<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd"> 
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="review-article" dtd-version="1.1"> 
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">52994</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2024.052994</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Review</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions</article-title>
<alt-title alt-title-type="left-running-head">Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions</alt-title>
<alt-title alt-title-type="right-running-head">Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Rahdari</surname><given-names>Ahmad</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-6">6</xref>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Jalili</surname><given-names>Ahmad</given-names></name>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Esnaashari</surname><given-names>Mehdi</given-names></name>
<xref ref-type="aff" rid="aff-3">3</xref>
</contrib>
<contrib id="author-4" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Gheisari</surname><given-names>Mehdi</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-4">4</xref><xref ref-type="aff" rid="aff-7">7</xref><xref ref-type="aff" rid="aff-8">8</xref><email>mehdi.gheisari61@gmail.com</email>
</contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western"><surname>Vorobeva</surname><given-names>Alisa A.</given-names></name>
<xref ref-type="aff" rid="aff-5">5</xref>
</contrib>
<contrib id="author-6" contrib-type="author">
<name name-style="western"><surname>Fang</surname><given-names>Zhaoxi</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-7" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Sun</surname><given-names>Panjun</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref><email>sunpanjun2008@163.com</email>
</contrib>
<contrib id="author-8" contrib-type="author">
<name name-style="western"><surname>Korzhuk</surname><given-names>Viktoriia M.</given-names></name>
<xref ref-type="aff" rid="aff-5">5</xref>
</contrib>
<contrib id="author-9" contrib-type="author">
<name name-style="western"><surname>Popov</surname><given-names>Ilya</given-names></name>
<xref ref-type="aff" rid="aff-5">5</xref>
</contrib>
<contrib id="author-10" contrib-type="author">
<name name-style="western"><surname>Wu</surname><given-names>Zongda</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-11" contrib-type="author">
<name name-style="western"><surname>Tahaei</surname><given-names>Hamid</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<aff id="aff-1"><label>1</label><institution>Institute of Artificial Intelligence, Shaoxing University</institution>, <addr-line>Shaoxing</addr-line>, <country>312000, China</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Computer Engineering, Gonbad Kavous University</institution>, <addr-line>Gonbad-e Kavus, 49717-99151</addr-line>, <country>Iran</country></aff>
<aff id="aff-3"><label>3</label><institution>Faculty of Computer Engineering, K. N. Toosi University of Technology</institution>, <addr-line>Tehran, 196976-4499</addr-line>, <country>Iran</country></aff>
<aff id="aff-4"><label>4</label><institution>Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences</institution>, <addr-line>Chennai, 602105</addr-line>, <country>India</country></aff>
<aff id="aff-5"><label>5</label><institution>Secure Information Technologies Department, National Research University ITMO</institution>, <addr-line>St. Petersburg</addr-line>, <country>197101, Russia</country></aff>
<aff id="aff-6"><label>6</label><institution>School of Electrical and Computer Engineering, Shiraz University</institution>, <addr-line>Shiraz, 71946&#x2013;84334</addr-line>, <country>Iran</country></aff>
<aff id="aff-7"><label>7</label><institution>Department of Computer Science and Engineering, Islamic Azad University</institution>, <addr-line>Damavand</addr-line>, <country>1477893855, Iran </country></aff>
<aff id="aff-8"><label>8</label><institution>Department of R&#x0026;D, Shenzhen BKD Co., Ltd.</institution>, <addr-line>Shenzhen</addr-line>, <country> 518000, China</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Authors: Mehdi Gheisari. Email: <email>mehdi.gheisari61@gmail.com</email>; Panjun Sun. Email: <email>sunpanjun2008@163.com</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2024</year></pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>15</day>
<month>8</month>
<year>2024</year></pub-date>
<volume>80</volume>
<issue>2</issue>
<fpage>2511</fpage>
<lpage>2533</lpage>
<history>
<date date-type="received">
<day>21</day>
<month>4</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>26</day>
<month>6</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2024 Rahdari et al.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Rahdari et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_52994.pdf"></self-uri>
<abstract>
<p>Software-Defined Networking (SDN) represents a significant paradigm shift in network architecture, separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment. Concurrently, the Internet of Things (IoT) connects numerous devices to the Internet, enabling autonomous interactions with minimal human intervention. However, implementing and managing an SDN-IoT system is inherently complex, particularly for those with limited resources, as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration. The findings of this study underscore the primary security and privacy challenges across application, control, and data planes. A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy protection. Recent investigations have explored cutting-edge methods, such as leveraging blockchain for transaction recording to enhance security and privacy, along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Moreover, the analysis indicates that encryption and hashing techniques are prevalent in the data plane, whereas access control and certificate authorization are prominently considered in the control plane, and authentication is commonly employed within the application plane. Additionally, this paper outlines future directions, offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Security</kwd>
<kwd>privacy-preserving</kwd>
<kwd>software-defined network</kwd>
<kwd>internet of things</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>National Natural Science Foundation of China</funding-source>
<award-id>62341208</award-id>
</award-group>
<award-group id="awg2">
<funding-source>Natural Science Foundation of Zhejiang Province</funding-source>
<award-id>LY23F020006</award-id>
<award-id>LR23F020001</award-id>
</award-group>
<award-group id="awg3">
<funding-source>Islamic Azad University</funding-source>
<award-id>133713281361</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>The Internet of Things (IoT) encompasses a framework of computing devices, objects, mechanical and electronic machines, animals, and humans equipped with distinctive identifiers, facilitating data transmission within the network without the need for direct connections between them [<xref ref-type="bibr" rid="ref-1">1</xref>]. The SDN paradigm aims to simplify network management by separating control and data planes. The SDN architecture initiates changes in IoT network communication patterns, thus shaping a new approach for powering IoT networks. With a significant amount of data in these systems, efficient traffic management and load balancing reduce the additional effects of data-flow generation. Implementing dynamic traffic management enables operators to independently monitor and coordinate bandwidth fluctuations, which is particularly advantageous for global IoT service providers anticipating exponential growth in both the number of IoT devices and the associated data. The inherent capabilities of SDN, including automation, resource provisioning, programmability, and coordination, can provide substantial value in an IoT environment [<xref ref-type="bibr" rid="ref-2">2</xref>]. Software-driven analysis and traffic control by SDN can be applied to IoT for efficient traffic management. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> illustrates the broad concept of an SDN-enabled IoT system, along with an SDN architecture.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>SDN-enabled IoT architecture</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_52994-fig-1.tif"/>
</fig>
<p>In SDN architecture, three planes exist. The lowest one is the data plane, housing SDN-enabled switches, functioning solely as packet forwarders without involvement in decision-making. Control plane, encompassing the controller, handles routing decisions and is responsible for forming routing rules upon request from the data plane. Additionally, the controller is responsible for making various decisions regarding data packets. The third plane incorporates an application programming interface that hosts applications for controlling the network. The link between the application plane and the control plane is termed the northbound interface, while the connection between the control plane and the data plane is known as the southbound interface [<xref ref-type="bibr" rid="ref-3">3</xref>]. Communication within the southbound interface is governed by protocols such as OpenFlow [<xref ref-type="bibr" rid="ref-4">4</xref>], which has become the standard since its inception. Typically, packets are routed according to predefined flow rules listed in the flow table on an OpenFlow enabled switch. The inputs to these flow tables include actions, statistics, and match fields. As can be guessed, the actions field determines the performance of each packet, the statistics field tracks the packets matching each flow entry, and the matching field analyze the received packets.</p>
<p>Ensuring the secrecy of devices and networks is crucial to accommodate diverse devices, vendors, and users on a unified platform [<xref ref-type="bibr" rid="ref-5">5</xref>]. SDN enhances security in IoT deployments by providing centralized control, dynamic segmentation, policy-based access control, and deep visibility into network traffic, thereby improving the overall resilience of IoT networks against cyber threats [<xref ref-type="bibr" rid="ref-6">6</xref>,<xref ref-type="bibr" rid="ref-7">7</xref>]. However, challenges still persist in SDN-IoT, primarily stemming from evolving hacker capabilities [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>]. This paper furnishes current insights into the ongoing research developments on security and privacy challenges in SDN-enabled IoT systems, along with approaches aimed at protecting and ensuring the stability of these systems. The resilience and integrity of SDN-enabled IoT environments against dynamic cyber threats requires a comprehensive security strategy, including device security, network infrastructure protection, data privacy, and continuous monitoring implementation.</p>
<sec id="s1_1">
<label>1.1</label>
<title>Summary of Contributions</title>
<p>The contributions outlined in this review paper encompass the following:
<list list-type="alpha-upper">
<list-item><p>Analyzing and discussing the core security and privacy challenges faced by SDN-enabled IoT systems, along with their underlying causes.</p></list-item>
<list-item><p>Exploring the main security attacks in SDN-enabled IoT and outlining the solutions adopted by researchers and industry professionals.</p></list-item>
<list-item><p>Mapping out a clear trajectory and identifying research challenges in this domain that merit attention for future exploration.</p></list-item>
</list></p>
</sec>
<sec id="s1_2">
<label>1.2</label>
<title>Organization</title>
<p><xref ref-type="sec" rid="s2">Section 2</xref> reviews existing surveys on SDN-IoT security and emphasizes differences with them. <xref ref-type="sec" rid="s3">Section 3</xref> presents the categorization of literature on the security and privacy of SDN-IoT, highlighting key research contributions in this domain. In <xref ref-type="sec" rid="s4">Section 4</xref>, the Analytical Questions (AQs) used to identify and analyze literature information is initially introduced, followed by the presentation of research outcomes in a classification table and the discussion. Finally, <xref ref-type="sec" rid="s5">Section 5</xref> concludes this paper.</p>
</sec>
</sec>
<sec id="s2">
<label>2</label>
<title>Existing Surveys on SDN-IoT Security</title>
<p>Numerous studies have extensively examined the security challenges related to IoT from an SDN perspective in the literature. In [<xref ref-type="bibr" rid="ref-6">6</xref>], the authors tackled security concerns and proposed solutions for SDN-based IoT systems. This paper examined the defensive techniques employed in prior research to ensure adequate security and privacy in SDN-based IoT systems, offering a statistical analysis of the current literature. Multiple vulnerabilities and potential attacks within the IoT landscape have been outlined in [<xref ref-type="bibr" rid="ref-10">10</xref>]. This survey emphasized the critical importance of SDN security in safeguarding IoT systems and identified several areas where SDN and Network Function Virtualization (NFV) could be improved. It also shared insights gained from implementing SDN-based security methods in IoT environments and provided a comparison with conventional security measures. In [<xref ref-type="bibr" rid="ref-11">11</xref>], an examination of various SDN-based technologies was conducted, focusing on their relevance in meeting the demands of IoT across core, access, and data center networking domains. The discussion encompassed the benefits of SDN-based technologies in these areas, along with the challenges and prerequisites they entail within the scope of IoT applications. According to [<xref ref-type="bibr" rid="ref-12">12</xref>], various types of DDoS attacks were categorized into three layers of SDN. Thereupon, this study presented an analysis of recent progress in DDoS detection and mitigation research designed to address these vulnerabilities.</p>
<p>The survey in [<xref ref-type="bibr" rid="ref-7">7</xref>] provided an overview of several studies that leveraged SDN features within IoT-Fog networks to address security threats specific to the IoT-oriented fog layer. It examined IoT-Fog and SDN-based IoT-Fog networks, highlighting security threats in IoT-Fog environments. Additionally, it discussed the vulnerabilities and attacks prevalent in the fog layer and outlined the most common security defense mechanisms employed in IoT-Fog networks. Reference [<xref ref-type="bibr" rid="ref-13">13</xref>] also examined the benefits of software-defined fog computing networks, taking into account the security and privacy threats inherent to the fog computing network topology and exploring potential solutions to these issues. The authors of [<xref ref-type="bibr" rid="ref-14">14</xref>] considered blockchain technology as a primary solution for securing SDN environments, discussing both its benefits and drawbacks. They examined the practicality of combining the technologies of SDN and Blockchain to ensure the availability, confidentiality, and integrity of network infrastructure. In [<xref ref-type="bibr" rid="ref-15">15</xref>], the authors noted that previous research has examined numerous security aspects of IoT, SDN, and SDN-based IoT systems, alongside their solutions utilizing various technologies, including blockchain. The study concluded that the integration of blockchain with IoT and SDN effectively addresses many security challenges.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Differences from Existing Surveys</title>
<p>Unlike the aforementioned surveys, our research aims to offer a comprehensive classification of the common security and privacy challenges specific to SDN-enabled IoT systems. This study examines the underlying causes and highlights the most significant methods proposed by researchers and industry experts. Our objective is to evaluate the advanced approaches employed in recent research and determine the specific plane at which each method is most effective in addressing these challenges. Identifying the underlying causes of these security and privacy challenges is also vital, since recognizing and addressing these root causes serves as the foundational step toward implementing effective security solutions. With these distinctions in mind, our study centers on identifying existing gaps to provide a clear direction for future exploration. <xref ref-type="table" rid="table-1">Table 1</xref> provides a comparison of our work with other surveys in this field.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>The differences between our work and existing surveys in security of SDN-enabled IoT</title>
</caption>
<table frame="hsides" >
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Ref.</th>
<th>Target<break/>planes</th>
<th>Security</th>
<th>Privacy</th>
<th>Chall<break/>enges</th>
<th>Causes</th>
<th>Proposed solutions</th>
<th>Future directions</th>
<th>Description</th>
<th>Differences</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-6">6</xref>]</td>
<td>All</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>Review of security and privacy challenges in SDN-based IoT systems.</td>
<td>Our work also focuses on the causes of challenges, which<break/> is a foundational step toward<break/> implementing effective solutions and is not considered in this reference.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-7">7</xref>]</td>
<td>Fog</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>Survey of SDN applications in IoT-Fog networks.</td>
<td>This reference has focused on the fog layer,<break/> whereas our work reviews the challenges<break/> and existing security solutions fo<break/>r all layers and outlines<break/> future directions.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>None</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>Overview of how SDN and NFV can enhance IoT security.</td>
<td>This reference has examined security methods in SDN and their applications in the IoT. In contrast, our work focuses on reviewing previous studies on SDN-enabled IoT without addressing specific IoT issues.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-11">11</xref>]</td>
<td>None</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>Regular review of SDN-based IoT networks.</td>
<td>This reference has ignored security details while our work focuses on security and privacy challenges.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td>Control and data</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>Survey of DDoS attacks and security methods to prevent them in SDN.</td>
<td>Our work is much more comprehensive and this topic is only one part of it.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-13">13</xref>]</td>
<td>Fog</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>Review of security and privacy methods in SDN fog computing networks.</td>
<td>As mentioned, our work reviews the challenges and existing security solutions for all layers and outlines future directions.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-14">14</xref>]</td>
<td>None</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>Overview of utilizing blockchain in SDN.</td>
<td>Our work covers all the security and privacy approaches proposed in SDN-enabled IoT systems, including blockchain.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-15">15</xref>]</td>
<td>None</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2717;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>Survey of how blockchain integration with IoT and SDN can address security challenges.</td>
<td>As mentioned, our work examines all the security methods proposed in SDN-enabled IoT systems.</td>
</tr>
<tr>
<td>Our work</td>
<td>All</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>Comprehensive review of security and privacy challenges, their root causes, proposed solutions, and an outline of future directions.</td>
<td>Not applicable (NA).</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Classification of Works in the Security and Privacy of SDN-IoT</title>
<p>This section provides a comprehensive review of the current studies in the realm of security and privacy for SDN-enabled IoT systems. The existing literature in this domain is systematically categorized into various sections, encompassing themes such as SDN-based IoT architectures, securing IoT-Fog networks with SDN, the implementation of blockchain, the utilization of machine learning and deep learning, encryption, hashing, and secret sharing techniques, access control, authorization, authentication, and other pertinent topics.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Securing IoT with SDN Architecture</title>
<p>In [<xref ref-type="bibr" rid="ref-16">16</xref>], the researchers presented a secure architecture for SDN-enabled IoT networks, focusing on safeguarding both metadata and payload. This design incorporates a centralized SDN controller, which serves as a trusted entity for secure routing and efficient management of system performance, effectively countering diverse attacks, including those involving traffic analysis or inference. The secure SDN-enabled IoT framework [<xref ref-type="bibr" rid="ref-17">17</xref>] enhanced security through the SDN control plane, offering services such as access control, authentication, and lightweight encryption. In [<xref ref-type="bibr" rid="ref-18">18</xref>], an SDN-enabled IoT gateway was crafted to identify and address abnormal behaviors. This gateway, which monitors traffic to and from IoT devices, employs an adaptive mechanism for dynamic traffic pattern analysis, enabling the detection of malicious activities.</p>
<p>Expanding on this in [<xref ref-type="bibr" rid="ref-19">19</xref>], a novel architecture for IoT with SDN was proposed, aiming to establish and secure wired and wireless network infrastructures, encompassing Ad-Hoc networks and diverse network objects. In [<xref ref-type="bibr" rid="ref-20">20</xref>], SDN features like centralized logical control, traffic analysis, and dynamic flow management in remote switches were leveraged for the identification of malicious flows. Addressing security concerns, reference [<xref ref-type="bibr" rid="ref-21">21</xref>] employed NFV to enhance security in SDN-enabled IoT, comprising three main components: physical layer, middle layer, and application layer. Moreover, the SDN-enabled IoT framework with NFV implementation [<xref ref-type="bibr" rid="ref-22">22</xref>] adopted a classic three-layer architecture (service, network, and sensing layers). This underscores the significance of planning a proficient-dispersed operating system using control plane visualization methods. This approach enables the centralized control and visibility of different IoT services to diverse users. To this end, in [<xref ref-type="bibr" rid="ref-23">23</xref>], a system model was introduced to optimize the integration of SDN with IoT networks, along with a strategy to counter man-in-the-middle threats targeting IoT devices.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Securing IoT-Fog Networks with SDN</title>
<p>Attacks on IoT-Fog systems focus on availability, eavesdropping, and gateway management. Through SDN integration, IoT-Fog can effectively enhance security measures and mitigate conventional cloud-related challenges effectively [<xref ref-type="bibr" rid="ref-7">7</xref>]. Accordingly, a study in [<xref ref-type="bibr" rid="ref-24">24</xref>] proposed an SDN-based fog computing approach for vehicular networks, focusing on core network functions. They also implemented encryption to ensure central security, and secure and reliable communication. A defense framework in [<xref ref-type="bibr" rid="ref-25">25</xref>] utilized SDN to combat IoT-based DDoS attacks in fog-assisted cyber-physical systems. This paper leveraged fog computing, incorporating distributed computational nodes, to decrease response latency. Additionally, reference [<xref ref-type="bibr" rid="ref-26">26</xref>] introduced a multi-objective optimization strategy to balance security and resource efficiency in SDN-based IoT-Fog networks. Lastly, the integration of fog and SDN to meet security needs was elaborated in [<xref ref-type="bibr" rid="ref-27">27</xref>].</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Implementation of Blockchain</title>
<p>In [<xref ref-type="bibr" rid="ref-28">28</xref>], the researchers integrated SDN and blockchain to address safety and privacy concerns within IoT systems enabled by SDN. They devised a routing protocol within the SDN controller specifically tailored for IoT gadgets. In [<xref ref-type="bibr" rid="ref-29">29</xref>], a decentralized entry to manipulate a mechanism based on blockchain for SDN-enabled IoT was proposed. Similarly, reference [<xref ref-type="bibr" rid="ref-30">30</xref>] applied SDN and blockchain innovations to improve the quality of present-day providers in shrewd transportation devices. They devised a fine, blockchain-based, completely secure power alternate gadget for electric-powered cars. In [<xref ref-type="bibr" rid="ref-31">31</xref>], the investigators leveraged the decentralized characteristics of a private blockchain to empower resource-constrained SDN controllers, facilitating the transparent configuration of flow rules for fog nodes and other devices within a fog-enabled IoT network. In addition, they advocated encrypting the data before their inclusion in blocks, thereby enhancing data security against unauthorized access. In [<xref ref-type="bibr" rid="ref-32">32</xref>], blockchain and SDN were utilized to bolster security of IoT through a proactive response, analysis, and traffic monitoring system. This system helps in identifying and mitigating DoS and DDoS attacks.</p>
<p>In [<xref ref-type="bibr" rid="ref-33">33</xref>], the synergy between blockchain and SDN was explored, with the authors addressing important demanding situations in IoT processing, including strength intake and real-time processing. In [<xref ref-type="bibr" rid="ref-34">34</xref>], the authors introduced a blockchain-primarily enabled architecture that applies a complementary collaboration and decentralized attack statistics switch among more than one SDN domain name. Moreover, reference [<xref ref-type="bibr" rid="ref-35">35</xref>] proposed a blockchain-enabled architecture that facilitates the collaborative and decentralized exchange of attack statistics across multiple SDN domains. In a look at [<xref ref-type="bibr" rid="ref-36">36</xref>], a fusion of blockchain along with SDN was employed to enhance the security level of existing IoT systems. Furthermore, in reference [<xref ref-type="bibr" rid="ref-37">37</xref>], the authors introduced a distributed SDN framework for IoT by integrating blockchain innovation. They presented a method for experimentally validating and updating rule tables, showcasing its effectiveness in terms of scalability, accuracy, and performance overhead. In [<xref ref-type="bibr" rid="ref-38">38</xref>], the authors advocated storing public keys and identities, and agreed with indices present-day IoT gadgets on a blockchain in an SDN-primarily enabled IoT network. Similarly, reference [<xref ref-type="bibr" rid="ref-39">39</xref>] introduced a secure IoT architecture leveraging blockchain technology. The implementation of this methodology is anticipated to improve the security level, performance, and functionality of NFV and
SDN.</p>
<p>In [<xref ref-type="bibr" rid="ref-40">40</xref>], the researchers suggested a lightweight and blockchain-enabled security framework tailored for SDN to empower IoT networks in 5G communication. Furthermore, reference [<xref ref-type="bibr" rid="ref-41">41</xref>] presented a layered hierarchical architecture designed to deploy an efficient SDN-IoT framework based on blockchain. Additionally, reference [<xref ref-type="bibr" rid="ref-42">42</xref>] suggested a decision-making method to decide who to trust in IoT networks and how to manage the flow of data in IoT networks more effectively through the integration of blockchain and SDN. Moreover, reference [<xref ref-type="bibr" rid="ref-43">43</xref>] employed a trust list mechanism that outlines the conveyance of trust in the midst of stakeholders in IoT, utilizing blockchains and SDN to control traffic in edge networks of IoT devices without human intervention. In addition, reference [<xref ref-type="bibr" rid="ref-44">44</xref>] tackled defenselessness within the trust relationship between the data and control planes in SDN-controlled IoT networks by proposing an edge computing-based blockchain as a service. The proposed solution offers flow verification using an efficient edge-distributed blockchain solution. Similarly, reference [<xref ref-type="bibr" rid="ref-45">45</xref>] introduced a blockchain-enabled method deployed in SDN setups to accommodate the proliferation of IoT devices. In [<xref ref-type="bibr" rid="ref-46">46</xref>], a novel approach was proposed to make IoT more secure using a combination of blockchain and SDN technology to find and stop attacks. Blockchain was utilized to improve the attack detection model.</p>
<p>Another study [<xref ref-type="bibr" rid="ref-47">47</xref>] delineated a method for routing within an SDN-IoT framework with blockchain innovation in order to enhance the privacy level. In [<xref ref-type="bibr" rid="ref-48">48</xref>], a lightweight blockchain-enabled authentication component was proposed, where the credentials of the sensors were securely embedded in the SDN controller, considering the latest constraints on IoT processing capabilities and energy consumption. Addressing security concerns, reference [<xref ref-type="bibr" rid="ref-49">49</xref>] utilized both proxy re-encryption and blockchain innovations to establish secure communication in SDN-enabled IoT environments. This strategic approach aims to mitigate risks, such as DDoS attacks and data breaches, by avoiding single points of failure. Furthermore, in [<xref ref-type="bibr" rid="ref-50">50</xref>], the authors proposed a new blockchain-enabled authentication approach to make it easier to switch between different cell phone towers in 5G networks without having to repeatedly log in. Eventually, reference [<xref ref-type="bibr" rid="ref-51">51</xref>] investigated a commercial IoT scenario involving numerous SDN controllers and presented a blockchain-enabled consensus algorithm to synchronize and gather network-wide perspectives surrounded by these distinct SDN controllers.</p>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Utilizing Machine Learning and Deep Learning</title>
<p>In [<xref ref-type="bibr" rid="ref-52">52</xref>], various anomaly detection classification algorithms were compared utilizing the same public dataset. The authors advocated for a new approach based on the Decision Tree algorithm, emphasizing its potential to decrease packet handling at the edge compared to a single classifier. In [<xref ref-type="bibr" rid="ref-53">53</xref>], the authors proposed an SDN-enabled IoT anomaly identification framework aimed at the early detection of abnormal behaviors and attacks by utilizing Multi-Layer Perceptron, K-Means, and Support Vector Machine. Moreover, reference [<xref ref-type="bibr" rid="ref-54">54</xref>] applied a machine learning method to detect DDoS attacks in an SDN-IoT controller. They added a machine learning tool to the controller and created a test area to pretend cyberattacks. Reference [<xref ref-type="bibr" rid="ref-55">55</xref>] proposed a detection approach utilizing learning algorithms and features from OpenFlow packets to recognize attack traffic in the data and control planes. Similarly, reference [<xref ref-type="bibr" rid="ref-56">56</xref>] introduced an SDN-enabled secure IoT system for the early identification and mitigation of abnormal behaviors and attacks. Machine learning was employed in the SDN controller to observe and learn how IoT devices behave. In [<xref ref-type="bibr" rid="ref-57">57</xref>], researchers presented a method for DDoS attack detection in SDN, focusing on data collection and the analysis of traffic types, particularly emphasizing data entropy.</p>
<p>In [<xref ref-type="bibr" rid="ref-58">58</xref>], the researchers presented a machine learning model coupled with SDN to better predict the extent to which network resources will be used and to improve sensor data delivery. They proposed a centralized SDN to counter network vulnerabilities in the midst of expanded sensors at minimum cost. In [<xref ref-type="bibr" rid="ref-59">59</xref>], an algorithm was presented to enhance secure routing in IoT by employing a system to make decisions about how to connect network components and transfer data based on machine learning and SDN. Furthermore, reference [<xref ref-type="bibr" rid="ref-60">60</xref>] introduced a multilayer classifier for DDoS attack identification by utilizing Support Vector Machine. The study in [<xref ref-type="bibr" rid="ref-61">61</xref>] presented machine learning techniques to detect and categorize low-rate collision flows in SDN-enabled 5G networks. They utilized Decision Tree, K-Means, and Feed Forward Neural Network algorithms for this purpose. Likewise, reference [<xref ref-type="bibr" rid="ref-62">62</xref>] utilized machine learning to detect and defend against DDoS attacks in IoT environments by integrating SDN controllers. An investigation into the impact of DDoS attacks on the controller layer in SDN and its system performance reduction was also conducted in [<xref ref-type="bibr" rid="ref-63">63</xref>].</p>
<p>Building on this understanding, a framework that is SDN-enabled and specifically tailored to implement deep learning procedures was introduced in [<xref ref-type="bibr" rid="ref-64">64</xref>]. The main objective of this framework is to protect the IoT environment from a range of cybersecurity threats, encompassing brute-force attacks, DDoS incidents, bot assaults, malware, and infiltration. Reference [<xref ref-type="bibr" rid="ref-65">65</xref>] introduced an improved Crow-look algorithm utilizing deep learning in an SDN-IoT-type network to reliably detect and classify cyberattacks. In [<xref ref-type="bibr" rid="ref-66">66</xref>], an SDN-based security mechanism was introduced to identify and mitigate DDoS attacks within IoT networks. This method involves utilizing a trained Multi-Layer Perceptron for attack detection, followed by the classification of detected attacks. Furthermore, reference [<xref ref-type="bibr" rid="ref-67">67</xref>] employed advanced deep learning strategies, such as Long Short-Term Memory (LSTM), to detect and mitigate the impact of DDoS attacks on SDN controllers, showcasing a commitment to robust security measures in the face of evolving cyber threats. Similarly, reference [<xref ref-type="bibr" rid="ref-68">68</xref>] introduced an architecture based on LSTM for efficient multiclass classification within SDN-enabled intrusion detection systems in IoT networks. The significance of privacy preservation was underscored in [<xref ref-type="bibr" rid="ref-69">69</xref>], where deep learning methodologies were employed to handle sensitive information more robustly. The authors of [<xref ref-type="bibr" rid="ref-70">70</xref>] introduced a deep reinforcement learning system for monitoring traffic in the SDN-IoT. The aim is to enhance the learning performance at edge nodes and enable detailed traffic analysis, including intrusion detection systems.</p>
<p>The efficiency of communication between controllers and switches in SDN-based networks was significantly enhanced in [<xref ref-type="bibr" rid="ref-71">71</xref>]. This enhancement contributes to elevating the system performance and user usability. Navigating the challenges of resource-constrained IoT scenarios, reference [<xref ref-type="bibr" rid="ref-72">72</xref>] employed deep learning techniques explicitly designed to identify threats while being mindful of the limitations imposed by resource constraints. In a medical IoT domain based on SDN, reference [<xref ref-type="bibr" rid="ref-73">73</xref>] implemented a deep learning approach to effectively identify and mitigate malware, contributing to the overall system&#x2019;s safety. Additionally, reference [<xref ref-type="bibr" rid="ref-74">74</xref>] utilized a deep learning classification method, specifically targeting anomaly identification in an IoT setting, taking into consideration the limitations associated with available resources. Reference [<xref ref-type="bibr" rid="ref-75">75</xref>] proposed a secure framework for SDN-based IoT, incorporating a system that uses Restricted Boltzmann Machines to detect intrusions. Finally, reference [<xref ref-type="bibr" rid="ref-76">76</xref>] presented a sophisticated intrusion prevention framework grounded in deep learning principles. This system is strategically designed to counteract DDoS attacks, brute-force attacks, and the incursion of malicious packets within an SDN environment.</p>
</sec>
<sec id="s3_5">
<label>3.5</label>
<title>Encryption, Hashing, and Secret Sharing Techniques</title>
<p>In [<xref ref-type="bibr" rid="ref-77">77</xref>], the authors analyzed various encryption algorithms, highlighting why existing algorithms are unsuitable for direct application in software-defined industrial IoT edge networks. Subsequently, they introduced a novel encryption algorithm tailored to this context. Meanwhile, reference [<xref ref-type="bibr" rid="ref-78">78</xref>] proposed a simplified handshake protocol aimed at reducing the computational burden on IoT devices in device-to-device communications based upon SDN. This protocol involves a controller making a secret key on its own, which is then encrypted and distributed to the both communicating IoT devices. Additionally, reference [<xref ref-type="bibr" rid="ref-79">79</xref>] presented an attribute-based encryption scheme designed to ensure secure data communication within an SDN industrial IoT communication model. Moreover, reference [<xref ref-type="bibr" rid="ref-80">80</xref>] proposed a novel approach to streamline the transport layer security handshake protocol based on SDN. Their method involves a controller that dynamically generates the premaster secret and distributes it to the IoT devices through an encrypted channel.</p>
<p>In [<xref ref-type="bibr" rid="ref-81">81</xref>], a secure multipath routing scheme focused on energy efficiency was suggested, incorporating a secret sharing scheme to bolster security while ensuring energy efficiency. Reference [<xref ref-type="bibr" rid="ref-82">82</xref>] presented a method for securing data transmission among IoT devices in smart cities. This approach combines a secret-sharing mechanism with SDN techniques to securely transport IoT data. Additionally, reference [<xref ref-type="bibr" rid="ref-83">83</xref>] introduced a secret-sharing-based distributed cloud system aimed at privacy protection within IoT environments. Moreover, reference [<xref ref-type="bibr" rid="ref-84">84</xref>] proposed a secure service path validation method that employs Batch Hashing and Tag Verification to improve the security of SDN-IoT systems. Likewise, reference [<xref ref-type="bibr" rid="ref-85">85</xref>] suggested a hash-based dispersed capacity methodology for Flow Tables within SDN-IoT Systems.</p>
</sec>
<sec id="s3_6">
<label>3.6</label>
<title>Access Control, Authorization, and Authentication</title>
<p>In response to the challenges in establishing reliable connections among high-speed IoT devices, reference [<xref ref-type="bibr" rid="ref-86">86</xref>] presented a novel privacy-preserving approach for IoT networks. This scheme utilizes mutual authentication across the certificate authorities. Drawing on the core attributes of SDN, reference [<xref ref-type="bibr" rid="ref-87">87</xref>] developed a simple process to authenticate IoT devices and secure network flows. In [<xref ref-type="bibr" rid="ref-88">88</xref>], a secure multifactor authentication protocol was proposed for healthcare services utilizing cloud-based SDN. Furthermore, reference [<xref ref-type="bibr" rid="ref-89">89</xref>] devised a dedicated SDN-based smart home communication scheme to ensure privacy. This scheme focuses on providing authentication for users and smart devices as well as privacy for data and user queries through lightweight authentication and searchable query protocols. Another study [<xref ref-type="bibr" rid="ref-90">90</xref>] offered an innovative and efficient handover authentication scheme based on SDN for utilizing versatile gadgets in computing within cyber-physical frameworks. Furthermore, reference [<xref ref-type="bibr" rid="ref-91">91</xref>] presented a secure authentication framework for SDN-IoT networks utilizing Bliss-B and Keccak-256 algorithms, whereas reference [<xref ref-type="bibr" rid="ref-92">92</xref>] proposed a secure access control scheme for SDN-based industrial IoT. Reference [<xref ref-type="bibr" rid="ref-93">93</xref>] also introduced a security architecture aimed at defining and enforcing security profiles within SDN-based IoT systems by employing an attribute-based access control approach. Similarly, reference [<xref ref-type="bibr" rid="ref-94">94</xref>] presented an access control mechanism based on SDN for collaborative networks between cloud and edge computing environments. Moreover, reference [<xref ref-type="bibr" rid="ref-95">95</xref>] suggested a role-based access control system enabled by SDN, coupled with a trust-based model to enhance virtual machine security within cloud environments.</p>
</sec>
<sec id="s3_7">
<label>3.7</label>
<title>Attacks and Other Security Challenges in SDN-IoT</title>
<p>An investigation into privacy protection within smart grids integrated with software-defined networks was detailed in [<xref ref-type="bibr" rid="ref-96">96</xref>]. This framework incorporates dual privacy measures and formulates a distributed privacy-optimization algorithm to minimize network costs. Similarly, reference [<xref ref-type="bibr" rid="ref-97">97</xref>] proposed an approach involving IP analysis and anomaly behaviors to detect DDoS attacks. In [<xref ref-type="bibr" rid="ref-98">98</xref>], the authors employed a method using OpenFlow to detect and prevent DDoS attacks by targeting malicious packets at switches before reaching the control panel. Additionally, reference [<xref ref-type="bibr" rid="ref-99">99</xref>] introduced an approach to mitigate DDoS threats through SDN, enabling the prediction of attack traffic drops and effective traffic mitigation measures. Damage mitigation and defense strategies against DDoS attacks were reviewed in [<xref ref-type="bibr" rid="ref-100">100</xref>], proposing a cost-effective approach to reduce controller burdens. Meanwhile, reference [<xref ref-type="bibr" rid="ref-101">101</xref>] suggested hybrid preventive defense methods that combine moving target defense tactics with cyber deception strategies to mislead potential attackers. The authors of [<xref ref-type="bibr" rid="ref-102">102</xref>] investigated the energy efficiency of anomaly detection by introducing dynamic strategy selection and a lightweight detection module.</p>
<p>In [<xref ref-type="bibr" rid="ref-103">103</xref>], researchers proposed a security solution to preemptively identify attacker-end hosts before the submission of flow requests to the SDN controller. The examination of DDoS attacks targeting the control plane was detailed in [<xref ref-type="bibr" rid="ref-104">104</xref>], with 5G as a benchmark for experiments. Another study [<xref ref-type="bibr" rid="ref-105">105</xref>], analyzed a Multi-Hop New Link attack and its prevention within a hybrid SDN environment. Exploration of abnormal behavior detection across various IoT programs, examining the relationship and impact of distributed rules within SDNs, was discussed in [<xref ref-type="bibr" rid="ref-106">106</xref>]. Reference [<xref ref-type="bibr" rid="ref-107">107</xref>] focused on traffic management in IoT environments, and predicted and monitored malicious traffic at IoT gateways. Furthermore, abnormality detection in diverse IoT applications, such as smart homes and healthcare, was addressed in [<xref ref-type="bibr" rid="ref-108">108</xref>], and the identification and mitigation of attack effects using SDN. In a related vein, reference [<xref ref-type="bibr" rid="ref-109">109</xref>] presented a roadmap for enhancing smart home security through SDN, and an extension of this approach to smart health applications, emphasizing edge processing, was detailed in [<xref ref-type="bibr" rid="ref-110">110</xref>]. A novel framework centered on certificate trust to mitigate Crossfire attacks through the utilization of SDN for IoT was introduced in [<xref ref-type="bibr" rid="ref-111">111</xref>].</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Discussion</title>
<p>The principal objective of this paper is to present comprehensive knowledge derived from the literature within the research field in an organized manner. Additionally, the paper serves the dual purpose of identifying extant research gaps and subsequently recognizing potential avenues for future researches. To achieve this, the methodology employed incorporates Analytical Questions (AQs).</p>
<p>This paper elucidates the following AQs, providing clear and concise answers to each:</p>
<p>AQ1: What are the predominant challenges facing the planes in SDN-enabled IoT that have been addressed in the literature?</p>
<p>AQ2: What are the principal causes of challenges mentioned in the literature?</p>
<p>AQ3: Which security and privacy methods have been implemented to overcome the challenges in SDN-enabled IoT applications?</p>
<p>AQ4: What are the identified research gaps and open questions that pave the way for future research directions?</p>
<p>This paper centers on data collection from selected studies, aligning with predefined AQs. Following a comprehensive analysis of the chosen papers, the classification results, based on the extracted data, provide answers to all the AQs. The summary of findings is depicted in <xref ref-type="table" rid="table-2">Table 2</xref>.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Summary of the security and privacy challenges and proposed solutions in SDN-enabled IoT</title>
</caption>
<table frame="hsides" >
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Ref.</th>
<th>Target planes</th>
<th>Challenges</th>
<th>Causes</th>
<th>Proposed solutions</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-16">16</xref>]</td>
<td>Data</td>
<td>Meta-data</td>
<td>Meta-data attack occurs due to traffic analysis or inference from data sent directly on a public channel.</td>
<td>Encrypting both payload and meta-data and employing the SDN controller as a dependable middle person to guarantee secure routing.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-18">18</xref>]</td>
<td>Control and data</td>
<td>DDoS</td>
<td>Resources are inaccessible due to malicious traffic.</td>
<td>Identifying abnormal behaviors and addressing them through measures such as blocking, forwarding, and implementing Quality of Service protocols.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-19">19</xref>]</td>
<td>Control</td>
<td>DoS</td>
<td>Using just one controller can result in a DoS.</td>
<td>Security policies are enforced and monitored through the use of multiple security controllers.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-21">21</xref>]</td>
<td>Control</td>
<td>Communication hijacking and intrusion</td>
<td>Weak authentication is the cause of the attack.</td>
<td>Putting software-defined storage and security into a control model that is software-based.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-26">26</xref>]</td>
<td>Control and data</td>
<td>DDoS</td>
<td>To interfere with the operation of computational nodes, a malicious node generates numerous half-open TCP connections.</td>
<td>Managing resources with the help of the combination of a multi-objective particle swarm optimization and fuzzy logic methods.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-27">27</xref>]</td>
<td>All</td>
<td>DoS and DDoS</td>
<td>The exponential growth of connected devices in IoT contributes to the escalation of attacks.</td>
<td>Integration of fog and SDN in IoT to fulfill security requirements.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-28">28</xref>]</td>
<td>Control</td>
<td>Network manipulating and policy enforcement</td>
<td>Hidden influences are imposed on users through the data interface by targeting and exploiting decision-making vulnerabilities.</td>
<td>SDN controllers and IoT gadgets are communicating using both private and public blockchains, along with an efficient authentication mechanism.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-31">31</xref>]</td>
<td>Application</td>
<td>App manipulation, accountability, and information leakage</td>
<td>The absence of authentication, and integration in SDN standards causes this to occur.</td>
<td>Taking advantage of the decentralized nature of a private blockchain and encrypting data before including it in blocks.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-32">32</xref>]</td>
<td>Application and control</td>
<td>DoS and DDoS</td>
<td>Malicious traffic, flow timeouts, and flow rules lead to these attacks.</td>
<td>Proactive traffic monitoring, analysis, and response systems are used to bolster security.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-35">35</xref>]</td>
<td>Control</td>
<td>DDoS</td>
<td>IoT networks can become part of a botnet without proper prevention.</td>
<td>Collaborative and decentralized exchange of attack statistics across multiple SDN domains is made possible by a blockchain-enabled architecture with distributed botnet detection.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-36">36</xref>]</td>
<td>Control and data</td>
<td>Flow rule conflicts</td>
<td>A malicious program changes the rules for how data is sent over the internet so that it can change the IP address of the data packets.</td>
<td>A novel method is being suggested to update the flow rule table, leveraging blockchain technology to securely authenticate the flow rule and validate a replica of the flow rule table.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>]</td>
<td>All</td>
<td>Privacy</td>
<td>Managing user privacy while simultaneously preventing various attacks at different planes within the SDN architecture poses significant challenges for the administrator.</td>
<td>Applying a distributed SDN architecture for IoT by integrating blockchain for updating and validating rule tables.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td>Application and control</td>
<td>DDoS</td>
<td>A major reason is the separation of the planes.</td>
<td>Storing the identities and public keys and recording the indicators of the current IoT devices on a blockchain.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-42">42</xref>]</td>
<td>Application and control</td>
<td>Internet-scale and DDoS</td>
<td>Failure to confirm the authenticity of IoT services, and bankruptcy to prevent unwanted traffic from devices leads to this attack.</td>
<td>Defining a trust distribution through the use of a trust list mechanism in blockchain.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-46">46</xref>]</td>
<td>Control and data</td>
<td>Flow rule conflicts</td>
<td>SDN logical centralization of controllers and global network overview increased the network communication security challenges.</td>
<td>A decentralized security architecture is utilized for dynamic updates to attack detection.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-47">47</xref>]</td>
<td>Control and data</td>
<td>Network manipulating</td>
<td>Serious concerns may arise due to malicious or unintentional interference with IoT data.</td>
<td>The incorporation of SDN security architecture and blockchain led to a new secure routing protocol with the cluster structure.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-48">48</xref>]</td>
<td>Application and control</td>
<td>Impersonation and spoofing</td>
<td>Perpetrators can execute these attacks using brute-force tactics owing to the limited number of credentials available.</td>
<td>Sensor credentials are stored within the SDN controller thanks to the introduction of a blockchain-based authentication mechanism that takes into account resource limitations.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-50">50</xref>]</td>
<td>All</td>
<td>Privacy</td>
<td>Inefficient authentication handover procedures could heighten the likelihood of encountering user privacy challenges.</td>
<td>Applying a blockchain-based authentication handover method, aiming to eliminate unnecessary reauthentication during repeated handovers between heterogeneous cells in 5G networks.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-52">52</xref>]</td>
<td>Control and data</td>
<td>Synthetic attack traffic</td>
<td>Due to the frequent absence of visibility and standardized management systems for updates, end devices become vulnerable when connected to the Internet.</td>
<td>Employing a Decision Tree-based machine learning approach to identify irregularities in the traffic of an IoT network interconnected via an SDN.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-55">55</xref>]</td>
<td>Control and data</td>
<td>DDoS</td>
<td>Detecting low-traffic DDoS attacks in SDN-IoT poses a greater challenge due to the distinct behaviors compared to traditional networks.</td>
<td>A detection approach utilizing learning algorithms and features from OpenFlow packets is presented to identify attack traffic.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-60">60</xref>]</td>
<td>Control</td>
<td>DDOS</td>
<td>The proliferation of diverse entities within the SDN escalates the threat of DDoS attacks, posing a significant danger to IoT systems.</td>
<td>Utilizing support vector machine as a multi-layer classifier for DDoS attack detection.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-61">61</xref>]</td>
<td>Control and data</td>
<td>Flow rule conflicts</td>
<td>When the flow table becomes overloaded and experiences abuse, a low-rate flow table is activated, leading to the installation of collision flow rules and the excessive consumption of existing flow table capacity.</td>
<td>Using Feed Forward Neural Network, K-Means, and Decision Tree algorithms to detect and categorize low-rate collision flows.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-64">64</xref>]</td>
<td>All</td>
<td>Benign, bot, DDoS, brute-force, and infiltration</td>
<td>The extensive connectivity and the diverse array of devices within SDN-IoT networks render them susceptible to various cyberattacks, leading to potential data breaches.</td>
<td>Devising a customized SDN solution empowered with deep learning techniques to safeguard the IoT ecosystem against various cybersecurity threats.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-67">67</xref>]</td>
<td>All</td>
<td>DDoS</td>
<td>The centralized controller in SDN serves as a single point of attack.</td>
<td>Employing deep learning methodologies to identify and mitigate the effects of DDoS attacks within an SDN controller.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-69">69</xref>]</td>
<td>All</td>
<td>Privacy</td>
<td>Network operators are hesitant to reveal intricate resource availability and network topology specifics, thus elevating the necessity for preserving privacy in service function chaining within a multi-domain scenario.</td>
<td>Utilizing a deep learning method in the authentication procedure to enhance privacy levels.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-72">72</xref>]</td>
<td>All</td>
<td>DDoS</td>
<td>The attacker takes into account resource limitations and gains control over an entire network by inundating it with a substantial volume of malicious traffic.</td>
<td>Using deep learning techniques to identify threats while being mindful of the limitations imposed by resource constraints.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-74">74</xref>]</td>
<td>All</td>
<td>DoS, brute-force, and botnet</td>
<td>The large number of users, along with the huge influx of data and the heterogeneity of devices, make detecting anomalies and attacks a difficult task.</td>
<td>A deep learning approach is utilized for anomaly detection.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-76">76</xref>]</td>
<td>All</td>
<td>DDoS, brute-force, and malicious packets</td>
<td>The OpenFlow SDN switch route the attacking traffic towards the victim hosts based on the preconfigured flow table.</td>
<td>A sophisticated intrusion detection grounded in deep learning principles is proposed to prevent the attacks.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-79">79</xref>]</td>
<td>Data</td>
<td>Meta-data</td>
<td>Lack of an effective design required for secure data communication to fulfill the scalable and flexible demands of generated data.</td>
<td>Applying an attribute-based encryption scheme designed to ensure secure data communication.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-81">81</xref>]</td>
<td>Data</td>
<td>Network manipulation, flow rule conflicts, and configuration errors</td>
<td>Insufficient security measures are in place while aiming to ensure energy efficiency.</td>
<td>Devising a secure multipath routing approach that incorporates a secret sharing scheme to bolster security while ensuring energy efficiency.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-83">83</xref>]</td>
<td>All</td>
<td>Privacy</td>
<td>The rapid growth of smart cities leads to a substantial increase in data volume, resulting in various challenges in cloud infrastructure, including privacy concerns.</td>
<td>Employing a secret sharing-based distributed cloud system aimed at privacy protection.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-86">86</xref>]</td>
<td>All</td>
<td>Privacy</td>
<td>The exponential growth of network devices is stretching the capabilities of access layers and introducing privacy concerns.</td>
<td>Using an SDN-based privacy scheme that leverages mutual authentication across certificate authorities.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-88">88</xref>]</td>
<td>Application</td>
<td>DoS, Man in the Middle, replay, and phishing</td>
<td>Centralizing data increases its susceptibility to attacks.</td>
<td>A secure multi-factor authentication protocol is proposed for healthcare services utilizing cloud-based SDN.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-89">89</xref>]</td>
<td>All</td>
<td>Privacy</td>
<td>The transmission of plain text data along with the absence of authentication enables attackers to access user profiles, understand user behavior, and potentially inject malware into devices.</td>
<td>Focusing on providing authentication for users and smart devices, as well as privacy for data and user queries, through lightweight authentication and searchable query protocols.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-90">90</xref>]</td>
<td>Application</td>
<td>Man in the Middle and replay</td>
<td>For applications in mobile edge computing in cyber-physical systems, traditional authentication schemes, known for their low performance, are no longer suitable.</td>
<td>Utilizing an innovative and efficient handover authentication scheme based on SDN.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-92">92</xref>]</td>
<td>Control</td>
<td>Man in the Middle and forgery</td>
<td>In an SDN-IoT environment, communication between entities is susceptible to numerous threats, largely due to insecure wireless channels.</td>
<td>Devising a secure user access control mechanism for SDN-enabled industrial IoT.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-95">95</xref>]</td>
<td>Control</td>
<td>Unauthorized access and data theft</td>
<td>Cloud environments are susceptible to attacks from both external sources and internal users.</td>
<td>Employing a role-based access control system enabled by SDN, coupled with a trust-based model.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-100">100</xref>]</td>
<td>Control</td>
<td>DDoS</td>
<td>Mitigating DDoS attacks using firewalls is challenging due to the attackers establishing multiple connections to the victim from various IP addresses.</td>
<td>Applying a cost-effective approach to reduce controller burdens.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-103">103</xref>]</td>
<td>Control</td>
<td>Malicious packets</td>
<td>Lack of a suitable solution to deal with the attacks of malicious end hosts in the SDN environment.</td>
<td>Using a security architecture to preemptively identify attacker-end hosts before submission of flow requests to the SDN controller.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-107">107</xref>]</td>
<td>Control</td>
<td>Malicious packets and malicious traffic injection</td>
<td>Compromised IoT devices inundate the application servers, resulting in widespread service disruption.</td>
<td>Focusing on traffic management in IoT environments, and predicting and monitoring malicious traffic at SDN-enabled IoT gateways.</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s4_1">
<label>4.1</label>
<title>AQ1: What Are the Predominant Challenges Facing the Planes in SDN-Enabled IoT That Have Been Addressed in the Literature?</title>
<p>A comprehensive review of the literature shows that at the application plane, notable security threats include accountability issues, application manipulation, information leakage, impersonation, and communication hijacking. Concerning the control plane, significant security challenges involve conflicts of flow rules, policy enforcement, network manipulation, and unauthorized access. In the data plane, common security challenges include network manipulation, conflicts in flow rules, configuration errors, and metadata attacks. Additionally, privacy concerns, malicious packets, and DoS and DDoS attacks are recognized as challenges spanning all planes of the SDN-enabled IoT system. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> illustrates common security challenges in different planes of SDN-enabled IoT systems.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Security challenges in SDN-enabled IoT systems</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_52994-fig-2.tif"/>
</fig>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>AQ2: What Are the Principal Causes of Challenges Mentioned in the Literature?</title>
<p>It can be seen that the primary causes of security challenges in SDN-enabled IoT systems include the proliferation of data and devices, vulnerabilities in controllers&#x2014;especially pronounced in instances where a single controller is relied upon&#x2014;the segregation of planes, malicious traffic and packets, traffic analysis or inference, inadequate authentication mechanisms, data integrity issues, legal constraints, compatibility challenges with flow rules, scalability limitations, insecure wireless communication channels, and configuration discrepancies. This paper undertakes an analysis of security and privacy threats and their root causes, culminating in a summary of findings depicted in <xref ref-type="table" rid="table-2">Table 2</xref>, illustrating their ramifications across SDN planes.</p>

</sec>
<sec id="s4_3">
<label>4.3</label>
<title>AQ3: Which Security and Privacy Methods Have Been Implemented to Overcome the Challenges in SDN-Enabled IoT Applications?</title>
<p>Recent advancements include exploring blockchain technology for recording transactions to enhance security and privacy, as well as utilizing machine learning and deep learning techniques to detect and mitigate the impacts of DoS and DDoS attacks. The categorization of the collected papers clearly states that encryption and hashing techniques are currently prevalent in the data plane, while access control and certificate authorization are predominantly considered in the control plane. Authentication methods are commonly employed within the application plane.</p>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>AQ4: What Are the Identified Research Gaps and Open Questions That Pave the Way for Future Research Directions?</title>
<p>To achieve an acceptable level of security and privacy in SDN-enabled IoT systems, it is crucial to address challenges across all three layers simultaneously. This involves creating unified protocols and standards to ensure consistent security measures across all layers, thereby preventing exploitable gaps. Additionally, it requires investigating advanced threat detection systems capable of real-time monitoring and analysis of data across all layers. Developing automated tools and frameworks for the deployment, management, and updating of security policies and measures can also be beneficial. Automation can rapidly address new threats, reduce the manual effort required for security management, and ensure consistent application of security measures.</p>
<p>Although security has received considerable attention, privacy protection needs more focus from researchers. Techniques such as differential privacy and homomorphic encryption can help protect data privacy while still allowing for necessary data analysis and processing. Integrating blockchain components, known for their distributed nature, with the centralized nature of SDN in IoT networks to uphold security and privacy requires more coordination and adaptation. Given the importance of machine learning and deep learning methods in identifying malicious packets, DoS, and DDoS attacks, there is a need for low-overhead solutions for processing these methods. Enhancing lightweight encryption and energy-efficient security protocols can bolster security in these systems without significantly draining device resources. Therefore, it is essential to explore resource-efficient security mechanisms tailored to the constraints of IoT devices, such as limited processing power and battery
life.</p>
<p>Nowadays, SDN-IoT has become more flexible with the integration of fog computing. Researchers need to also focus on several key areas within this combined field. Firstly, optimizing resource management and allocation in fog computing environments can enhance data processing efficiency. Additionally, scalable solutions must be explored to support the increasing number of IoT devices, ensuring seamless connectivity and interoperability. Furthermore, developing energy-efficient secure algorithms and protocols is essential to minimize the power consumption of IoT devices and Fog nodes.</p>
<p>Securing IoT networks through the development of novel SDN architectures can be useful. Additionally, implementing new methods like secret sharing and data minimization can substantially alleviate privacy concerns. As data generation proliferates with the expansion of IoT networks, adopting data minimization approaches becomes imperative. Minimizing the amount of data collected, stored, and shared by smart devices simplifies the protection of users&#x2019; personal information. Processing collected data with data minimization models not only enhances data privacy but also facilitates efficient data storage, easier data management, and heightened awareness of data accuracy.</p>
<p>Furthermore, processing speed and latency pose significant challenges in SDN-enabled IoT systems, and extensive research is urgently needed to address security and privacy challenges, while ensuring service availability and support for high mobility. For real-time applications in the SDN-IoT, such as video streaming, which requires fast response and processing times, researchers should also consider service availability in the network architecture. In addition, most IoT devices, including smartphones, drones, and cars, are constantly moving, connecting, and disconnecting to and from the network, leading to numerous security issues. Consequently, specialized secure algorithms and protocols must be developed to address these challenges effectively.</p>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusion</title>
<p>The critical nature of security and privacy challenges in IoT systems with SDN, compounded by real-time applications and resource limitations, prompted an investigation and analysis in this study. To reach a comprehensive discussion, the most important existing studies were categorized based on the types of challenges, causes, proposed solutions, and target layers. Specifically, the literature analysis revealed that at the application plane, major security threats include accountability issues, application manipulation, information leakage, impersonation, and communication hijacking. The control plane faces challenges, such as conflicts in flow rules, policy enforcement, network manipulation, and unauthorized access. Data planes encounter issues such as network manipulation, flow rule conflicts, configuration errors, and metadata attacks. Additionally, privacy concerns, malicious packets, and DoS and DDoS attacks affect all the planes of the system. Therefore, this paper also summarized the existing security solutions proposed by researchers for each plane and categorized these methods based on the plane for which they are most commonly used. Finally, this paper provided suggestions for future research to mitigate security attacks with the aim of providing more reliable and robust security solutions for SDN-enabled IoT systems. This thorough review is expected to benefit researchers and policymakers by developing effective security strategies.</p>
</sec>
</body>
<back>
<ack>
<p>The anonymous reviewers of Computers, Materials &#x0026; Continua journal are highly acknowledged for their valuable comments, which enhanced the quality of this paper.</p>
</ack>
<sec><title>Funding Statement</title>
<p>This work was supported by National Natural Science Foundation of China (Grant No. 62341208), Natural Science Foundation of Zhejiang Province (Grant Nos. LY23F020006 and LR23F020001). Moreover, it has been supported by Islamic Azad University with the Grant No. 133713281361.</p>
</sec>
<sec><title>Author Contributions</title>
<p>Ahmad Rahdari was responsible for the ideation, research, development, and writing of the initial draft. Ahmad Jalili reviewed the manuscript and provided comments to enhance the first version. Mehdi Gheisari and Panjun Sun, as the corresponding authors, conceptualized and coordinated the study. Zongda Wu and Zhaoxi Fang were the supervisors of this project. Hamid Tahaei supported us in revision and comments. Alisa A. Vorobeva, Ilya Popov and Viktoriia M. Korzhuk were responsible for analysis. All authors reviewed and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability"><title>Availability of Data and Materials</title>
<p>This paper did not utilize or generate any datasets.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Safaei Yaraziz</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Jalili</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Gheisari</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Recent trends towards privacy&#x2010;preservation in Internet of Things, its challenges and future directions</article-title>,&#x201D; <source>IET Circuits, Devices &#x0026; Syst.</source>, vol. <volume>17</volume>, no. <issue>2</issue>, pp. <fpage>53</fpage>&#x2013;<lpage>61</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1049/cds2.12138</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Al-Shareeda</surname></string-name>, <string-name><given-names>A. A.</given-names> <surname>Alsadhan</surname></string-name>, <string-name><given-names>H. H.</given-names> <surname>Qasim</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Manickam</surname></string-name></person-group>, &#x201C;<article-title>Software defined networking for internet of things: Review, techniques, challenges, and future directions</article-title>,&#x201D; <source>Bull. Electr. Eng. Inform.</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>638</fpage>&#x2013;<lpage>647</lpage>, <year>2024</year>. doi: <pub-id pub-id-type="doi">10.11591/eei.v13i1.6386</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Hussain</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Shah</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Amin</surname></string-name>, <string-name><given-names>S. S.</given-names> <surname>Alshamrani</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Alotaibi</surname></string-name> and <string-name><given-names>S. M.</given-names> <surname>Raza</surname></string-name></person-group>, &#x201C;<article-title>Software-defined networking: Categories, analysis, and future directions</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>22</volume>, no. <issue>15</issue>, pp. <fpage>5551</fpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.3390/s22155551</pub-id>; <pub-id pub-id-type="pmid">35898063</pub-id></mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="other">&#x201C;<article-title>SDN/OpenFlow|Flowgrammable</article-title>,&#x201D; <comment>Accessed: Mar. 27, 2018</comment>. [Online]. Available: <ext-link ext-link-type="uri" xlink:href="https://flowgrammable.org/sdn/">https://flowgrammable.org/sdn/</ext-link></mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Sharma</surname></string-name>, <string-name><given-names>E. S.</given-names> <surname>Pilli</surname></string-name>, <string-name><given-names>A. P.</given-names> <surname>Mazumdar</surname></string-name>, and <string-name><given-names>P.</given-names> <surname>Gera</surname></string-name></person-group>, &#x201C;<article-title>Towards trustworthy internet of things: A survey on trust management applications and schemes</article-title>,&#x201D; <source>Comput. Commun.</source>, vol. <volume>160</volume>, no. <issue>15</issue>, pp. <fpage>475</fpage>&#x2013;<lpage>493</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comcom.2020.06.030</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Ahmadvand</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Lal</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Hemmati</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Sookhak</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Conti</surname></string-name></person-group>, &#x201C;<article-title>Privacy-preserving and security in SDN-based IoT: A survey</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>11</volume>, pp. <fpage>44772</fpage>&#x2013;<lpage>44786</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2023.3267764</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Javanmardi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Shojafar</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Mohammadi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Alazab</surname></string-name>, and <string-name><given-names>A. M.</given-names> <surname>Caruso</surname></string-name></person-group>, &#x201C;<article-title>An SDN perspective IoT-Fog security: A survey</article-title>,&#x201D; <source>Comput. Netw.</source>, vol. <volume>229</volume>, no. <issue>4</issue>, pp. <fpage>109732</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comnet.2023.109732</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. S.</given-names> <surname>Farooq</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Riaz</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>Alvi</surname></string-name></person-group>, &#x201C;<article-title>Security and privacy issues in software-defined networking (SDN): A systematic literature review</article-title>,&#x201D; <source>Electronics</source>, vol. <volume>12</volume>, no. <issue>14</issue>, pp. <fpage>3077</fpage>, <year>2023</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Yurekten</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Demirci</surname></string-name></person-group>, &#x201C;<article-title>SDN-based cyber defense: A survey</article-title>,&#x201D; <source>Future Gen. Comput. Syst.</source>, vol. <volume>115</volume>, pp. <fpage>126</fpage>&#x2013;<lpage>149</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Farris</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Taleb</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Khettab</surname></string-name>, and <string-name><given-names>J.</given-names> <surname>Song</surname></string-name></person-group>, &#x201C;<article-title>A survey on emerging SDN and NFV security mechanisms for IoT systems</article-title>,&#x201D; <source>IEEE Commun. Surv. Tutorials</source>, vol. <volume>21</volume>, no. <issue>1</issue>, pp. <fpage>812</fpage>&#x2013;<lpage>837</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1109/COMST.2018.2862350</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Bera</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Misra</surname></string-name>, and <string-name><given-names>A. V.</given-names> <surname>Vasilakos</surname></string-name></person-group>, &#x201C;<article-title>Software-defined networking for internet of things: A survey</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>4</volume>, no. <issue>6</issue>, pp. <fpage>1994</fpage>&#x2013;<lpage>2008</lpage>, <year>2017</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2017.2746186</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. P.</given-names> <surname>Singh</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Bhandari</surname></string-name></person-group>, &#x201C;<article-title>New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges</article-title>,&#x201D; <source>Comput. Commun.</source>, vol. <volume>154</volume>, no. <issue>2</issue>, pp. <fpage>509</fpage>&#x2013;<lpage>527</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comcom.2020.02.085</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Alamer</surname></string-name></person-group>, &#x201C;<article-title>Security and privacy-awareness in a software-defined fog computing network for the Internet of Things</article-title>,&#x201D; <source>Opt. Switching Netw.</source>, vol. <volume>41</volume>, no. <issue>3</issue>, pp. <fpage>100616</fpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1016/j.osn.2021.100616</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Alharbi</surname></string-name></person-group>, &#x201C;<article-title>Deployment of blockchain technology in software defined networks: A survey</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>9146</fpage>&#x2013;<lpage>9156</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2020.2964751</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Indrason</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Saha</surname></string-name></person-group>, &#x201C;<article-title>Exploring blockchain-driven security in SDN-based IoT networks</article-title>,&#x201D; <source>J. Netw. Comput. Appl.</source>, vol. <volume>224</volume>, no. <issue>4</issue>, pp. <fpage>103838</fpage>, <year>2024</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jnca.2024.103838</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Chakrabarty</surname></string-name>, <string-name><given-names>D. W.</given-names> <surname>Engels</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Thathapudi</surname></string-name></person-group>, &#x201C;<article-title>Black SDN for the internet of things</article-title>,&#x201D; in <conf-name>Proc. IEEE 12th Int. Conf. Mobile Ad Hoc Sens. Syst. (MASS)</conf-name>, <publisher-loc>Dallas, TX, USA</publisher-loc>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Choi</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Kwak</surname></string-name></person-group>, &#x201C;<article-title>Enhanced SDIoT security framework models</article-title>,&#x201D; <source>Int. J. Distrib. Sens. Netw.</source>, vol. <volume>12</volume>, no. <issue>5</issue>, pp. <fpage>4807804</fpage>, <year>2016</year>. doi: <pub-id pub-id-type="doi">10.1155/2016/4807804</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Bull</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Austin</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Popov</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Sharma</surname></string-name>, and <string-name><given-names>R.</given-names> <surname>Watson</surname></string-name></person-group>, &#x201C;<article-title>Flow based security for IoT devices using an SDN gateway</article-title>,&#x201D; in <conf-name>IEEE 4th Int. Conf. Future Int. Things and Cloud (FiCloud)</conf-name>, <publisher-loc>Vienna, Austria</publisher-loc>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Flauzac</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Gonz&#x00E1;lez</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Hachani</surname></string-name>, and <string-name><given-names>F.</given-names> <surname>Nolot</surname></string-name></person-group>, &#x201C;<article-title>SDN based architecture for IoT and improvement of the security</article-title>,&#x201D; in <conf-name>IEEE 29th Int. Conf. Ad. Inform. Netw. Appl. Workshops</conf-name>, <publisher-loc>Gwangiu, Republic of Korea</publisher-loc>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M. E.</given-names> <surname>Ahmed</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Kim</surname></string-name></person-group>, &#x201C;<article-title>DDoS attack mitigation in Internet of Things using software defined networking</article-title>,&#x201D; in <conf-name>IEEE Third Int. Conf. Big Data Comput. Serv. Appl. (BigDataService)</conf-name>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Jararweh</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Mahmoud</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Darabseh</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Benkhelifa</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Vouk</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Rindos</surname></string-name></person-group>, &#x201C;<article-title>SDIoT: A software defined based internet of things framework</article-title>,&#x201D; <source>J. Ambient Intell. Humaniz. Comput.</source>, vol. <volume>6</volume>, no. <issue>4</issue>, pp. <fpage>453</fpage>&#x2013;<lpage>461</lpage>, <year>2015</year>. doi: <pub-id pub-id-type="doi">10.1007/s12652-015-0290-y</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Altman</surname></string-name>, and <string-name><given-names>C.</given-names> <surname>Touati</surname></string-name></person-group>, &#x201C;<article-title>A general SDN-based IoT framework with NVF implementation</article-title>,&#x201D; <source>ZTE Communications</source>, vol. <volume>13</volume>, no. <issue>3</issue>, pp. <fpage>42</fpage>&#x2013;<lpage>45</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. A.</given-names> <surname>Hayajneh</surname></string-name>, <string-name><given-names>M. Z. A.</given-names> <surname>Bhuiyan</surname></string-name>, and <string-name><given-names>I.</given-names> <surname>McAndrew</surname></string-name></person-group>, &#x201C;<article-title>Improving Internet of Things (IoT) security with software-defined networking (SDN)</article-title>,&#x201D; <source>Computers</source>, vol. <volume>9</volume>, no. <issue>1</issue>, pp. <fpage>8</fpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.3390/computers9010008</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Arif</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>V. E.</given-names> <surname>Balas</surname></string-name>, <string-name><given-names>O.</given-names> <surname>Geman</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Castiglione</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Chen</surname></string-name></person-group>, &#x201C;<article-title>SDN based communications privacy-preserving architecture for VANETs using fog computing</article-title>,&#x201D; <source>Veh. Commun.</source>, vol. <volume>26</volume>, no. <issue>3</issue>, pp. <fpage>100265</fpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1016/j.vehcom.2020.100265</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Snehi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Bhandari</surname></string-name>, and <string-name><given-names>J.</given-names> <surname>Verma</surname></string-name></person-group>, &#x201C;<article-title>Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems</article-title>,&#x201D; <source>Comput. &#x0026; Secur.</source>, vol. <volume>139</volume>, no. <issue>3</issue>, pp. <fpage>103702</fpage>, <year>2024</year>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2024.103702</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Javanmardi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Shojafar</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Mohammadi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Nazari</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Persico</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Pescap&#x00E8;</surname></string-name></person-group>, &#x201C;<article-title>FUPE: A security driven task scheduling approach for SDN-based IoT-fog networks</article-title>,&#x201D; <source>J. Inf. Secur. Appl.</source>, vol. <volume>60</volume>, no. <issue>4</issue>, pp. <fpage>102853</fpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jisa.2021.102853</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Prabavathy</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Supriya</surname></string-name></person-group>, &#x201C;<article-title>SDN based cognitive security system for large-scale Internet of Things using fog computing</article-title>,&#x201D; in <conf-name>Int. Conf. Emerg. Tech. Comput. Intell. (ICETCI)</conf-name>, <publisher-loc>Hyderabad, India</publisher-loc>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Yazdinejad</surname></string-name>, <string-name><given-names>R. M.</given-names> <surname>Parizi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Dehghantanha</surname></string-name>, <string-name><given-names>Q.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>K. K. R.</given-names> <surname>Choo</surname></string-name></person-group>, &#x201C;<article-title>An energy-efficient SDN controller architecture for IoT networks with blockchain-based security</article-title>,&#x201D; <source>IEEE Trans. Serv. Comput.</source>, vol. <volume>13</volume>, no. <issue>4</issue>, pp. <fpage>625</fpage>&#x2013;<lpage>638</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/TSC.2020.2966970</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Ren</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Luo</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Guizani</surname></string-name></person-group>, &#x201C;<article-title>SILedger: A blockchain and ABE-based access control for applications in SDN-IoT networks</article-title>,&#x201D; <source>IEEE Trans. Netw. Serv. Manag.</source>, vol. <volume>18</volume>, no. <issue>4</issue>, pp. <fpage>4406</fpage>&#x2013;<lpage>4419</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/TNSM.2021.3093002</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Chaudhary</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Jindal</surname></string-name>, <string-name><given-names>G. S.</given-names> <surname>Aujla</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Aggarwal</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Kumar</surname></string-name> and <string-name><given-names>K. K. R.</given-names> <surname>Choo</surname></string-name></person-group>, &#x201C;<article-title>BEST: Blockchain-based secure energy trading in SDNenabled intelligent transportation system</article-title>,&#x201D; <source>Comput. &#x0026; Secur.</source>, vol. <volume>88</volume>, no. <issue>1</issue>, pp. <fpage>288</fpage>&#x2013;<lpage>299</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2019.05.006</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Misra</surname></string-name>, <string-name><given-names>P. K.</given-names> <surname>Deb</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Pathak</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>Mukherjee</surname></string-name></person-group>, &#x201C;<article-title>Blockchain-enabled SDN for securing fog-based resource-constrained IoT</article-title>,&#x201D; in <conf-name>IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS)</conf-name>, <publisher-loc>Toronto, Canada</publisher-loc>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Ibrahim</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>SDN based DDos mitigating approach using traffic entropy for IoT network</article-title>,&#x201D; <source>Comput. Mater. Contin.</source>, vol. <volume>70</volume>, no. <issue>3</issue>, pp. <fpage>5651</fpage>&#x2013;<lpage>5665</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.32604/cmc.2022.017772</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. J.</given-names> <surname>Islam</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Blockchain-SDN based energy-aware and distributed secure architecture for IoT in smart cities</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>9</volume>, no. <issue>5</issue>, pp. <fpage>3850</fpage>&#x2013;<lpage>3864</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2021.3100797</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. Z. El</given-names> <surname>Houda</surname></string-name>, <string-name><given-names>A. S.</given-names> <surname>Hafid</surname></string-name>, and <string-name><given-names>L.</given-names> <surname>Khoukhi</surname></string-name></person-group>, &#x201C;<article-title>Cochain-SC: An intra- and inter-domain ddos mitigation scheme based on blockchain using SDN and smart contract</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>7</volume>, pp. <fpage>98893</fpage>&#x2013;<lpage>98907</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2019.2930715</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Q.</given-names> <surname>Shafi</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Basit</surname></string-name></person-group>, &#x201C;<article-title>DDoS botnet prevention using blockchain in software defined Internet of Things</article-title>,&#x201D; in <conf-name>16th Int. Bhurban Conf. Appl. Sci. Technol. (IBCAST)</conf-name>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P. K.</given-names> <surname>Sharma</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Singh</surname></string-name>, <string-name><given-names>Y. S.</given-names> <surname>Jeong</surname></string-name>, and <string-name><given-names>J. H.</given-names> <surname>Park</surname></string-name></person-group>, &#x201C;<article-title>DistBlockNet: A distributed blockchains-based secure SDN architecture for IoT networks</article-title>,&#x201D; <source>IEEE Commun. Mag.</source>, vol. <volume>55</volume>, no. <issue>9</issue>, pp. <fpage>78</fpage>&#x2013;<lpage>85</lpage>, <year>2017</year>. doi: <pub-id pub-id-type="doi">10.1109/MCOM.2017.1700041</pub-id>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Shashidhara</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Ahuja</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Lajuvanthi</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Akhila</surname></string-name>, <string-name><given-names>A. K.</given-names> <surname>Das</surname></string-name> and <string-name><given-names>J. J. P. C.</given-names> <surname>Rodrigues</surname></string-name></person-group>, &#x201C;<article-title>SDN-chain: Privacy-preserving protocol for software defined networks using blockchain</article-title>,&#x201D; <source>Secur. Priv.</source>, vol. <volume>4</volume>, no. <issue>6</issue>, pp. <fpage>102647</fpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1002/spy2.178</pub-id>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Hameed</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>A scalable key and trust management solution for IoT sensors using SDN and blockchain technology</article-title>,&#x201D; <source>IEEE Sens. J.</source>, vol. <volume>21</volume>, no. <issue>6</issue>, pp. <fpage>8716</fpage>&#x2013;<lpage>8733</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/JSEN.2021.3052009</pub-id>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Hakiri</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Dezfouli</surname></string-name></person-group>, &#x201C;<article-title>Towards a blockchain-SDN architecture for secure and trustworthy 5G massive iot networks</article-title>,&#x201D; in <conf-name>Proc. 2021 ACM Int. Work. Softw. Defined Netw. &#x0026; Netw. Fun. Virtual. Secur.</conf-name>, <publisher-loc>New York, NY, USA</publisher-loc>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>I. H.</given-names> <surname>Abdulqadder</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Zou</surname></string-name>, <string-name><given-names>I. T.</given-names> <surname>Aziz</surname></string-name>, and <string-name><given-names>S. M. A.</given-names> <surname>Akber</surname></string-name></person-group>, &#x201C;<article-title>Bloc-Sec: Blockchain-based lightweight security architecture for 5G/B5G enabled SDN/NFV cloud of IoT</article-title>,&#x201D; in <conf-name>IEEE 20th Int. Conf. Commun. Technol. (ICCT)</conf-name>, <publisher-loc>Nanning, China</publisher-loc>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Rahman</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>SmartBlock-SDN: An optimized blockchain-SDN framework for resource management in IoT</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>9</volume>, pp. <fpage>28361</fpage>&#x2013;<lpage>28376</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2021.3058244</pub-id>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Kataoka</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Gangwar</surname></string-name>, and <string-name><given-names>P.</given-names> <surname>Podili</surname></string-name></person-group>, &#x201C;<article-title>Trust list: Internet-wide and distributed IoT traffic management using blockchain and SDN</article-title>,&#x201D; in <conf-name>IEEE 4th World Forum Internet of Things (WF-IoT)</conf-name>, <publisher-loc>Singapore</publisher-loc>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Hu</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Reed</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Thomos</surname></string-name>, <string-name><given-names>M. K.</given-names> <surname>AI-Naday</surname></string-name>, and <string-name><given-names>K.</given-names> <surname>Yang</surname></string-name></person-group>, &#x201C;<article-title>Securing SDN-controlled IoT networks through edge blockchain</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>8</volume>, no. <issue>4</issue>, pp. <fpage>2102</fpage>&#x2013;<lpage>2115</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2020.3017354</pub-id>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Faizullah</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Alzahrani</surname></string-name>, and <string-name><given-names>I.</given-names> <surname>Khan</surname></string-name></person-group>, &#x201C;<article-title>Permissioned blockchain-based security for SDN in IoT cloud networks</article-title>,&#x201D; in <conf-name>Int. Conf. Adv. Emerg. Comput. Technol. (AECT)</conf-name>, <publisher-loc>Al Madinah Al Munawwarah, Saudi Arabi</publisher-loc>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Rathore</surname></string-name>, <string-name><given-names>B. W.</given-names> <surname>Kwon</surname></string-name>, and <string-name><given-names>J. H.</given-names> <surname>Park</surname></string-name></person-group>, &#x201C;<article-title>BlockSecIoTNet: Blockchainbased decentralized security architecture for IoT network</article-title>,&#x201D; <source>J. Netw. Comput. Appl.</source>, vol. <volume>143</volume>, no. <issue>4</issue>, pp. <fpage>167</fpage>&#x2013;<lpage>177</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jnca.2019.06.019</pub-id>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Boukria</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Guerroumi</surname></string-name>, and <string-name><given-names>I.</given-names> <surname>Romdhani</surname></string-name></person-group>, &#x201C;<article-title>BCFR: Blockchain-based controller against false flow rule injection in SDN</article-title>,&#x201D; in <conf-name>2019 IEEE Symp. Comput. Commun. (ISCC)</conf-name>, <comment>Barcelona, Spain</comment>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. A.</given-names> <surname>Latif</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</article-title>,&#x201D; <source>Comput. Commun.</source>, vol. <volume>181</volume>, no. <issue>6</issue>, pp. <fpage>274</fpage>&#x2013;<lpage>283</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comcom.2021.09.029</pub-id>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Abbas</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Javaid</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Almogren</surname></string-name>, <string-name><given-names>S. M.</given-names> <surname>Gulfam</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ahmed</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Radwan</surname></string-name></person-group>, &#x201C;<article-title>Securing genetic algorithm enabled SDN routing for blockchain based Internet of Things</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>9</volume>, pp. <fpage>139739</fpage>&#x2013;<lpage>139754</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2021.3118948</pub-id>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Gao</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Lin</surname></string-name>, and <string-name><given-names>J. J.</given-names> <surname>Rodrigues</surname></string-name></person-group>, &#x201C;<article-title>Blockchain based secure IoT data sharing framework for SDN-enabled smart communities</article-title>,&#x201D; in <conf-name>IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS)</conf-name>, <publisher-loc>Toronto, ON, Canada</publisher-loc>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Yazdinejad</surname></string-name>, <string-name><given-names>R. M.</given-names> <surname>Parizi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Dehghantanha</surname></string-name>, and <string-name><given-names>K. K. R.</given-names> <surname>Choo</surname></string-name></person-group>, &#x201C;<article-title>Blockchain-enabled authentication handover with efficient privacy protection in sdn-based 5G networks</article-title>,&#x201D; <source>IEEE Trans. Netw. Sci. Eng.</source>, vol. <volume>8</volume>, no. <issue>2</issue>, pp. <fpage>1120</fpage>&#x2013;<lpage>1132</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Qiu</surname></string-name>, <string-name><given-names>F. R.</given-names> <surname>Yu</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Yao</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Jiang</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Xu</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Zhao</surname></string-name></person-group>, &#x201C;<article-title>Blockchainbased software-defined industrial internet of things: A dueling deep qlearning approach</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>6</volume>, no. <issue>3</issue>, pp. <fpage>4627</fpage>&#x2013;<lpage>4639</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2018.2871394</pub-id>.</mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Amangele</surname></string-name>, <string-name><given-names>M. J.</given-names> <surname>Reed</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Al-Naday</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Thomos</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Nowak</surname></string-name></person-group>, &#x201C;<article-title>Hierarchical machine learning for IoT anomaly detection in SDN</article-title>,&#x201D; in <conf-name>Int. Conf. Inform. Technol. (InfoTech)</conf-name>, <publisher-loc>Varna, Bulgaria</publisher-loc>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Ashraf</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Moustafa</surname></string-name>, <string-name><given-names>A. D.</given-names> <surname>Bukhshi</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>Javed</surname></string-name></person-group>, &#x201C;<article-title>Intrusion detection system for SDN-enabled IoT networks using machine learning techniques</article-title>,&#x201D; in <conf-name>IEEE 25th Int. Enterprise Distribut. Object Comput. Workshop (EDOCW)</conf-name>, <publisher-loc>Gold Coast, Australia</publisher-loc>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-54"><label>[54]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Bhayo</surname></string-name>, <string-name><given-names>S. A.</given-names> <surname>Shah</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Hameed</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ahmed</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Nasir</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Draheim</surname></string-name></person-group>, &#x201C;<article-title>Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks</article-title>,&#x201D; <source>Eng. Appl. Artif. Intell.</source>, vol. <volume>123</volume>, no. <issue>1</issue>, pp. <fpage>106432</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.engappai.2023.106432</pub-id>.</mixed-citation></ref>
<ref id="ref-55"><label>[55]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Cheng</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Xu</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Ren</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Mao</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks</article-title>,&#x201D; <source>Int. J. Sens. Netw.</source>, vol. <volume>34</volume>, no. <issue>1</issue>, pp. <fpage>56</fpage>&#x2013;<lpage>69</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1504/IJSNET.2020.109720</pub-id>.</mixed-citation></ref>
<ref id="ref-56"><label>[56]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S. S.</given-names> <surname>Bhunia</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Gurusamy</surname></string-name></person-group>, &#x201C;<article-title>Dynamic attack detection and mitigation in IoT using SDN</article-title>,&#x201D; in <conf-name>27th Int. Telecommun. Netw. Appl. Conf. (ITNAC)</conf-name>, <publisher-loc>Melbourne, Australia</publisher-loc>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-57"><label>[57]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. B.</given-names> <surname>Dehkordi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Soltanaghaei</surname></string-name>, and <string-name><given-names>F. Z.</given-names> <surname>Boroujeni</surname></string-name></person-group>, &#x201C;<article-title>The DDoS attacks detection through machine learning and statistical methods in SDN</article-title>,&#x201D; <source>J. Supercomput.</source>, vol. <volume>77</volume>, no. <issue>3</issue>, pp. <fpage>2383</fpage>&#x2013;<lpage>2415</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1007/s11227-020-03323-w</pub-id>.</mixed-citation></ref>
<ref id="ref-58"><label>[58]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Haseeb</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Ahmad</surname></string-name>, <string-name><given-names>I. I.</given-names> <surname>Awan</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Lloret</surname></string-name>, and <string-name><given-names>I.</given-names> <surname>Bosch</surname></string-name></person-group>, &#x201C;<article-title>A machine learning SDN-enabled big data model for IoMT systems</article-title>,&#x201D; <source>Electronics</source>, vol. <volume>10</volume>, no. <issue>18</issue>, pp. <fpage>2228</fpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.3390/electronics10182228</pub-id>.</mixed-citation></ref>
<ref id="ref-59"><label>[59]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Rui</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Pan</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Shu</surname></string-name></person-group>, &#x201C;<article-title>Secure routing in the Internet of Things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques</article-title>,&#x201D; <source>Sci. Rep.</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>3459</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1038/s41598-023-44764-6</pub-id>; <pub-id pub-id-type="pmid">37865650</pub-id></mixed-citation></ref>
<ref id="ref-60"><label>[60]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. S.</given-names> <surname>Sahoo</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>An evolutionary SVM model for DDOS attack detection in software defined networks</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>132502</fpage>&#x2013;<lpage>132513</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2020.3009733</pub-id>.</mixed-citation></ref>
<ref id="ref-61"><label>[61]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Aqdus</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Amin</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Ramzan</surname></string-name>, <string-name><given-names>S. S.</given-names> <surname>Alshamrani</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Alshehri</surname></string-name> and <string-name><given-names>E. S. M.</given-names> <surname>El-Kenawy</surname></string-name></person-group>, &#x201C;<article-title>Detection collision flows in SDN based 5G using machine learning algorithms</article-title>,&#x201D; <source>Comput. Mater. Contin.</source>, vol. <volume>75</volume>, no. <issue>1</issue>, pp. <fpage>1413</fpage>&#x2013;<lpage>1435</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.32604/cmc.2023.031719</pub-id>.</mixed-citation></ref>
<ref id="ref-62"><label>[62]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K. M. S.</given-names> <surname>Azad</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Hossain</surname></string-name>, <string-name><given-names>M. J.</given-names> <surname>Islam</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Rahman</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Kabir</surname></string-name></person-group>, &#x201C;<article-title>Preventive determination and avoidance of ddos attack with sdn over the iot networks</article-title>,&#x201D; in <conf-name>Int. Conf. Automat., Control and Mechatron. Industry 4.0 (ACMI)</conf-name>, <publisher-loc>Rajshahi, Bangladesh</publisher-loc>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-63"><label>[63]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Swami</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Dave</surname></string-name>, and <string-name><given-names>V.</given-names> <surname>Ranga</surname></string-name></person-group>, &#x201C;<chapter-title>DDoS attacks and defense mechanisms using machine learning techniques for SDN</chapter-title>,&#x201D; in <source>Research Anthology on Combating Denial-of-Service Attacks</source>. <publisher-loc>PA, USA</publisher-loc>: <publisher-name>IGI Global</publisher-name>, <year>2021</year>. pp. <fpage>248</fpage>&#x2013;<lpage>264</lpage>. </mixed-citation></ref>
<ref id="ref-64"><label>[64]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Javeed</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Gao</surname></string-name>, <string-name><given-names>M. T.</given-names> <surname>Khan</surname></string-name>, and <string-name><given-names>I.</given-names> <surname>Ahmad</surname></string-name></person-group>, &#x201C;<article-title>A hybrid deep learning-driven SDN enabled mechanism for secure communication in Internet of Things (IoT)</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>21</volume>, no. <issue>14</issue>, pp. <fpage>4884</fpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.3390/s21144884</pub-id>; <pub-id pub-id-type="pmid">34300623</pub-id></mixed-citation></ref>
<ref id="ref-65"><label>[65]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Motwakel</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Enhanced crow search with deep learning-based cyberattack detection in SDN-IoT environment</article-title>,&#x201D; <source>Intell. Automat. &#x0026; Soft Comput.</source>, vol. <volume>36</volume>, no. <issue>3</issue>, pp. <fpage>3157</fpage>&#x2013;<lpage>3173</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.32604/iasc.2023.034908</pub-id>.</mixed-citation></ref>
<ref id="ref-66"><label>[66]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Wani</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Revathi</surname></string-name></person-group>, &#x201C;<article-title>DDoS detection and alleviation in IoT using SDN (SDIoT-DDoS-DA)</article-title>,&#x201D; <source>J. Instit Eng. (India): Series B</source>, vol. <volume>101</volume>, no. <issue>2</issue>, pp. <fpage>117</fpage>&#x2013;<lpage>128</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1007/s40031-020-00442-z</pub-id>.</mixed-citation></ref>
<ref id="ref-67"><label>[67]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J. D.</given-names> <surname>Gadze</surname></string-name>, <string-name><given-names>A. A.</given-names> <surname>Bamfo-Asante</surname></string-name>, <string-name><given-names>J. O.</given-names> <surname>Agyemang</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Nunoo-Mensah</surname></string-name>, and <string-name><given-names>K. A. B.</given-names> <surname>Opare</surname></string-name></person-group>, &#x201C;<article-title>An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers</article-title>,&#x201D; <source>Technologies</source>, vol. <volume>9</volume>, no. <issue>1</issue>, pp. <fpage>14</fpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.3390/technologies9010014</pub-id>.</mixed-citation></ref>
<ref id="ref-68"><label>[68]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Chaganti</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Suliman</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Ravi</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>Dua</surname></string-name></person-group>, &#x201C;<article-title>Deep learning approach for SDN-enabled intrusion detection system in IoT networks</article-title>,&#x201D; <source>Information</source>, vol. <volume>14</volume>, no. <issue>1</issue>, pp. <fpage>41</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3390/info14010041</pub-id>.</mixed-citation></ref>
<ref id="ref-69"><label>[69]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. D.</given-names> <surname>Joshi</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Kataoka</surname></string-name></person-group>, &#x201C;<article-title>pSMART: A lightweight, privacy-aware service function chain orchestration in multi-domain NFV/SDN</article-title>,&#x201D; <source>Comput. Netw.</source>, vol. <volume>178</volume>, no. <issue>2</issue>, pp. <fpage>107295</fpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comnet.2020.107295</pub-id>.</mixed-citation></ref>
<ref id="ref-70"><label>[70]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T. G.</given-names> <surname>Nguyen</surname></string-name>, <string-name><given-names>T. V.</given-names> <surname>Phan</surname></string-name>, <string-name><given-names>D. T.</given-names> <surname>Hoang</surname></string-name>, <string-name><given-names>T. N.</given-names> <surname>Nguyen</surname></string-name>, and <string-name><given-names>C.</given-names> <surname>So-In</surname></string-name></person-group>, &#x201C;<article-title>Federated deep reinforcement learning for traffic monitoring in SDN-based IoT networks</article-title>,&#x201D; <source>IEEE Trans. Cogn. Commun. Netw.</source>, vol. <volume>7</volume>, no. <issue>4</issue>, pp. <fpage>1048</fpage>&#x2013;<lpage>1065</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/TCCN.2021.3102971</pub-id>.</mixed-citation></ref>
<ref id="ref-71"><label>[71]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Q.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Yu</surname></string-name>, and <string-name><given-names>D.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>A dynamic and lightweight framework to secure source addresses in the SDN-based networks</article-title>,&#x201D; <source>Comput. Netw.</source>, vol. <volume>193</volume>, pp. <fpage>108075</fpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comnet.2021.108075</pub-id>.</mixed-citation></ref>
<ref id="ref-72"><label>[72]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Javeed</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Gao</surname></string-name>, and <string-name><given-names>M. T.</given-names> <surname>Khan</surname></string-name></person-group>, &#x201C;<article-title>SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT</article-title>,&#x201D; <source>Electronics</source>, vol. <volume>10</volume>, no. <issue>8</issue>, pp. <fpage>918</fpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.3390/electronics10080918</pub-id>.</mixed-citation></ref>
<ref id="ref-73"><label>[73]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Khan</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Akhunzada</surname></string-name></person-group>, &#x201C;<article-title>A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)</article-title>,&#x201D; <source>Comput. Commun.</source>, vol. <volume>170</volume>, no. <issue>11</issue>, pp. <fpage>209</fpage>&#x2013;<lpage>216</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comcom.2021.01.013</pub-id>.</mixed-citation></ref>
<ref id="ref-74"><label>[74]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Wani</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Khaliq</surname></string-name></person-group>, &#x201C;<article-title>SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL)</article-title>,&#x201D; <source>CAAI Trans. Intell. Technol.</source>, vol. <volume>6</volume>, no. <issue>3</issue>, pp. <fpage>281</fpage>&#x2013;<lpage>290</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1049/cit2.12003</pub-id>.</mixed-citation></ref>
<ref id="ref-75"><label>[75]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Dawoud</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Shahristani</surname></string-name>, and <string-name><given-names>C.</given-names> <surname>Raun</surname></string-name></person-group>, &#x201C;<article-title>Deep learning and software-defined networks: Towards secure IoT architecture</article-title>,&#x201D; <source>Int. of Things</source>, vol. <volume>3</volume>, no. <issue>8</issue>, pp. <fpage>82</fpage>&#x2013;<lpage>89</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1016/j.iot.2018.09.003</pub-id>.</mixed-citation></ref>
<ref id="ref-76"><label>[76]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>T. H.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>L. H.</given-names> <surname>Chang</surname></string-name>, and <string-name><given-names>C. W.</given-names> <surname>Syu</surname></string-name></person-group>, &#x201C;<article-title>Deep learning enabled intrusion detection and prevention system over SDN networks</article-title>,&#x201D; in <conf-name>IEEE Int. Conf. Commun. Workshops (ICC Workshops)</conf-name>, <comment>Dublin, Ireland</comment>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-77"><label>[77]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Ma</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Shi</surname></string-name></person-group>, &#x201C;<article-title>A lightweight encryption algorithm for edge networks in software-defined industrial internet of things</article-title>,&#x201D; in <conf-name>IEEE 5th Int. Conf. Comput. Commun. (ICCC)</conf-name>, <publisher-loc>Chengdu, China</publisher-loc>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-78"><label>[78]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Ma</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Yan</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Huang</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Ma</surname></string-name>, and <string-name><given-names>D.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>DTLShps: SDN-based DTLS handshake protocol simplification for IoT</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>7</volume>, no. <issue>4</issue>, pp. <fpage>3349</fpage>&#x2013;<lpage>3362</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2020.2967464</pub-id>.</mixed-citation></ref>
<ref id="ref-79"><label>[79]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Chaudhary</surname></string-name>, <string-name><given-names>G. S.</given-names> <surname>Aujla</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Garg</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Kumar</surname></string-name>, and <string-name><given-names>J. J.</given-names> <surname>Rodrigues</surname></string-name></person-group>, &#x201C;<article-title>SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment</article-title>,&#x201D; <source>IEEE Trans. Ind. Inform.</source>, vol. <volume>14</volume>, no. <issue>6</issue>, pp. <fpage>2629</fpage>&#x2013;<lpage>2640</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1109/TII.2018.2789442</pub-id>.</mixed-citation></ref>
<ref id="ref-80"><label>[80]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Yan</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Ma</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Ma</surname></string-name></person-group>, &#x201C;<article-title>TLShps: SDN-based TLS handshake protocol simplification for IoT</article-title>,&#x201D; in <conf-name>Security, Privacy, and Anonymity in Comput., Commun., Storage: 12th Int. Conf.</conf-name>, <publisher-loc>Atlanta, GA, USA</publisher-loc>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-81"><label>[81]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Fang</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>F. R.</given-names> <surname>Yu</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Wang</surname></string-name>, and <string-name><given-names>W.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Towards energy-efficient and secure data transmission in AI-enabled software defined industrial networks</article-title>,&#x201D; <source>IEEE Trans. Ind. Inform.</source>, vol. <volume>18</volume>, no. <issue>6</issue>, pp. <fpage>4265</fpage>&#x2013;<lpage>4274</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/TII.2021.3122370</pub-id>.</mixed-citation></ref>
<ref id="ref-82"><label>[82]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Yuan</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Secure data transportation with software-defined networking and <italic>k-n</italic> secret sharing for high-confidence IoT services</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>7</volume>, no. <issue>9</issue>, pp. <fpage>7967</fpage>&#x2013;<lpage>7981</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2020.2993587</pub-id>.</mixed-citation></ref>
<ref id="ref-83"><label>[83]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T. W.</given-names> <surname>Kim</surname></string-name>, <string-name><given-names>A. E.</given-names> <surname>Azzaoui</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Koh</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Kim</surname></string-name>, and <string-name><given-names>J. H.</given-names> <surname>Park</surname></string-name></person-group>, &#x201C;<article-title>A secret sharing-based distributed cloud system for privacy protection</article-title>,&#x201D; <source>Hum.-Centric Comput. Inf. Sci.</source>, vol. <volume>12</volume>, pp. <fpage>20</fpage>&#x2013;<lpage>36</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-84"><label>[84]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Pradeep</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification</article-title>,&#x201D; <source>Sci. Rep.</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>799</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1038/s41598-023-44701-7</pub-id>; <pub-id pub-id-type="pmid">37833379</pub-id></mixed-citation></ref>
<ref id="ref-85"><label>[85]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Ren</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>T. Y.</given-names> <surname>Wu</surname></string-name>, and <string-name><given-names>M. S.</given-names> <surname>Obaidat</surname></string-name></person-group>, &#x201C;<article-title>A hash-based distributed storage strategy of flowtables in SDN-IoT networks</article-title>,&#x201D; in <conf-name>IEEE Global Commun. Conf.</conf-name>, <publisher-loc>Singapore</publisher-loc>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-86"><label>[86]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Appiah</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Jiang</surname></string-name>, <string-name><given-names>E. K.</given-names> <surname>Boahen</surname></string-name>, and <string-name><given-names>E.</given-names> <surname>Owusu</surname></string-name></person-group>, &#x201C;<article-title>A 5G perspective of an SDN-based privacy-preserving scheme for IoT networks</article-title>,&#x201D; <source>Int. J. Commun., Netw. Syst. Sci.</source>, vol. <volume>16</volume>, no. <issue>8</issue>, pp. <fpage>169</fpage>&#x2013;<lpage>190</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.4236/ijcns.2023.168012</pub-id>.</mixed-citation></ref>
<ref id="ref-87"><label>[87]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Hossain</surname></string-name>, <string-name><given-names>M. Z.</given-names> <surname>Hossain</surname></string-name>, and <string-name><given-names>M. A.</given-names> <surname>Hossain</surname></string-name></person-group>, &#x201C;<article-title>An ontological security framework to secure the SDN based IoT networks</article-title>,&#x201D; <source>American J. Agri. Sci., Eng., Technol.</source>, vol. <volume>5</volume>, no. <issue>1</issue>, pp. <fpage>4</fpage>&#x2013;<lpage>18</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.54536/ajaset.v5i1.55</pub-id>.</mixed-citation></ref>
<ref id="ref-88"><label>[88]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Midha</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Verma</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Mittal</surname></string-name>, <string-name><given-names>N. Z.</given-names> <surname>Jhanjhi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Masud</surname></string-name> and <string-name><given-names>M. A.</given-names> <surname>AlZain</surname></string-name></person-group>, &#x201C;<article-title>A secure multi-factor authentication protocol for healthcare services using cloud-based SDN</article-title>,&#x201D; <source>Comput. Mater. Contin.</source>, vol. <volume>74</volume>, no. <issue>2</issue>, pp. <fpage>3711</fpage>&#x2013;<lpage>3726</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.32604/cmc.2023.027992</pub-id>.</mixed-citation></ref>
<ref id="ref-89"><label>[89]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Iqbal</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Abbas</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Rauf</surname></string-name>, <string-name><given-names>Y. A.</given-names> <surname>Bangash</surname></string-name>, <string-name><given-names>M. F.</given-names> <surname>Amjad</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Hemani</surname></string-name></person-group>, &#x201C;<article-title>PCSS: Privacy preserving communication scheme for SDN enabled smart homes</article-title>,&#x201D; <source>IEEE Sens. J.</source>, vol. <volume>22</volume>, no. <issue>18</issue>, pp. <fpage>17677</fpage>&#x2013;<lpage>17690</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/JSEN.2021.3087779</pub-id>.</mixed-citation></ref>
<ref id="ref-90"><label>[90]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Liang</surname></string-name>, and <string-name><given-names>Z.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>SDN-based handover authentication scheme for mobile edge computing in cyber-physical systems</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>6</volume>, no. <issue>5</issue>, pp. <fpage>8692</fpage>&#x2013;<lpage>8701</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2019.2922979</pub-id>.</mixed-citation></ref>
<ref id="ref-91"><label>[91]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. S.</given-names> <surname>Sahana</surname></string-name> and <string-name><given-names>S. H.</given-names> <surname>Brahmananda</surname></string-name></person-group>, &#x201C;<article-title>Secure authentication framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms</article-title>,&#x201D; <source>Int. J. Inf. Tecnol.</source>, vol. <volume>15</volume>, no. <issue>1</issue>, pp. <fpage>335</fpage>&#x2013;<lpage>344</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s41870-022-01074-w</pub-id>.</mixed-citation></ref>
<ref id="ref-92"><label>[92]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Irshad</surname></string-name>, <string-name><given-names>G. A.</given-names> <surname>Mallah</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Bilal</surname></string-name>, <string-name><given-names>S. A.</given-names> <surname>Chaudhry</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Shafiq</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Song</surname></string-name></person-group>, &#x201C;<article-title>SUSIC: A secure user access control mechanism for SDN-enabled IIoT and cyber physical systems</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>10</volume>, no. <issue>18</issue>, pp. <fpage>16504</fpage>&#x2013;<lpage>16515</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2023.3268474</pub-id>.</mixed-citation></ref>
<ref id="ref-93"><label>[93]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. N.</given-names> <surname>Matheu</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Security architecture for defining and enforcing security profiles in DLT/SDN-based IoT systems</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>20</volume>, no. <issue>7</issue>, pp. <fpage>1882</fpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.3390/s20071882</pub-id>; <pub-id pub-id-type="pmid">32231142</pub-id></mixed-citation></ref>
<ref id="ref-94"><label>[94]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Jiang</surname></string-name>, <string-name><given-names>Q.</given-names> <surname>He</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Zhai</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Su</surname></string-name></person-group>, &#x201C;<article-title>Anomaly detection and access control for cloud-edge collaboration networks</article-title>,&#x201D; <source>Intell. Automat. &#x0026; Soft Comput.</source>, vol. <volume>37</volume>, no. <issue>2</issue>, pp. <fpage>2335</fpage>&#x2013;<lpage>2353</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.32604/iasc.2023.039989</pub-id>.</mixed-citation></ref>
<ref id="ref-95"><label>[95]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. M.</given-names> <surname>Anitha</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Jayarekha</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Sivaraman</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Mehta</surname></string-name>, and <string-name><given-names>V.</given-names> <surname>Nalina</surname></string-name></person-group>, &#x201C;<article-title>SDN enabled role based shared secret scheme for virtual machine security in cloud environment</article-title>,&#x201D; <source>Cyber Secur. Appl.</source>, vol. <volume>2</volume>, no. <issue>9</issue>, pp. <fpage>100043</fpage>, <year>2024</year>. doi: <pub-id pub-id-type="doi">10.1016/j.csa.2024.100043</pub-id>.</mixed-citation></ref>
<ref id="ref-96"><label>[96]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Sivaraman</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Sikdar</surname></string-name></person-group>, &#x201C;<article-title>A game-theoretic approach for enhancing data privacy in sdn-based smart grids</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>8</volume>, no. <issue>13</issue>, pp. <fpage>10583</fpage>&#x2013;<lpage>10595</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2020.3048357</pub-id>.</mixed-citation></ref>
<ref id="ref-97"><label>[97]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. P.</given-names> <surname>Novaes</surname></string-name>, <string-name><given-names>L. F.</given-names> <surname>Carvalho</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Lloret</surname></string-name>, and <string-name><given-names>M. L.</given-names> <surname>Proen&#x00E7;a</surname> <suffix>Jr</suffix></string-name></person-group>, &#x201C;<article-title>Adversarial deep learning approach detection and defense against DDoS attacks in SDN environments</article-title>,&#x201D; <source>Future Gener. Comput. Syst.</source>, vol. <volume>125</volume>, no. <issue>1</issue>, pp. <fpage>156</fpage>&#x2013;<lpage>167</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1016/j.future.2021.06.047</pub-id>.</mixed-citation></ref>
<ref id="ref-98"><label>[98]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Galeano-Brajones</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Carmona-Murillo</surname></string-name>, <string-name><given-names>J. F.</given-names> <surname>Valenzuela-Vald&#x00E9;s</surname></string-name>, and <string-name><given-names>F.</given-names> <surname>Luna-Valero</surname></string-name></person-group>, &#x201C;<article-title>Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>20</volume>, no. <issue>3</issue>, pp. <fpage>816</fpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.3390/s20030816</pub-id>; <pub-id pub-id-type="pmid">32028711</pub-id></mixed-citation></ref>
<ref id="ref-99"><label>[99]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Revathi</surname></string-name>, <string-name><given-names>V. V.</given-names> <surname>Ramalingam</surname></string-name>, and <string-name><given-names>B.</given-names> <surname>Amutha</surname></string-name></person-group>, &#x201C;<article-title>A machine learning based detection and mitigation of the DDOS attack by using SDN controller framework</article-title>,&#x201D; <source>Wirel. Pers. Commun.</source>, vol. <volume>127</volume>, no. <issue>3</issue>, pp. <fpage>2417</fpage>&#x2013;<lpage>2441</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1007/s11277-021-09071-1</pub-id>.</mixed-citation></ref>
<ref id="ref-100"><label>[100]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y. C.</given-names> <surname>Wang</surname></string-name> and <string-name><given-names>Y. C.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>Efficient and low-cost defense against distributed denial-of-service attacks in SDN-based networks</article-title>,&#x201D; <source>Int. J. Commun. Syst.</source>, vol. <volume>33</volume>, no. <issue>14</issue>, pp. <fpage>375</fpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1002/dac.4461</pub-id>.</mixed-citation></ref>
<ref id="ref-101"><label>[101]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Cheng</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Yu</surname></string-name></person-group>, &#x201C;<article-title>An SDN-enabled proactive defense framework for DDoS mitigation in IoT networks</article-title>,&#x201D; <source>IEEE Trans. Inf. Forensics Secur.</source>, vol. <volume>16</volume>, pp. <fpage>5366</fpage>&#x2013;<lpage>5380</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/TIFS.2021.3127009</pub-id>.</mixed-citation></ref>
<ref id="ref-102"><label>[102]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Sun</surname></string-name>, and <string-name><given-names>X.</given-names> <surname>Xu</surname></string-name></person-group>, &#x201C;<article-title>A scalable and energy-efficient anomaly detection scheme in wireless SDN-based mMTC networks for IoT</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>8</volume>, no. <issue>3</issue>, pp. <fpage>1388</fpage>&#x2013;<lpage>1405</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2020.3011521</pub-id>.</mixed-citation></ref>
<ref id="ref-103"><label>[103]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Varadharajan</surname></string-name> and <string-name><given-names>U.</given-names> <surname>Tupakula</surname></string-name></person-group>, &#x201C;<article-title>Counteracting attacks from malicious end hosts in software defined networks</article-title>,&#x201D; <source>IEEE Trans. Netw. Serv. Manag.</source>, vol. <volume>17</volume>, no. <issue>1</issue>, pp. <fpage>160</fpage>&#x2013;<lpage>174</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1109/TNSM.2019.2931294</pub-id>.</mixed-citation></ref>
<ref id="ref-104"><label>[104]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R. S.</given-names> <surname>Silva</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>REPEL: A strategic approach for defending 5G control plane from DDoS signalling attacks</article-title>,&#x201D; <source>IEEE Trans. Netw. Serv. Manag.</source>, vol. <volume>18</volume>, no. <issue>3</issue>, pp. <fpage>3231</fpage>&#x2013;<lpage>3243</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/TNSM.2020.3035342</pub-id>.</mixed-citation></ref>
<ref id="ref-105"><label>[105]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Shrivastava</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Kataoka</surname></string-name></person-group>, &#x201C;<article-title>Topology poisoning attacks and prevention in hybrid software-defined networks</article-title>,&#x201D; <source>IEEE Trans. Netw. Serv. Manag.</source>, vol. <volume>19</volume>, no. <issue>1</issue>, pp. <fpage>510</fpage>&#x2013;<lpage>523</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/TNSM.2021.3109099</pub-id>.</mixed-citation></ref>
<ref id="ref-106"><label>[106]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Kiani</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Bohlooli</surname></string-name></person-group>, &#x201C;<article-title>Distributed rule anomaly detection in SDN-based IoT</article-title>,&#x201D; in <conf-name>5th Int. Conf. Internet of Things and Appl. (IoT)</conf-name>, <publisher-loc>Isfahan, Iran</publisher-loc>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-107"><label>[107]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Thorat</surname></string-name>, <string-name><given-names>N. K.</given-names> <surname>Dubey</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Khetan</surname></string-name>, and <string-name><given-names>R.</given-names> <surname>Challa</surname></string-name></person-group>, &#x201C;<article-title>SDN-based predictive alarm manager for security attacks detection at the IoT gateways</article-title>,&#x201D; in <conf-name>IEEE 18th Annual Consumer Commun. &#x0026; Netw. Conf. (CCNC)</conf-name>, <publisher-loc>Las Vegas, NV, USA</publisher-loc>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-108"><label>[108]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>C. H.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>J. S.</given-names> <surname>Park</surname></string-name>, and <string-name><given-names>J. G.</given-names> <surname>Shon</surname></string-name></person-group>, &#x201C;<article-title>An SDN-based distributed identifier locator separation scheme for IoT networks</article-title>,&#x201D; in <conf-name>Advances in Computer Science and Ubiquitous Computing</conf-name>, <year>2021</year>, pp. <fpage>349</fpage>&#x2013;<lpage>355</lpage>.</mixed-citation></ref>
<ref id="ref-109"><label>[109]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Altaf</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Braun</surname></string-name></person-group>, &#x201C;<article-title>A roadmap to smart homes security aided SDN and ML</article-title>,&#x201D; in <conf-name>5th Conf. Cloud and Internet of Things (CIoT)</conf-name>, <publisher-loc>Marrakech, Morocco</publisher-loc>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-110"><label>[110]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Babbar</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Rani</surname></string-name>, and <string-name><given-names>S. A.</given-names> <surname>AlQahtani</surname></string-name></person-group>, &#x201C;<article-title>Intelligent edge load migration in SDN-IIoT for smart healthcare</article-title>,&#x201D; <source>IEEE Trans. Ind. Inform.</source>, vol. <volume>18</volume>, no. <issue>11</issue>, pp. <fpage>8058</fpage>&#x2013;<lpage>8064</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1109/TII.2022.3172489</pub-id>.</mixed-citation></ref>
<ref id="ref-111"><label>[111]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Yan</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Huang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Ma</surname></string-name>, and <string-name><given-names>K.</given-names> <surname>Xie</surname></string-name></person-group>, &#x201C;<article-title>Certrust: An SDN-based framework for the trust of certificates against Crossfire attacks in IoT scenarios</article-title>,&#x201D; <source>Comput. Model. Eng. Sci.</source>, vol. <volume>134</volume>, no. <issue>3</issue>, pp. <fpage>2137</fpage>&#x2013;<lpage>2162</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.32604/cmes.2022.022462</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>