2020
DOI: 10.1109/lcomm.2019.2956033
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Automatic Discovery Protocol for OpenFlow-Based Software Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Link Discovery Protocols: All of the existing security frameworks against topology poisoning consider the OFDP. Researchers proposed some other link discovery protocols, OFDPv2 [33], softdp [34], SLDP [35], and LADP [36], to provide more efficient and secure link discovery in SDN. These discovery protocols explore security against link fabrication attacks and flooding attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Link Discovery Protocols: All of the existing security frameworks against topology poisoning consider the OFDP. Researchers proposed some other link discovery protocols, OFDPv2 [33], softdp [34], SLDP [35], and LADP [36], to provide more efficient and secure link discovery in SDN. These discovery protocols explore security against link fabrication attacks and flooding attacks.…”
Section: Related Workmentioning
confidence: 99%
“…This feature is covered for SDN-only networks by OFDP [3] or advanced solutions such as TEDP [4], eTDP [8]. Jia et al [9] focused on improving its scalability and performance, which is a key issue in the field [10]. In the case of hybrid SDN networks, in which SDN and other devices coexist, some works try to infer the existence and connectivity of legacy devices (devices before the definition of the SDN architecture with distributed functionalities).…”
Section: Related Workmentioning
confidence: 99%
“…Jia et al [37] introduced the Lightweight Automatic Discovery Protocol (LADP) to discover the network topology. The controller generates a random number added to the AUTH TLV of the LDAP frame, which is used for authorisation to pass the controller.…”
Section: Existing Solutions and Analysismentioning
confidence: 99%