies, and evaluation metrics. IEEE Access","DOI":"10.1109\/ACCESS.2023.3347495"},{"issue":"10","key":"256_CR16","doi-asserted-by":"publisher","first-page":"13823","DOI":"10.1007\/s11042-022-11927-y","volume":"81","author":"I Alam","year":"2022","unstructured":"Alam I, Kumar M (2022) A novel protocol for efficient authentication in cloud-based IoT devices. Multimedia Tools Appl 81(10):13823\u201313843","journal-title":"Multimedia Tools Appl"},{"key":"256_CR17","doi-asserted-by":"publisher","first-page":"102951","DOI":"10.1016\/j.sysarc.2023.102951","volume":"142","author":"R Ma","year":"2023","unstructured":"Ma R, Zhang L (2023) SPMAC: secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage. J Syst Architect 142:102951","journal-title":"J Syst Architect"},{"issue":"22","key":"256_CR18","doi-asserted-by":"publisher","first-page":"22608","DOI":"10.1109\/JIOT.2022.3184632","volume":"9","author":"K Haseeb","year":"2022","unstructured":"Haseeb K, Saba T, Rehman A, Ahmed Z, Song HH, Wang HH (2022) Trust management with fault-tolerant supervised routing for smart cities using the internet of things. IEEE Internet Things J 9(22):22608\u201322617","journal-title":"IEEE Internet Things J"},{"key":"256_CR19","doi-asserted-by":"crossref","unstructured":"Zhang L, Li X, Wu Q, Rezaeibagha F (2023) Blockchain-aided anonymous traceable and revocable access control scheme with dynamic policy updating for the cloud IoT. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3287190"},{"key":"256_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2022.11.007","volume":"198","author":"M Khalid","year":"2023","unstructured":"Khalid M, Hameed S, Qadir A, Shah SA, Draheim D (2023) Towards SDN-based smart contract solution for IoT access control. Comput Commun 198:1\u201331","journal-title":"Comput Commun"},{"issue":"5","key":"256_CR21","doi-asserted-by":"publisher","first-page":"4987","DOI":"10.1007\/s12652-020-02492-z","volume":"14","author":"CH Lu","year":"2023","unstructured":"Lu CH, Liu CH, Chen ZH (2023) Secure and efficient firmware update for increasing IoT-enabled smart devices. J Ambient Intell Humaniz Comput 14(5):4987\u20135000","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"256_CR22","doi-asserted-by":"publisher","first-page":"7497","DOI":"10.1109\/JIOT.2020.3040775","volume":"8","author":"A Altaf","year":"2021","unstructured":"Altaf A et al (2021) Robust, Secure, and adaptive Trust-Oriented service selection in IoT-Based smart buildings. IEEE Internet Things J 8:7497\u20137509","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"256_CR23","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1007\/s00607-022-01078-1","volume":"106","author":"G Rjoub","year":"2024","unstructured":"Rjoub G, Wahab OA, Bentahar J, Bataineh A (2024) Trust-driven reinforcement selection strategy for federated learning on IoT devices. Computing 106(4):1273\u20131295","journal-title":"Computing"},{"issue":"1","key":"256_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1186\/s42400-022-00128-7","volume":"5","author":"K Jia","year":"2022","unstructured":"Jia K, Liu C, Liu Q, Wang J, Liu J, Liu F (2022) A lightweight DDoS detection scheme under SDN context. Cybersecurity 5(1):27","journal-title":"Cybersecurity"},{"issue":"3","key":"256_CR25","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TNSM.2022.3163198","volume":"19","author":"Q Ren","year":"2022","unstructured":"Ren Q, Guo Z, Wu J, Hu T, Jie L, Hu Y, He L (2022) SDN-ESRC: A secure and resilient control plane for software-defined networks. IEEE Trans Netw Serv Manage 19(3):2366\u20132381","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"256_CR26","first-page":"103080","volume":"64","author":"PT Duy","year":"2022","unstructured":"Duy PT, Hoang D, Nguyen H, A. G. T., Pham VH (2022) B-DAC: a decentralized access control framework on northbound interface for Securing SDN using blockchain. J Inform Secur Appl 64:103080","journal-title":"J Inform Secur Appl"},{"key":"256_CR27","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.jpdc.2020.09.006","volume":"147","author":"T Hu","year":"2021","unstructured":"Hu T et al (2021) SEAPP: A secure application management framework based on REST API access control in SDN-enabled cloud environment. J Parallel Distrib Comput 147:108\u2013123","journal-title":"J Parallel Distrib Comput"},{"issue":"5","key":"256_CR28","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s44443-025-00014-5","volume":"37","author":"O Benoudifa","year":"2025","unstructured":"Benoudifa O, Ait Wakrime A, Benaini R (2025) Securing SDN controller placement with muzero and blockchain-based smart contracts. J King Saud Univ Comput Inform Sci 37(5):105","journal-title":"J King Saud Univ Comput Inform Sci"},{"issue":"1","key":"256_CR29","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1049\/qtc2.12073","volume":"5","author":"MR Nosouhi","year":"2024","unstructured":"Nosouhi MR, Sood K, Chamola V, Jeong JJ, Gaddam A (2024) Towards quantum-secure software defined networks. IET Quantum Communication 5(1):66\u201371","journal-title":"IET Quantum Communication"},{"key":"256_CR30","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.jpdc.2020.09.006","volume":"147","author":"T Hu","year":"2021","unstructured":"Hu T, Zhang Z, Yi P, Liang D, Li Z, Ren Q, Hu Y, Lan J (2021) SEAPP: A secure application management framework based on REST API access control in SDN-enabled cloud environment. J Parallel Distrib Comput 147:108\u2013123","journal-title":"J Parallel Distrib Comput"},{"issue":"3","key":"256_CR31","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/technologies9030044","volume":"9","author":"DK Dake","year":"2021","unstructured":"Dake DK, Gadze JD, Klogo GS, Nunoo-Mensah H (2021) Multi-agent reinforcement learning framework in sdn-iot for transient load detection and prevention. Technologies 9(3):44","journal-title":"Technologies"},{"key":"256_CR32","doi-asserted-by":"publisher","first-page":"103390","DOI":"10.1016\/j.jnca.2022.103390","volume":"204","author":"S Lahlou","year":"2022","unstructured":"Lahlou S, Moukafih Y, Sebbar A, Zkik K, Boulmalf M, Ghogho M (2022) TD-RA policy-enforcement framework for an SDN-based IoT architecture. J Netw Comput Appl 204:103390","journal-title":"J Netw Comput Appl"},{"key":"256_CR33","doi-asserted-by":"crossref","unstructured":"Kamarei M, Patooghy A, Alsharif A, AlQahtani AAS (2023) Securing IoT-based healthcare systems against malicious and benign congestion. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3257543"},{"key":"256_CR34","doi-asserted-by":"publisher","first-page":"139244","DOI":"10.1109\/ACCESS.2020.3012121","volume":"8","author":"SA Chaudhry","year":"2020","unstructured":"Chaudhry SA, Yahya K, Al-turjman F, Yang M (2020) A secure and reliable device access control scheme for IoT based sensor cloud systems. IEEE Access 8:139244\u2013139254","journal-title":"IEEE Access"},{"key":"256_CR35","doi-asserted-by":"publisher","first-page":"2914","DOI":"10.1109\/JIOT.2020.2963899","volume":"7","author":"S Xiong","year":"2020","unstructured":"Xiong S, Ni Q, Wang L, Wang Q (2020) Secure and efficient multiauthority access control for IoT cloud storage. IEEE Internet Things J 7:2914\u20132927","journal-title":"IEEE Internet Things J"},{"key":"256_CR36","doi-asserted-by":"crossref","unstructured":"Samanta A, Nguyen TG (2025) Trust-Based distributed resource allocation in Edge-Enabled IIoT networks. IEEE Access","DOI":"10.1109\/ACCESS.2025.3567068"},{"key":"256_CR37","doi-asserted-by":"publisher","first-page":"45206","DOI":"10.1109\/ACCESS.2023.3272484","volume":"11","author":"Z Ma","year":"2023","unstructured":"Ma Z, Zhang J (2023) Efficient, traceable and privacy-aware data access control in distributed cloud-based IoD systems. IEEe Access 11:45206\u201345221","journal-title":"IEEe Access"},{"issue":"4","key":"256_CR38","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s11280-022-01130-2","volume":"26","author":"Y Liu","year":"2023","unstructured":"Liu Y, Zhao B, An Y, Guo J (2023) DACAS: integration of attribute-based access control for northbound interface security in SDN. World Wide Web 26(4):2143\u20132173","journal-title":"World Wide Web"},{"key":"256_CR39","first-page":"2914","volume":"50","author":"C Lu","year":"2020","unstructured":"Lu C (2020) Context-Aware service provisioning via agentized and reconfigurable multimodel Cooperation for Real-Life IoT-Enabled smart home systems. IEEE Trans Syst Man Cybernetics: Syst 50:2914\u20132925","journal-title":"IEEE Trans Syst Man Cybernetics: Syst"},{"key":"256_CR40","doi-asserted-by":"crossref","unstructured":"Meng Y, Ke C, Huang Z (2024) A model transformation based security policy automatic management framework for Software-defined networking. Computers Secur, 103850","DOI":"10.1016\/j.cose.2024.103850"},{"key":"256_CR41","doi-asserted-by":"crossref","unstructured":"Hirsi, A., Audah, L., Alhartomi, M. A., Salh, A., Ansa, G. O., Hamdi, M. M., \u2026 Farah,A. (2025). HSF: A Hybrid SVM-RF Machine Learning Framework for Dual-Plane DDoS Detection and Mitigation in Software-Defined Networks. IEEE Access.","DOI":"10.1109\/ACCESS.2025.3583712"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00256-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-025-00256-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00256-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:26Z","timestamp":1765622246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-025-00256-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,14]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["256"],"URL":"https:\/\/doi.org\/10.1007\/s40860-025-00256-0","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"type":"print","value":"2199-4668"},{"type":"electronic","value":"2199-4676"}],"subject":[],"published":{"date-parts":[[2025,10,14]]},"assertion":[{"value":"28 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"16"}}