Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 8728424, 11 pages
https://doi.org/10.1155/2018/8728424
Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

1College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China
2Tongfang Computer Co., Ltd., Wuxi 214000, China

Correspondence should be addressed to Wan Tang; nc.ude.ceucs@nawgnat

Received 26 January 2018; Revised 1 May 2018; Accepted 21 May 2018; Published 2 July 2018

Academic Editor: Sudarshan Guruacharya

Copyright © 2018 Ximin Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Chen, Y. Qian, S. Mao, W. Tang, and X. Yang, “Software-defined mobile networks security,” Mobile Networks and Applications, vol. 21, no. 5, pp. 729–743, 2016. View at Publisher · View at Google Scholar
  2. D. Kreutz, F. M. V. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, “Software-defined networking: a comprehensive survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. M. R. Bashir and A. Q. Gill, “IoT enabled smart buildings: A systematic review,” in Proceedings of the 2017 Intelligent Systems Conference (IntelliSys), pp. 151–159, London, UK, September 2017. View at Publisher · View at Google Scholar
  4. M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, “A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT),” in Proceedings of the 6th International Conference on Internet Technologies and Applications, ITA 2015, pp. 219–224, Glyndŵr University, Wrexham, North Wales, UK, September 2015. View at Scopus
  5. X. w. Wu, E. H. Yang, and J. Wang, “Lightweight security protocols for the Internet of Things,” in Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–7, Montreal, Canada, October 2017. View at Publisher · View at Google Scholar
  6. A. J. Stankovic, “Research directions for the internet of things,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 3–9, 2014. View at Publisher · View at Google Scholar
  7. M. Irshad, “A Systematic Review of Information Security Frameworks in the Internet of Things (IoT),” in Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1270–1275, Sydney, Australia, December 2016. View at Publisher · View at Google Scholar
  8. M. Rao, J. Coleman, and T. Newe, “An FPGA based reconfigurable IPSec ESP core suitable for IoT applications,” in Proceedings of the 2016 10th International Conference on Sensing Technology (ICST), pp. 1–5, Nanjing, China, November 2016. View at Publisher · View at Google Scholar
  9. S. K. Majhi and S. K. Dhal, “Placement of security devices in cloud data centre network: analysis and implementation,” Procedia Computer Science, vol. 78, pp. 33–39, 2016. View at Google Scholar · View at Scopus
  10. S. Namal, I. Ahmad, A. Gurtov, and M. Ylianttila, “Enabling secure mobility with OpenFlow,” in Proceedings of the 2013 Workshop on Software Defined Networks for Future Networks and Services, SDN4FNS 2013, pp. 1–5, Trento, Italy, November 2013. View at Scopus
  11. B. C. V. Camilo, R. S. Couto, and L. H. M. K. Costa, “Assessing the impacts of IPsec cryptographic algorithms on a virtual network embedding problem,” Computers & Electrical Engineering, July 2017. View at Google Scholar
  12. Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, “Home M2M networks: Architectures, standards, and QoS improvement,” IEEE Communications Magazine, vol. 49, no. 4, pp. 44–52, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Gupta, E. Katz-Bassett, L. Vanbever et al., “SDX: a software defined internet exchange,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 579-580, 2014. View at Publisher · View at Google Scholar
  14. J. Esch, “Software-defined networking: A comprehensive survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 10–13, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. IEEE 5G, “IEEE 5G and beyond technology roadmap white paper,” IEEE, https://5g.ieee.org/images/files/pdf/ieee-5g-roadmap-white-paper.pdf.
  16. V. H. F. Tafreshi, E. Ghazisaeedi, H. Cruickshank, and Z. Sun, “Integrating IPsec within OpenFlow architecture for secure group communication,” ZTE Communications, vol. 12, no. 2, pp. 41–49, 2014. View at Google Scholar
  17. S. Samoui, I. El Bouabidi, M. S. Obaidat, F. Zarai, K. F. Hsiao, and L. Kamoun, “Improved IPSec tunnel establishment for 3GPP-WLAN interworking,” International Journal of Communication Systems, vol. 28, no. 6, pp. 1180–1199, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. A. A. Al-Khatib and R. Hassan, “Impact of IPSec protocol on the performance of network real-time applications: a review,” International Journal of Network Security, vol. 19, pp. 800–808, 2017. View at Google Scholar
  19. C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, “Internet key exchange protocol Version 2 (IKEv2) RFC 7296,” 2014, https://tools.ietf.org/html/rfc7296. View at Publisher · View at Google Scholar
  20. StrongSwan, https://www.strongswan.org/.