[HTML][HTML] Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification

S Pradeep, YK Sharma, UK Lilhore, S Simaiya… - Scientific Reports, 2023 - nature.com
Software-defined networking (SDN) has significantly transformed the field of network
management through the consolidation of control and provision of enhanced adaptability …

[HTML][HTML] Semi-empirical satellite-to-ground quantum key distribution model for realistic receivers

AV Khmelev, EI Ivchenko, AV Miller, AV Duplinsky… - Entropy, 2023 - mdpi.com
Satellite-based link analysis is valuable for efficient and secure quantum communication,
despite seasonal limits and restrictions on transmission times. A semi-empirical quantum …

[HTML][HTML] Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption

N Wang, X Tian, X Zhang, S Lin - Photonics, 2023 - mdpi.com
In quantum secure multi-party summation protocols, some attackers can impersonate
legitimate participants in the summation process, and easily steal the summation results …

From strings to streams: A multi-period analysis of qkd over eons, showcasing multi-band vs. multi-fiber solutions

MR Dibaj, P Mehdizadeh… - 2023 33rd …, 2023 - ieeexplore.ieee.org
Quantum key distribution over optical networks has been noted as a state-of-the-art
approach to next-generation secure communication. We propose two approaches to …

Artificial Intelligence and Quantum Synergies in Trust-Enhanced Consumer Applications for Software Defined Networks

KA Awan, IU Din, A Almogren… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Software Defined Networks (SDN) have revolutionized multimedia communication systems
with their dynamic resource allocation and load balancing capabilities. However, ensuring …

Research and application of automatic mapping method of distribution network protection power supply based on knowledge graph and graph convolution network

Y Wang, L Mo, W Wang, J Wei… - International Journal of …, 2024 - academic.oup.com
This study aims to propose an automatic mapping method for distribution network protection
based on knowledge graph (KG) and graph convolution network technology and applies it to …

mQUIET: Maximum Quantum Communication Network Transmission Under Reliability Constraint

W An, Y Han, Y Ding, H Xu, J Wang… - 2024 IEEE Wireless …, 2024 - ieeexplore.ieee.org
Quantum communications using entangled photons as qubits offer a promising approach to
quantum key distribution, enhancing network security. However, establishing successful …

Challenges and Outcomes of Combining Machine Learning with Software-Defined Networking for Network Security and management Purpose: A Review

N Bilal, S Askar, K Muheden - Indonesian Journal of Computer Science, 2024 - 3.8.6.95
Current research in data dissemination in Vehicular Ad Hoc Networks (VANETs) has
examined different approaches and frameworks to enhance the effectiveness and …

Challenges and Opportunities in Implementing Quantum-Safe Key Distribution in IoT Devices

MA Khan, D Puri - 2024 3rd International Conference for …, 2024 - ieeexplore.ieee.org
In the era of ubiquitous integration of Internet of Things (IoT) devices and the extensive
adoption of cloud computing, ensuring the security of data transmission has assumed …

Enhancing Cloud IoT Security With Blockchain and SDN

U Kumaran, T Swetha, I Sharma… - 2024 International …, 2024 - ieeexplore.ieee.org
In the fast changing world of cloud based internet of things (IoT) eco-systems, secure
connectivity between devices and cloud services is vital. On the other hand, the rising Man …