2019
DOI: 10.1109/mcom.001.1900060
|View full text |Cite
|
Sign up to set email alerts
|

Secured Communication Channels in Software-Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…(1) During the SIP call process, the calling and called SIP terminals obtain the address information of the media channel [1] and the start time of the RTP media stream for this call by parsing key signaling such as INVITE and 200 OK. The address information of the media channel mainly includes the IP addresses of the calling parties, the negotiated RTP media stream port information, etc;…”
Section: Analysis Of Media Security Implementation Processmentioning
confidence: 99%
“…(1) During the SIP call process, the calling and called SIP terminals obtain the address information of the media channel [1] and the start time of the RTP media stream for this call by parsing key signaling such as INVITE and 200 OK. The address information of the media channel mainly includes the IP addresses of the calling parties, the negotiated RTP media stream port information, etc;…”
Section: Analysis Of Media Security Implementation Processmentioning
confidence: 99%
“…While authors in [21] developed a hybrid strategy to protect communications between 5G network slices in distinct public cryptosystems, and two heterogeneous cipher schemes to achieve reciprocal communications between the public key infrastructure (PKI) and Certificate Less Public Key Cryptography (CLC) environments. The authors in [22] introduced a security solution to address security problems related to data exchange in software-defined networks. Where proposed that the TLS use of protocol between the SDN nodes to provide adequate security for communication channel.…”
Section: B Proxy Mobile Ipv6mentioning
confidence: 99%
“…Given its complexity, many operators dispense with the use of TLS in switches [6], or in some controllers, the security configuration in HTTP headers is omitted [209]. Noting these drawbacks, there are solutions to reducing the workload for administrators and to provide them solutions for enabling or disabling TLS [210].…”
Section: ) Configurationmentioning
confidence: 99%