2019
DOI: 10.1109/mcom.001.1900056
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Protocol Software-Defined Networking Solution for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…Atomic SDN [31] transmits the signaling traffic in a more efficient, fast, and isolated way from the other processes, using synchronous flooding mechanisms but due to the different types of flows it becomes complex, since it needs an algorithm for each type. A lot of research in SD-WSN has been focused on routing optimization and data flow control, but other aspects such as topology control can be improved, as it has been done in [32]. In [28], SD-WISE is proposed, an SDN proposal for WSN that improves the definition of flow rules, where it is possible to analyze any byte of the package unlike the previous frameworks that were limited to analyzing specific fields as in wired networks.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Atomic SDN [31] transmits the signaling traffic in a more efficient, fast, and isolated way from the other processes, using synchronous flooding mechanisms but due to the different types of flows it becomes complex, since it needs an algorithm for each type. A lot of research in SD-WSN has been focused on routing optimization and data flow control, but other aspects such as topology control can be improved, as it has been done in [32]. In [28], SD-WISE is proposed, an SDN proposal for WSN that improves the definition of flow rules, where it is possible to analyze any byte of the package unlike the previous frameworks that were limited to analyzing specific fields as in wired networks.…”
Section: Background and Motivationmentioning
confidence: 99%
“…[122] 2019 × × × Jinke Ren et al [123] 2019 × × × × × Kim et al [6] 2018 × × × Grasso and Schembra [49] 2018 × × × × Alextian et.al [124] 2018 × × × × J. Cabrera et al [125] 2018 × Dmitry et al [126] 2018 × × × × Y. Xiao et al [127] 2018 × × × × × Ateya e al. [128] 2018 × × S. Troia et al [129] 2018 × × × × C. Grasso et al [49] 2018 × × × × × Li et al [130] 2018 × × × × M. Gharbaoui et al [131] 2018 × × × Popovski et al [47] 2018 × × × Chatras et al [132] 2017 × × × × Yi-Wei Ma et al [133] 2017 × × × T. Theodorouan et al [134] 2017 × × × × × K. Wang et al [135] 2017 × × × × × Ateya et al [136] 2017 × × × × Feng et al [137] 2017 × × × × Pilz et al [138] 2016 × × × Athmiya et al [139] 2016 × × × × × Intharawijitr et al [140] 2016 × × × × Simsek et al [141] 2016 Maier et al [8] 2016 Tong et al [142] 2016 × × × × N. Truong et al [143] 2015 × × × P. Iovanna et al [144] 2015 × × × × D. Szabo et al [145] 2015 × × × F. Bonomi et al [146] 2011 × × × × × Cuervo et al [147] 2010 × × × × × Furthermore, at the wireless edge, 5th-generation mobile communication systems are essential to support the TI. A research project has been carried out at the Mobile and wireless communications Enablers for the Twenty-twenty Information Society (METIS) [61] along with the telecommunication industry Next-Generation Mobile Networks (NGMN) alliance [148] regarding the early evaluation of 5G scenarios.…”
Section: The Potential Of the Tactile Internetmentioning
confidence: 99%
“…In numericalization, non-numeric features are converted into numeric features by using encoding and in normalization, features are scaled i.e. the value of every feature is mapped to [0,1] range. In the feature selection step, optimal features are selected a given to the training of the neural network.…”
Section: Sdn Based Intrusion Detection System Using Ml/dlmentioning
confidence: 99%