2020
DOI: 10.1016/j.future.2017.12.013
|View full text |Cite
|
Sign up to set email alerts
|

SDN-assisted efficient LTE-WiFi aggregation in next generation IoT networks

Abstract: Kashif (2017)SDN-assisted efficient LTE-WiFi aggregation in next generation IoT networks. Future Generation Computer Systems. pp. 1-11.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 36 publications
0
17
0
1
Order By: Relevance
“…7 and Fig. 8 show the average throughput and latency values of users when connecting the user with WiFi, LTE, both LTE and WiFi [13,41] and the proposed IR-DON architecture. When users with different non-safety application traffic need a network connection, they will automatically get connected to any one of the network based on their application type.…”
Section: Performance Analysismentioning
confidence: 99%
“…7 and Fig. 8 show the average throughput and latency values of users when connecting the user with WiFi, LTE, both LTE and WiFi [13,41] and the proposed IR-DON architecture. When users with different non-safety application traffic need a network connection, they will automatically get connected to any one of the network based on their application type.…”
Section: Performance Analysismentioning
confidence: 99%
“…On the other hand, if the TCAM size is greater, then the concurrent method is used to find the attacker. A framework for detecting and mitigating DDoS using sFlow and Open-Flow is implemented [24]. This framework works with the constraint that there can be only a single application session for an HTTP request from a single IP address.…”
Section: Related Workmentioning
confidence: 99%
“…A considerable volume of research is reported on the authentication [5,[35][36][37][38][39][40][41]48] and on key agreement [18,[42][43][44][45][46] process to overcome the security gap that needs improvement in the recently proposed symmetric [13], and asymmetric security solutions [17]. Machine learning based authentication [2,4,46] and aggregation [47] is proposed to overcome the security flaws in the dynamic environments. Various security flaws in EPS-AKA are addressed in the literature.…”
Section: Related Workmentioning
confidence: 99%
“…3. The EPC framework includes LTE radio base stations (eNB) [31,47] that connect to the control plane components such as > TII-17-2276 < 4 MME, User Plane Gateways such as Packet Data Network Gateway (PDN-GW) & Serving GW (SGW). The MME acts as a Key Distributor (KD) [3][4][5][6][7][8][9] in the LTE.…”
Section: The Lte Architecture With Ipg-akamentioning
confidence: 99%