{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T11:21:00Z","timestamp":1770549660356,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T00:00:00Z","timestamp":1742169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T00:00:00Z","timestamp":1742169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00117-5","type":"journal-article","created":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T17:42:58Z","timestamp":1742233378000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Energy optimization using adaptive control algorithm to enhance the performance of SDN_IOT environment"],"prefix":"10.1007","volume":"5","author":[{"given":"I.","family":"Varalakshmi","sequence":"first","affiliation":[]},{"given":"M.","family":"Thenmozhi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,17]]},"reference":[{"issue":"9","key":"117_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3556973","volume":"55","author":"A Liatifis","year":"2023","unstructured":"Liatifis A, Sarigiannidis P, Argyriou V, Lagkas T. Advancing sdn from openflow to p4: a survey. ACM Comput Surv. 2023;55(9):1\u201337.","journal-title":"ACM Comput Surv"},{"issue":"5","key":"117_CR2","doi-asserted-by":"publisher","first-page":"3183","DOI":"10.3390\/app13053183","volume":"13","author":"TE Ali","year":"2023","unstructured":"Ali TE, Chong YW, Manickam S. Machine learning techniques to detect a DDoS attack in SDN: a systematic review. Appl Sci. 2023;13(5):3183.","journal-title":"Appl Sci"},{"key":"117_CR3","first-page":"103672","volume":"8","author":"W Iqbal","year":"2023","unstructured":"Iqbal W, Abbas H, Deng P, Wan J, Rauf B, Abbas Y, Rashid I. ALAM: Anonymous lightweight authentication mechanism for SDN enabled smart homes. J Netw Comput Appl. 2023;8:103672.","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"117_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.3390\/info14010041","volume":"14","author":"R Chaganti","year":"2023","unstructured":"Chaganti R, Suliman W, Ravi V, Dua A. Deep learning approach for SDN-enabled intrusion detection system in IoT networks. Information. 2023;14(1):41.","journal-title":"Information"},{"issue":"3","key":"117_CR5","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.3390\/app13031431","volume":"13","author":"MSU Din","year":"2023","unstructured":"Ali MN, Imran M, Din MSU, Kim BS. Low rate DDoS detection using weighted federated learning in SDN control plane in IoT network. Appl Sci. 2023;13(3):1431.","journal-title":"Appl Sci"},{"key":"117_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3245816","author":"S Misra","year":"2023","unstructured":"Misra S, Pal S, Ahmed N, Mukherjee A. Sdn-controlled resource-tailored analytics for healthcare iot system. IEEE Syst J. 2023. https:\/\/doi.org\/10.1109\/JSYST.2023.3245816.","journal-title":"IEEE Syst J"},{"key":"117_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/dac.5429","volume":"38","author":"A Rahman","year":"2023","unstructured":"Rahman A, Islam J, Kundu D, Karim R, Rahman Z, Band SS, Kumar N. Impacts of blockchain in software-defined internet of things ecosystem with network function virtualization for smart applications: present perspectives and future directions. Int J Commun Syst. 2023;38: e5429.","journal-title":"Int J Commun Syst"},{"issue":"8","key":"117_CR8","doi-asserted-by":"publisher","first-page":"4953","DOI":"10.3390\/app13084953","volume":"13","author":"R Jmal","year":"2023","unstructured":"Jmal R, Ghabri W, Guesmi R, Alshammari BM, Alshammari AS, Alsaif H. Distributed blockchain-SDN secure IoT system based on ANN to mitigate DDoS attacks. Appl Sci. 2023;13(8):4953.","journal-title":"Appl Sci"},{"issue":"3","key":"117_CR9","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s10922-023-09749-w","volume":"31","author":"M Cherian","year":"2023","unstructured":"Cherian M, Varma SL. Secure SDN\u2013IoT framework for DDoS attack detection using deep learning and counter based approach. J Netw Syst Manage. 2023;31(3):54.","journal-title":"J Netw Syst Manage"},{"key":"117_CR10","doi-asserted-by":"publisher","first-page":"143985","DOI":"10.1109\/ACCESS.2020.3013998","volume":"8","author":"MA Aladaileh","year":"2020","unstructured":"Aladaileh MA, Anbar M, Hasbullah IH, Chong YW, Sanjalawe YK. Detection techniques of distributed denial of service attacks on software-defined networking controller\u2013a review. IEEE Access. 2020;8:143985\u201395.","journal-title":"IEEE Access"},{"key":"117_CR11","doi-asserted-by":"crossref","unstructured":"Tan Z, Ding B, Zhao J, Guo Y, Lu S. Data-plane signaling in cellular IoT: attacks and defense. In\u00a0Proceedings of the 27th annual international conference on mobile computing and networking. 2021; (pp. 465\u2013477).","DOI":"10.1145\/3447993.3483255"},{"issue":"1","key":"117_CR12","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/COMST.2018.2870658","volume":"21","author":"A Praseed","year":"2018","unstructured":"Praseed A, Thilagam PS. DDoS attacks at the application layer: challenges and research perspectives for safeguarding web applications. IEEE Commun Surv Tutor. 2018;21(1):661\u201385.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"7","key":"117_CR13","doi-asserted-by":"publisher","first-page":"2697","DOI":"10.3390\/s22072697","volume":"22","author":"M Aslam","year":"2022","unstructured":"Aslam M, Ye D, Tariq A, Asad M, Hanif M, Ndzi D, Jilani SF. Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors. 2022;22(7):2697.","journal-title":"Sensors"},{"key":"117_CR14","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.future.2022.07.024","volume":"137","author":"B Sellami","year":"2022","unstructured":"Sellami B, Hakiri A, Yahia SB. Deep Reinforcement Learning for energy-aware task offloading in join SDN-Blockchain 5G massive IoT edge network. Futur Gener Comput Syst. 2022;137:363\u201379.","journal-title":"Futur Gener Comput Syst"},{"issue":"8","key":"117_CR15","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.3390\/sym14081563","volume":"14","author":"AA Alashhab","year":"2022","unstructured":"Alashhab AA, Zahid MSM, Azim MA, Daha MY, Isyaku B, Ali S. A survey of low rate DDoS detection techniques based on machine learning in software-defined networks. Symmetry. 2022;14(8):1563.","journal-title":"Symmetry"},{"issue":"4","key":"117_CR16","doi-asserted-by":"publisher","first-page":"102","DOI":"10.3390\/fi14040102","volume":"14","author":"V Tomer","year":"2022","unstructured":"Tomer V, Sharma S. Detecting iot attacks using an ensemble machine learning model. Future Internet. 2022;14(4):102.","journal-title":"Future Internet"},{"key":"117_CR17","doi-asserted-by":"crossref","unstructured":"Xu M, Wang C, Zou Y, Yu D, Cheng X, Lyu W. Curb: trusted and scalable software-defined network control plane for edge computing. In\u00a02022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS). IEEE. 2022; (pp. 492\u2013502).","DOI":"10.1109\/ICDCS54860.2022.00054"},{"key":"117_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.09.012","author":"S Agrawal","year":"2022","unstructured":"Agrawal S, Sarkar S, Aouedi O, Yenduri G, Piamrat K, Alazab M, Gadekallu TR. Federated learning for intrusion detection system: concepts, challenges and future directions. Comput Commun. 2022. https:\/\/doi.org\/10.1016\/j.comcom.2022.09.012.","journal-title":"Comput Commun"},{"issue":"13","key":"117_CR19","doi-asserted-by":"publisher","first-page":"4777","DOI":"10.3390\/en15134777","volume":"15","author":"R Nagaraju","year":"2022","unstructured":"Nagaraju R, Goyal SB, Verma C, Safirescu CO, Mihaltan TC. Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks. Energies. 2022;15(13):4777.","journal-title":"Energies"},{"key":"117_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-021-03402-4","volume":"25","author":"MA Ja\u2019afreh","year":"2022","unstructured":"Ja\u2019afreh MA, Adhami H, Alchalabi AE, Hoda M, El Saddik A. Toward integrating software defined networks with the Internet of Things: a review. Clust Comput. 2022;25:1\u201318.","journal-title":"Clust Comput"},{"key":"117_CR21","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jpdc.2022.01.015","volume":"162","author":"U Farooq","year":"2022","unstructured":"Farooq U, Tariq N, Asim M, Baker T, Al-Shamma\u2019a A. Machine learning and the Internet of Things security: solutions and open challenges. J Parallel Distrib Comput. 2022;162:89\u2013104.","journal-title":"J Parallel Distrib Comput"},{"issue":"1","key":"117_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/jsan12010003","volume":"12","author":"R Elsayed","year":"2022","unstructured":"Elsayed R, Hamada R, Hammoudeh M, Abdalla M, Elsaid SA. A hierarchical deep learning-based intrusion detection architecture for clustered Internet of Things. J Sens Actuator Netw. 2022;12(1):3.","journal-title":"J Sens Actuator Netw"},{"issue":"9","key":"117_CR23","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.3390\/electronics11091502","volume":"11","author":"U Inayat","year":"2022","unstructured":"Inayat U, Zia MF, Mahmood S, Khalid HM, Benbouzid M. Learning-based methods for cyber attacks detection in IoT systems: a survey on methods, analysis, and future prospects. Electronics. 2022;11(9):1502.","journal-title":"Electronics"},{"issue":"1","key":"117_CR24","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1504\/IJSNET.2020.109720","volume":"34","author":"H Cheng","year":"2020","unstructured":"Cheng H, Liu J, Xu T, Ren B, Mao J, Zhang W. Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks. Int J Sens Netw. 2020;34(1):56\u201369.","journal-title":"Int J Sens Netw"},{"issue":"3","key":"117_CR25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/technologies9030044","volume":"9","author":"DK Dake","year":"2021","unstructured":"Dake DK, Gadze JD, Klogo GS, Nunoo-Mensah H. Multi-agent reinforcement learning framework in sdn-iot for transient load detection and prevention. Technologies. 2021;9(3):44.","journal-title":"Technologies"},{"key":"117_CR26","doi-asserted-by":"publisher","first-page":"5366","DOI":"10.1109\/TIFS.2021.3127009","volume":"16","author":"Y Zhou","year":"2021","unstructured":"Zhou Y, Cheng G, Yu S. An SDN-enabled proactive defense framework for DDoS mitigation in IoT networks. IEEE Trans Inf Forensics Secur. 2021;16:5366\u201380.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"117_CR27","doi-asserted-by":"publisher","first-page":"3459","DOI":"10.3390\/s20123459","volume":"20","author":"Y Li","year":"2020","unstructured":"Li Y, Su X, Ding AY, Lindgren A, Liu X, Prehofer C, Hui P. Enhancing the Internet of Things with knowledge-driven software-defined networking technology: future perspectives. Sensors. 2020;20(12):3459.","journal-title":"Sensors"},{"issue":"2","key":"117_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.9734\/ajrcos\/2021\/v9i230216","volume":"9","author":"SH Haji","year":"2021","unstructured":"Haji SH, Zeebaree SR, Saeed RH, Ameen SY, Shukur HM, Omar N, Yasin HM. Comparison of software defined networking with traditional networking. Asian J Res Comput Sci. 2021;9(2):1\u201318.","journal-title":"Asian J Res Comput Sci"},{"issue":"3","key":"117_CR29","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s10922-023-09682-0","volume":"31","author":"M Cherian","year":"2023","unstructured":"Cherian M, Varma SL. Secure SDN\u2013IoT framework for DDoS attack detection using deep learning and counter-based approach. J Netw Syst Manag. 2023;31(3):54. https:\/\/doi.org\/10.1007\/s10922-023-09682-0.","journal-title":"J Netw Syst Manag"},{"issue":"3","key":"117_CR30","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.3390\/app13031431","volume":"13","author":"MN Ali","year":"2023","unstructured":"Ali MN, Imran M, Din MSU, Kim BS. Low-rate DDoS detection using weighted federated learning in SDN control plane in IoT network. Appl Sci. 2023;13(3):1431. https:\/\/doi.org\/10.3390\/app13031431.","journal-title":"Appl Sci"},{"key":"117_CR31","doi-asserted-by":"publisher","first-page":"103390","DOI":"10.1016\/j.jnca.2022.103390","volume":"204","author":"S Lahlou","year":"2022","unstructured":"Lahlou S, Moukafih Y, Sebbar A, Zkik K, Boulmalf M, Ghogho M. TD-RA policy-enforcement framework for an SDN-based IoT architecture. J Netw Comput Appl. 2022;204:103390.","journal-title":"J Netw Comput Appl"},{"key":"117_CR32","doi-asserted-by":"crossref","unstructured":"Kanagavelu R, Aung KMM. A survey on sdn based security in Internet of Things. In:\u00a0Advances in information and communication networks: proceedings of the 2018 future of information and communication conference (FICC), Vol. 2.\u00a0Springer International Publishing. 2019; (pp. 563\u2013577)","DOI":"10.1007\/978-3-030-03405-4_39"},{"issue":"6","key":"117_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3421764","volume":"53","author":"L Zhu","year":"2020","unstructured":"Zhu L, Karim MM, Sharif K, Xu C, Li F, Du X, Guizani M. SDN controllers: a comprehensive analysis and performance evaluation study. ACM Comput Surv (CSUR). 2020;53(6):1\u201340.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"117_CR34","doi-asserted-by":"publisher","first-page":"100279","DOI":"10.1016\/j.cosrev.2020.100279","volume":"37","author":"J Singh","year":"2020","unstructured":"Singh J, Behal S. Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Comput Sci Rev. 2020;37:100279.","journal-title":"Comput Sci Rev"},{"key":"117_CR35","doi-asserted-by":"crossref","unstructured":"Zheng S. Research on SDN-based IoT security architecture model. In\u00a02019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). IEEE. 2019; (pp. 575\u2013579)","DOI":"10.1109\/ITAIC.2019.8785456"},{"key":"117_CR36","doi-asserted-by":"crossref","unstructured":"Van Bemten A, \u00d0eri\u0107 N, Varasteh A, Blenk A, Schmid S, Kellerer W. Empirical predictability study of sdn switches. In\u00a02019 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS). IEEE. 2019; (pp. 1\u201313)","DOI":"10.1109\/ANCS.2019.8901878"},{"issue":"10","key":"117_CR37","doi-asserted-by":"publisher","first-page":"9541","DOI":"10.1016\/j.jksuci.2021.11.007","volume":"34","author":"G Beniwal","year":"2022","unstructured":"Beniwal G, Singhrova A. A systematic literature review on IoT gateways. J King Saud Univ-Comput Inf Sci. 2022;34(10):9541\u201363.","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"117_CR38","unstructured":"Tuncer D, Charalambides M, Tangari G, Pavlou G. A northbound interface for software-based networks. In\u00a02018 14th International Conference on Network and Service Management (CNSM). IEEE. 2018; (pp. 99\u2013107)."},{"key":"117_CR39","doi-asserted-by":"crossref","unstructured":"\u00d6z\u00e7elik M, Chalabianloo N, G\u00fcr G. Software-defined edge defense against IoT-based DDoS. In\u00a02017 IEEE international conference on computer and information technology (CIT). IEEE. 2017; (pp. 308\u2013313).","DOI":"10.1109\/CIT.2017.61"},{"key":"117_CR40","doi-asserted-by":"crossref","unstructured":"Sarwar MA, Hussain M, Anwar MU, Ahmad M. FlowJustifier: an optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In\u00a0Proceedings of the 3rd international conference on future networks and distributed systems 2019; (pp. 1\u20139).","DOI":"10.1145\/3341325.3342037"},{"issue":"2","key":"117_CR41","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s40031-020-00442-z","volume":"101","author":"A Wani","year":"2020","unstructured":"Wani A, Revathi S. DDoS detection and alleviation in IoT using SDN (SDIoT-DDoS-DA). J Instit Eng Ind Ser B. 2020;101(2):117\u201328.","journal-title":"J Instit Eng Ind Ser B"},{"key":"117_CR42","doi-asserted-by":"publisher","first-page":"44570","DOI":"10.1109\/ACCESS.2018.2854567","volume":"6","author":"Y Yu","year":"2018","unstructured":"Yu Y, Guo L, Liu Y, Zheng J, Zong YUE. An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks. IEEE access. 2018;6:44570\u20139.","journal-title":"IEEE access"},{"issue":"3","key":"117_CR43","doi-asserted-by":"publisher","first-page":"929","DOI":"10.3390\/app11030929","volume":"11","author":"S Wang","year":"2021","unstructured":"Wang S, Gomez K, Sithamparanathan K, Asghar MR, Russello G, Zanna P. Mitigating ddos attacks in sdn-based iot networks leveraging secure control and data plane algorithm. Appl Sci. 2021;11(3):929.","journal-title":"Appl Sci"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00117-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00117-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00117-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T17:43:06Z","timestamp":1742233386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00117-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,17]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["117"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00117-5","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,17]]},"assertion":[{"value":"9 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"27"}}