A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture

K Kaur, V Mangat, K Kumar - Computer Networks, 2022 - Elsevier
Abstract Nowadays, Network Function Virtualization (NFV) is a growing and powerful
technology in the research community and IT world. Traditional computer networks consist of …

[HTML][HTML] Next generation of SDN in cloud-fog for 5G and beyond-enabled applications: Opportunities and challenges

E Ahvar, S Ahvar, SM Raza, J Manuel Sanchez Vilchez… - Network, 2021 - mdpi.com
In recent years, the number of objects connected to the internet have significantly increased.
Increasing the number of connected devices to the internet is transforming today's Internet of …

[HTML][HTML] Machine learning for physical layer in 5G and beyond wireless networks: A survey

J Tanveer, A Haider, R Ali, A Kim - Electronics, 2021 - mdpi.com
Fifth-generation (5G) technology will play a vital role in future wireless networks. The
breakthrough 5G technology will unleash a massive Internet of Everything (IoE), where …

Privacy-Preserving and Security in SDN-Based IoT: A Survey

H Ahmadvand, C Lal, H Hemmati, M Sookhak… - IEEE …, 2023 - ieeexplore.ieee.org
In recent years, the use of Software Defined Networking (SDN) has increased due to various
network management requirements. Using SDN in computer network applications has …

[HTML][HTML] Network intrusion detection in software defined networking with self-organized constraint-based intelligent learning framework

A Bhardwaj, R Tyagi, N Sharma, A Khare… - Measurement …, 2022 - Elsevier
With the advent of internet and communication system, a huge number of opportunities have
been presented to humans, however, its vision will not be easy and comfortable. Instead the …

Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks

ES Babu, A Barthwal, R Kaluri - Computer Communications, 2023 - Elsevier
The 5th generation 5G technology, also known as the 2020 telecommunications system,
represents the next exciting phase of the evolution of telecommunications, with the recent …

[HTML][HTML] SDN as a defence mechanism: a comprehensive survey

B Ayodele, V Buttigieg - International Journal of Information Security, 2024 - Springer
Investing in cybersecurity is increasingly considered a significant area and aspect a
business or organisation should seriously consider. Some of these security solutions are …

Service Function Chaining security survey: Addressing security challenges and threats

M Pattaranantakul, C Vorakulpipat, T Takahashi - Computer Networks, 2023 - Elsevier
Abstract Service function chaining (SFC) is a trending paradigm and it has attracted
considerable attention from both the industry and academia because of its potential to …

[HTML][HTML] Blockchain systems in embedded internet of things: Systematic literature review, challenges analysis, and future direction suggestions

M Darbandi, HMR Al-Khafaji, SH Hosseini Nasab… - Electronics, 2022 - mdpi.com
Internet of Things (IoT) environments can extensively use embedded devices. Without the
participation of consumers; tiny IoT devices will function and interact with one another, but …

Designing an evaluation framework for iot environmental monitoring systems

T Kozlowski, O Noran, J Trevathan - Procedia Computer Science, 2023 - Elsevier
Environmental monitoring systems have been evolving dynamically to embrace modern
Internet of Things (IoT) technology in the last decade. Despite this progress there are …