{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:50:53Z","timestamp":1774716653716,"version":"3.50.1"},"reference-count":121,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T00:00:00Z","timestamp":1587081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Beijing Natural Science Foundation","award":["4192051"],"award-info":[{"award-number":["4192051"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772077 and 61370192"],"award-info":[{"award-number":["61772077 and 61370192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2021,3,31]]},"abstract":"<jats:p>Internet of Things (IoT) and Network Softwarization are fast becoming core technologies of information systems and network management for the next-generation Internet. The deployment and applications of IoT range from smart cities to urban computing and from ubiquitous healthcare to tactile Internet. For this reason, the physical infrastructure of heterogeneous network systems has become more complicated and thus requires efficient and dynamic solutions for management, configuration, and flow scheduling. Network softwarization in the form of Software Defined Networks and Network Function Virtualization has been extensively researched for IoT in the recent past. In this article, we present a systematic and comprehensive review of virtualization techniques explicitly designed for IoT networks. We have classified the literature into software-defined networks designed for IoT, function virtualization for IoT networks, and software-defined IoT networks. These categories are further divided into works that present architectural, security, and management solutions. Besides, the article highlights several short-term and long-term research challenges and open issues related to the adoption of software-defined Internet of Things.<\/jats:p>","DOI":"10.1145\/3379444","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:33:47Z","timestamp":1588577627000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":182,"title":["A Survey of Network Virtualization Techniques for Internet of Things Using SDN and NFV"],"prefix":"10.1145","volume":"53","author":[{"given":"Iqbal","family":"Alam","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7214-6568","authenticated-orcid":false,"given":"Kashif","family":"Sharif","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"given":"Fan","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"given":"Zohaib","family":"Latif","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"given":"M. M.","family":"Karim","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"given":"Sujit","family":"Biswas","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5609-856X","authenticated-orcid":false,"given":"Boubakr","family":"Nour","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"Temple University, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"SD-IoV: SDN enabled routing for internet of vehicles in road-aware approach. J. Amb. Intell. Hum. Comput. 11 (May","author":"Abbas Muhammad Tahir","year":"2019"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00131"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2018.03.004"},{"key":"e_1_2_1_5_1","volume-title":"SD-WISE: A software-defined WIreless SEnsor network. Comput. Netw. 159 (Aug","author":"Anadiotis Angelos-Christos","year":"2019"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTAC.2018.8370397"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"L. Atzori J. L. Bellido R. Bolla G. Genovese A. Iera A. Jara C. Lombardo and G. Morabito. 2019. SDN8NFV contribution to IoT objects virtualization. Comput. Netw. 149 (Feb. 2019) 200--212. DOI:https:\/\/doi.org\/10.1016\/j.comnet.2018.11.030  L. Atzori J. L. Bellido R. Bolla G. Genovese A. Iera A. Jara C. Lombardo and G. Morabito. 2019. SDN8NFV contribution to IoT objects virtualization. Comput. Netw. 149 (Feb. 2019) 200--212. DOI:https:\/\/doi.org\/10.1016\/j.comnet.2018.11.030","DOI":"10.1016\/j.comnet.2018.11.030"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETWKS.2012.6381694"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702546"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2414-5"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Z. Benomar D. Bruneo S. Distefano K. Elbaamrani etal 2018. Extending openstack for cloud-based networking at the edge. In Proceedings of the IEEE International Conference on Internet of Things (iThings\u201918) and IEEE Green Computing and Communications (GreenCom\u201918) and IEEE Cyber Physical and Social Computing (CPSCom\u201918) and IEEE Smart Data (SmartData\u201918). 162--169. DOI:https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00058  Z. Benomar D. Bruneo S. Distefano K. Elbaamrani et al. 2018. Extending openstack for cloud-based networking at the edge. In Proceedings of the IEEE International Conference on Internet of Things (iThings\u201918) and IEEE Green Computing and Communications (GreenCom\u201918) and IEEE Cyber Physical and Social Computing (CPSCom\u201918) and IEEE Smart Data (SmartData\u201918). 162--169. DOI:https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00058","DOI":"10.1109\/Cybermatics_2018.2018.00058"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2615761"},{"key":"e_1_2_1_13_1","unstructured":"S. Biswas K. Sharif F. Li S. Maharjan S. P. Mohanty and Y. Wang. 2019. PoBT: A light weight consensus algorithm for scalable IoT business blockchain. IEEE IoT J. (2019) 1--13. https:\/\/ieeexplore.ieee.org\/document\/8926457.  S. Biswas K. Sharif F. Li S. Maharjan S. P. Mohanty and Y. Wang. 2019. PoBT: A light weight consensus algorithm for scalable IoT business blockchain. IEEE IoT J. (2019) 1--13. https:\/\/ieeexplore.ieee.org\/document\/8926457."},{"key":"e_1_2_1_14_1","first-page":"3","article-title":"A scalable blockchain framework for secure transactions in IoT","volume":"6","author":"Biswas S.","year":"2019","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2607786"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172866"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"A. Boudi I. Farris M. Bagaa and T. Taleb. 2019. Assessing lightweight virtualization for security-as-a-service at the network edge. IEICE Transactions on Communications E102.B 5 (2019) 970--977. DOI:https:\/\/doi.org\/10.1587\/transcom.2018EUI0001  A. Boudi I. Farris M. Bagaa and T. Taleb. 2019. Assessing lightweight virtualization for security-as-a-service at the network edge. IEICE Transactions on Communications E102.B 5 (2019) 970--977. DOI:https:\/\/doi.org\/10.1587\/transcom.2018EUI0001","DOI":"10.1587\/transcom.2018EUI0001"},{"key":"e_1_2_1_18_1","volume-title":"Retrieved","author":"Bradley Joseph M.","year":"2013"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 28th International Teletraffic Congress","volume":"2","author":"Bruschi R.","year":"2016"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.30"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320326.3320368"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2015.100"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00188"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5183468"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762291"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247453"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2202566"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2018.8404837"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2016.7530127"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.Workshops.2017.84"},{"key":"e_1_2_1_31_1","volume-title":"Haftu Tasew Reda, and Naveen Chilamkurti","author":"Diro Abebe Abeshu","year":"2018"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENCONSpring.2016.7519425"},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"R. Enns M. Bjorklund J. Schoenwaelder and A. Bierman. 2011. Network Configuration Protocol (NETCONF). Retrieved from https:\/\/tools.ietf.org\/html\/rfc6241.  R. Enns M. Bjorklund J. Schoenwaelder and A. Bierman. 2011. Network Configuration Protocol (NETCONF). Retrieved from https:\/\/tools.ietf.org\/html\/rfc6241.","DOI":"10.17487\/rfc6241"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2009.5416827"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 2017 IEEE Conference on Standards for Communications and Networking (CSCN\u201917)","author":"Farris I."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2862350"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004245"},{"key":"e_1_2_1_39_1","volume-title":"Retrieved","author":"FLARE","year":"2019"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.110"},{"key":"e_1_2_1_41_1","volume-title":"Retrieved","author":"Gartner","year":"2017"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SpliTech.2016.7555946"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986623"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263372"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2439033"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2017.7889240"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2017.7919082"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2015.7324414"},{"key":"e_1_2_1_49_1","volume-title":"Retrieved","author":"HUAWEI","year":"2015"},{"key":"e_1_2_1_50_1","first-page":"2","article-title":"Software-defined networking paradigms in wireless networks: A survey","volume":"47","author":"Jagadeesan Nachikethas A.","year":"2014","journal-title":"Comput. Surv."},{"key":"e_1_2_1_51_1","article-title":"SDIoT: A software defined based internet of things framework","volume":"6","author":"Jararweh Yaser","year":"2015","journal-title":"J. Amb. Intell. Hum. Comput."},{"key":"e_1_2_1_52_1","volume-title":"Gagangeet Singh Aujla, and Neeraj Kumar","author":"Jindal Anish","year":"2019"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.38"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700714"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355139"},{"key":"e_1_2_1_56_1","volume-title":"Cassowary. In Proceedings of the 2nd Workshop on Middleware for Context-Aware Applications in the IoT (M4IoT\u201915)","author":"Kathiravelu Pradeeban","year":"2015"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2412971"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700261"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460134"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328905.3332505"},{"key":"e_1_2_1_61_1","volume-title":"Retrieved","author":"Kubernetes","year":"2019"},{"key":"e_1_2_1_62_1","first-page":"5","article-title":"Securing SDN infrastructure of IoT\u2013Fog networks from MitM attacks","volume":"4","author":"Li Cheng","year":"2017","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309194.3309199"},{"key":"e_1_2_1_64_1","first-page":"42","article-title":"A general SDN-based IoT framework with NVF implementation","volume":"13","author":"Li Jie","year":"2015","journal-title":"ZTE Commun."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511053"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263373"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.092812.121712"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3022227.3022331"},{"key":"e_1_2_1_70_1","volume-title":"Retrieved","author":"Martinez-Julia Pedro","year":"2019"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2017.43"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2917914"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081092"},{"key":"e_1_2_1_75_1","volume-title":"Lecture Notes. Retrieved","author":"Nakao Aki","year":"2012"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.52"},{"key":"e_1_2_1_77_1","first-page":"1","article-title":"IoT middleware: A survey on issues and enabling technologies","volume":"4","author":"Ngu Anne H. H.","year":"2016","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987319"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.127"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.64"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2016.17"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7848825"},{"key":"e_1_2_1_83_1","volume-title":"Retrieved","author":"ONF","year":"2015"},{"key":"e_1_2_1_84_1","volume-title":"Open Source Software for Creating Private and Public Clouds.Retrieved","author":"OpenStack","year":"2019"},{"key":"e_1_2_1_85_1","first-page":"1","article-title":"Future edge cloud and edge computing for Internet of Things applications","volume":"5","author":"Pan Jianli","year":"2018","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2431211.2431216"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930345"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838365"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838332"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644520"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761651"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3165290"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2900097"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2017.7939144"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2015.7507265"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389122"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2015.7312717"},{"key":"e_1_2_1_98_1","volume-title":"Blockchain based hybrid network architecture for the smart city. Fut. Gener. Comput. Syst. 86 (Sep","author":"Sharma Pradip Kumar","year":"2018"},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of 20th Annual Network 8 Distributed System Security Symposium (NDSS'13)","author":"Shin Seungwon","year":"2013"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2016.7785005"},{"key":"e_1_2_1_102_1","volume-title":"Proceedings of the 13th International Conference on Wireless and Mobile Communications (ICWMC'17)","author":"Silva Antonio","year":"2017"},{"key":"e_1_2_1_103_1","volume-title":"Article 74 (Jul.","author":"Siow Eugene","year":"2018"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947781"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"e_1_2_1_106_1","unstructured":"M. Smith M. Dvorkin V. Laribi V. Pandey P. Gerg and N. Weidenbacher. 2016. OPFlex Control Protocol. Retrieved from https:\/\/tools.ietf.org\/html\/draft-smith-opflex-03.  M. Smith M. Dvorkin V. Laribi V. Pandey P. Gerg and N. Weidenbacher. 2016. OPFlex Control Protocol. Retrieved from https:\/\/tools.ietf.org\/html\/draft-smith-opflex-03."},{"key":"e_1_2_1_107_1","volume-title":"Article 59 (May","author":"Son Jungmin","year":"2018"},{"key":"e_1_2_1_108_1","unstructured":"Daniel Steinberg and Stuart Cheshire. 2010. Zero Configuration Network\u2014The Definitive Guide. O\u2019Reilly Media.  Daniel Steinberg and Stuart Cheshire. 2010. Zero Configuration Network\u2014The Definitive Guide. O\u2019Reilly Media."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102319"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543778"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2016.W2A.42"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700629"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2565621"},{"key":"e_1_2_1_114_1","volume-title":"Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM\u201915)","author":"Wu Di"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470945"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666270"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018567.2018569"},{"key":"e_1_2_1_118_1","unstructured":"H. Yin H. Xie T. Tsou D. Lopez P. Aranda and R. Sidi. 2012. SDNi: A Message Exchange Protocol for Software Defined Networks (SDNS) across Multiple Domains. Technical Report. Retrieved from http:\/\/tools.ietf.org\/id\/draft-yin-sdn-sdni-00.txt.  H. Yin H. Xie T. Tsou D. Lopez P. Aranda and R. Sidi. 2012. SDNi: A Message Exchange Protocol for Software Defined Networks (SDNS) across Multiple Domains. Technical Report. Retrieved from http:\/\/tools.ietf.org\/id\/draft-yin-sdn-sdni-00.txt."},{"key":"e_1_2_1_119_1","volume-title":"Enabling security functions with SDN: A feasibility study. Comput. Netw. 85 (Jul","author":"Yoon Changhoon","year":"2015"},{"key":"e_1_2_1_120_1","volume-title":"Retrieved","author":"Yun Ma","year":"2013"},{"key":"e_1_2_1_121_1","first-page":"5","article-title":"Security management architecture for NFV\/SDN-aware IoT systems","volume":"6","author":"Zarca Alejandro Molina","year":"2019","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_122_1","volume-title":"OpenNetVM. In Proceedings of the 2016 Workshop on Hot Topics in Middleboxes and Network Function Virtualization (HotMIddlebox'16)","author":"Zhang Wei","year":"2016"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379444","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:22Z","timestamp":1750197742000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379444"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,17]]},"references-count":121,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3,31]]}},"alternative-id":["10.1145\/3379444"],"URL":"https:\/\/doi.org\/10.1145\/3379444","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,17]]},"assertion":[{"value":"2019-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}