{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:56Z","timestamp":1740141776267,"version":"3.37.3"},"reference-count":24,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Beijing Key Laboratory of Trusted Computing","award":["4162006"],"award-info":[{"award-number":["4162006"]}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["4162006"],"award-info":[{"award-number":["4162006"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2016,3,1]]},"abstract":"<jats:p> Software Defined Network (SDN) architecture has been widely used in various application domains. Aiming at the authentication and security issues of SDN architecture in autonomous decentralized system (ADS) applications, securing the mutual trust among the autonomous controllers, we combine trusted technology and SDN architecture, and we introduce an authentication protocol based on SDN architecture without any trusted third party between trusted domains in autonomous systems. By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. Our work fills the gap of mutual trust between different trusted domains and provides security foundation for interaction between different trusted domains. <\/jats:p>","DOI":"10.1155\/2016\/5327949","type":"journal-article","created":{"date-parts":[[2016,3,16]],"date-time":"2016-03-16T21:02:23Z","timestamp":1458162143000},"page":"5327949","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System"],"prefix":"10.1177","volume":"12","author":[{"given":"Ruikang","family":"Zhou","sequence":"first","affiliation":[{"name":"China Electronics Standardization Institute, Beijing 100007, China"},{"name":"College of Computer Science, Beijing University of Technology, Beijing 100124, China"},{"name":"Beijing Key Laboratory of Trusted Computing, Beijing 100124, China"},{"name":"National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing 100124, China"}]},{"given":"Yingxu","family":"Lai","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing 100124, China"},{"name":"Beijing Key Laboratory of Trusted Computing, Beijing 100124, China"},{"name":"National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing 100124, China"}]},{"given":"Zenghui","family":"Liu","sequence":"additional","affiliation":[{"name":"Automation Engineering Institute, Beijing Polytechnic, Beijing 100176, China"}]},{"given":"Yinong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ 85287, USA"}]},{"given":"Xiangzhen","family":"Yao","sequence":"additional","affiliation":[{"name":"China Electronics Standardization Institute, Beijing 100007, China"}]},{"given":"Jiezhong","family":"Gong","sequence":"additional","affiliation":[{"name":"China Electronics Standardization Institute, Beijing 100007, China"}]}],"member":"179","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"key":"B1-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/sose.2010.52"},{"key":"B2-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/sose.2010.14"},{"key":"B3-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2010.128"},{"key":"B4-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2015.47"},{"key":"B5-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1504\/IJCCBS.2011.038966"},{"key":"B6-2016-5327949","volume-title":"Service-Oriented Computing and Web Software Integration","author":"Chen Y.","year":"2015","edition":"5"},{"volume-title":"Proceedings of the 15th USENIX Security Symposium","author":"Casado M.","key":"B7-2016-5327949"},{"key":"B8-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282382"},{"key":"B9-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2011.6134465"},{"first-page":"151","volume-title":"Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN '13)","author":"Benton K.","key":"B10-2016-5327949"},{"key":"B11-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1145\/2556610.2556621"},{"key":"B12-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"B13-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/ColComCon.2014.6860403"},{"key":"B15-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491189"},{"key":"B16-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"B18-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12459-4_15"},{"key":"B19-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/ias.2009.320"},{"key":"B20-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/icst.2011.42"},{"key":"B21-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1109\/mines.2009.111"},{"key":"B22-2016-5327949","series-title":"Specification Version, 1","volume-title":"Main Part 1: Design Principles","author":"TCG TPM","year":"2003"},{"first-page":"187","volume-title":"Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications (WPMC '12)","author":"Mahalle P. N.","key":"B23-2016-5327949"},{"key":"B24-2016-5327949","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.014"},{"key":"B25-2016-5327949","volume":"5","author":"Liu J.","year":"2007","journal-title":"Journal on Communications"},{"issue":"8","key":"B26-2016-5327949","first-page":"1271","volume":"29","author":"Huaxi P.","year":"2006","journal-title":"Journal of Computers"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2016\/5327949","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2016\/5327949","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2016\/5327949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T22:13:27Z","timestamp":1620252807000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2016\/5327949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,1]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,3,1]]}},"alternative-id":["10.1155\/2016\/5327949"],"URL":"https:\/\/doi.org\/10.1155\/2016\/5327949","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2016,3,1]]}}}