control of network and flexibility. It is mainly connected with open flow protocol and ODIN V2
for wireless communication. Its architecture is central, agile and programmatically
configured. This paper presents a security analysis that enforces the protection of GUI by
requiring authentication, SSL/TLS integration and logging/security audit services. The role
based authorization FortNOX and ciphers like AES and DES will be used for encryption of …