SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2231
PERFORMANCE ANALYSIS OF WIRELESS TRUSTED SOFTWARE
DEFINED NETWORKS
Angel Antonette Keziah .J 1, Rajarajeshwari.K.C2, M.Kirubha3
1 ,2,3 Assistant Professor, Dept. of Electronics and Communication Engineering, Sri Ramakrishna Institute of
Technology, Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Software defined network (SDN) provides a
centralized intelligence andcontrolmodelbytheseparationof
the data plane and the control plane that is well suited to
provide much needed flexibility to network security
deployments. Secured networks are critical to all businesses,
especially with their increased migration to the cloud and the
wave of innovation being unleashed by SDN. This paper
focuses on performance analysis of wireless trusted software
defined networks by considering performance matrices like
energy consumption, throughput, end-to-end delay, packet
delivery ratio for a particular topology model. Results show
that the performance of SDN networks is better than the
conventional networks which operate without SDN.
Furthermore, comparison of energy consumptionfordifferent
topology models which uses SDN is done.
Key words— Authentication, End-To-End Delay, Packet
Delivery Ratio, Throughput, SDN-Software Defined
Network
1. INTRODUCTION
Recently, Data centres have received significant
attention as a very important infrastructure for its ability to
store large amount of data and hosting large-scale service
applications. Today large companies use data centres for
their large scalecomputationsandITbusinesses.SDNoffersa
dynamicapproach to networking byseparating(decoupling)
the control plane and data forwarding plane of network
devices. The data plane is responsible for the actual
forwarding of the datapacketsthroughthenetworkusingthe
paths chosen by the control plane. The control plane realizes
the intelligence of a network. By decoupling the data and
control planes routing decisions can becentralizedandmade
by software, rather than decentralized decisions at every
router within the network.
As SDN has better featuresthanconventionalnetworks
more research and development study are being done as
regards to securing SDN by providing security key. Wide
usage of SDN in enhancing fields like underwater sensor
nodes, IOT has better prospects. This project began with a
literaturestudy to provide relevant background information
about the SDN networks and their security issues. SDN
architectures were developed to provide improved routing
and networking performance, however it changes the
network’s communication patterns, allowing new types of
attacks, and necessitating a new approach to securing the
network .The SDN architectures have not focused on
security.SDN security challenges are a combination of SDN,
and network security vulnerabilities. The highly secureSDN
Networks remains an open problem
Fig -1: The SDN Stack.
As seen from the Fig 1, SDN architectureis dividedinto
three layers: application layer, control layer, and
infrastructurelayer.Thisarchitectureprovidesthepossibility
to centralize the stateof the networkandtheintelligenceinto
one part of the network. This, enhances the property of
network programmability, the network industry can start to
innovateandenabledifferentiationinthedevelopingprocess.
Therefore, SDN can make networks become more scalable,
flexible and proactive. SDN architecture stack abstracts and
decouples hardware from software, control plane from
forwarding plane, and physical from logical configuration.
2. SDN BENEFITS AND CHALLENGES
SDN, with its inherent decoupling of control plane
from data plane, offers a greater control of a network
through programming. This combined feature would bring
potential benefits of enhanced configuration, improved
performance, and encouraged innovation in network
architecture and operations, as summarized in Table 1.
Moreover, with an ability to acquire instantaneous network
status, SDN permits a real-time centralized control of a
network based on both instantaneous network status and
user defined policies. This further leads to benefits in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2232
optimizing network configurations and improving network
performance. The potential benefit of SDN is further
evidenced by the fact that SDN offers a convenient platform
for experimentationsofnew techniquesandencourages new
network designs, attributed to its network programmability
and the ability to define isolated virtual networks via the
control plane. In the subsection, we dwell on these afore
mentioned benefits of SDN
TABLE -1: Comparison Between SDN And Conventional
Networks
CHARACTERISTICS SDN
CONVENTIONAL
NETWORKING
Features
Decoupled data and
control plane and
programmability
A new protocol per
problem, complex
network control
Configuration
Automated configuration
with centralized
validation
Error prone manual
configuration
Performance
Dynamic global control
with cross layer
information
Limited information
and relatively static
configuration
Innovation
Easy software
implementation for new
ideas, sufficient test
environment with
isolation, and quick
deployment using
software upgrade.
Difficult hardware
implementation for
new ideas, limited
testing environment,
long standardization
process.
In comparison from table 1, SDN encourages innovation
by providing a programmable network platform to
implement, experiment, and deploy new ideas, new
applications, and new revenue earningservicesconveniently
and flexibly. High configurability of SDN offers clear
separation among virtual networks permitting
experimentation on a real environment. Progressive
deployment of new ideas can be performed through a
seamless transition from an experimental phase to an
operational phase.
Given the promises of enhancedconfiguration,improved
performance, and encouraged innovation, SDN is still in its
infancy. Many fundamental issues still remain not fully
solved, among which security is the most urgent ones.
Common concerns include SDN interoperability with legacy
network devices, performance and privacy concerns of
centralized control, and lackof experts for technical support.
3. Performance Metrics
The following are the metrics that are used for
performance analyses.
 End-to-end delay is the average time it takes a data
packet to reach the destination. This includes all
possible delays caused by buffering during route
discovery latency, queuing at the interface queue. This
metric is calculated by subtracting time at which first
packet was transmitted by source from time at which
first data packetarrived to destination. Mathematically,
it can be defined as: Avg.EED=S/N Where S is thesumof
the time spent to deliver packets for each destination,
and N is the number of packets received by the all
destination nodes.
 Packet delivery ratio is defined as the total number of
packets delivered over the total simulation time.Packet
delivery ratio Packet delivery ratio is defined as the
ratio of data packets received by the destinations to
those generated by the sources. Mathematically, it can
be defined as: PDR= S1Ă· S2 Where, S1 is the sum of data
packets received by the each destination and S2 is the
sum of data packets generated by the each source.
 Throughput is a measure of how many units of
information a system can process in a given amount of
time. Throughput is usually measured in bits per
second (and sometimes in data packets per second or
data packets per time slot.
4. Security Analyses Of SDN
The basic properties of a secure communications
network are: confidentiality, integrity, availability of
information, authentication and non-repudiation. Inorderto
provide a network protected from malicious attack or
unintentionaldamage,securityprofessionalsmustsecurethe
data, the network assets (e.g. devices) and the
communication transactions across the network. The
alterations to the network architecture introduced by SDN
must be assessed to ensure that network security is
sustained. Systems are becoming increasingly complex. This
complexity in turn has led to increased risk and severity of
bugs and errors in implementations. This complexity
increases with virtualization within networks, as increasing
numbers of traditional hardware functions are realized by
software. This puts a large amount of pressure upon
programmers to deliver flawless software solutions.
Additionally, this pressure is increasing due to the business
trend towards cloud computing. The aim is to ensure that
networks are protected from attack by malicious intruders.
Networks that are built according to SDN architecture
principles need to protect a number of key security assets:
 Availability – the network should remain
operational even under attack.
 Performance – the network should be able to
guarantee a baseline bandwidth and latency in the
event of an attack
 Integrityand confidentiality–controlplaneanddata
plane integrity and isolation should be upheld
between tenants.
To assure protection of these assets, a number of
processes need to be in place. They are authentication and
authorization, resiliency, multi-domain isolation and
repudiation. Authentication and authorization are the
processes used to identify an unknown source and then
determine its access privileges.Implementedcorrectly,these
processes can protect networks from certain types of attack,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2233
such as Provision of false (statistical) feedback to thesystem,
Modification of a valid on-path request, Forwarding Traffic
that is not meant to be forwarded or not forwarding, Gaining
control access to any component. The critical nature of the
SDNC dictates that additional security measures need to be
taken to protect it.And so, all communication within the
control plane must be mutually authenticated. Security
protocols like TLS and IPSEC provide a means for mutual
authentication as well as for replay attack protection,
confidentiality, and integrity protection. Encryption and
integrity protection without mutual authentication are less
useful from a security point of view. The problem with
mutual authentication is that it requires previousknowledge
of the remotecommunicating endpoint – unless a commonly
trusted third party exists.
The major security threats are denial of service attack,
vulnerability attack, connection flooding and bandwidth
flooding. Due to these security threats thereisanurgingneed
to focus on the security issues of SDN as SDN is the current
emerging technology.
5. Proposed Methodology
The SDN architectures have not focused on
security.SDN security challenges are a combination of SDN,
and network security vulnerabilities. The highly secure SDN
Networks remains an open problem. The need of the hour is
to develop a secured SDN to overcome the security issues by
providing a secure networking architecture that secures the
data within each layer of communication packet utilizing
SDN centralized controller for secure routing and
performance management.
While advantage of the SDN framework has been
recognized, solutions to tackle the challenges of securing the
SDN network are fewer in number. SDNs provide us with the
ability to easily program the network and to allow for the
creation of dynamic flow policies. It is, in fact, this advantage
that may also lead to security vulnerabilities. Within this
dynamic environment, it is vital that network security policy
is enforced. The promises of agility, simplified control, and
real-time programmability offered by software-defined
networking (SDN) are attractive incentives for operators to
keep networkevolutionapacewithadvancesinvirtualization
technologies. But thecapabilitiesthatunderminethesecurity
is a question to be answered. The aim is to ensure that
networks are protected from attack by malicious intruders.
The proposed methodology is a secured SDN which
focuses on the one of the three assets of security;
Authentication which secures the communication between
nodes. Various wireless topologies likegrid,randomandtree
are developed based on theSDNconcepts.Inthesetopologies
the data plane and control plane are separated and one node
is made to act as SDN controller which controls the entire
network. This approach provides us with the ability to easily
program the network.
AODV is used for authentication .One distinguishing
feature of AODV is its use of a destination sequence number
for each route entry. The destination sequence number is
created by the destination to be included along with any
route information it sends to requesting nodes. Given the
choice between two routes to a destination, a requesting
node is required to select the one with the greatest sequence
number. Requests (RREQs), Route Replies (RREPs), and
Route Errors (RERRs) are the message types defined by
AODV. When a route to a new destination is needed, thenode
broadcasts a RREQ to find a route to the destination. A route
can be determined when the RREQ reaches the SDN
controller. The route is madeavailable by unicasting a RREP
back to the origination of the RREQ. Each node receiving the
request caches a route back to the originator of the request,
so that the RREP can be unicast from the destination along a
path to that originator, or likewise from any intermediate
node (SDN controller) that is able to satisfy the request.
When a link break in an active route is detected, a RERR
message is used to notify other nodes that thelossofthatlink
has occurred. The RERR message indicates those
destinations which are no longer reachable by way of the
broken link.
The Fig 2 gives a flow graph of the proposed work. The
topologies withSDNcontrollerareauthenticatedbyusingthe
above mentioned process and various analyses are
considered based on the energy consumption, packet
delivery, throughput and the time delay. Of which SDN out
beats the conventional network in terms of energy
consumption and the time taken
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2234
Fig- 2: Flow Chart for Authentication Process
6. EXPERIMENTAL RESULTS
In this project the SDN concept is considered
especially from the perspective of network authentication
and the Data Plane and Control plane is separated in three
wireless topologies and the performance metrics are
calculated. Fig 3 illustrate wireless Grid Topology based on
SDN concept wherein separation of Data Plane and Control
plane is done by using one of the nodes as SDN Controller.
The other nodes that wish to send their data have to obtain
authentication from the SDN controller
Fig-3: Grid Topology
Random Topology is elaborated in Fig 4 by separating Data
and Control Planes. In fig 5 Packet Drop is seen at times
when more number of nodes send request to the controller
at the same time. This Topology is less preferred owing to
the packet drop.
Fig 4: Random Topology
Fig -5: Packet Drop In Random Topology
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2235
In the Tree Topology is shown in Fig 6. The Root Node is
considered as SDN. Nodes C1, C2 and C3 are nodes which
initiate transmission. C1first seeksauthenticationfromSDN,
followed by C2 and C3
Fig -6: Tree Topology
The following graph in Fig 7 illustrates energy
consumption against time taken in grid topology .It
elaborates that energy consumption in SDN networks is
much lesser compared to the conventional networks Values
varied to evaluate energy consumption by using upto 50
nodes.
Fig -7: Energy Consumption With and Without SDN
The below figure illustrates packet delivery ratio
versus time in grid topology. The Packet delivery Ratio in
network with SDN is higher in the given time compared to
without SDN according to the graph obtained in Fig.8
Fig -8: Packet Delivery Ratio With and Without SDN
The Fig 9 shows graph against end-to end delay and time
with and without SDN using grid topology. The End-To-End
Delay is observed to be less in SDN compared to traditional
network without SDN
Fig -9: End-To-End Delay with SDN and Without SDN
In fig 10 throughputs versus time is plotted and as seen in
the figure throughput in SDN is high when compared to
without SDN.
Fig 10: Throughput With and Without SDN
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2236
The below Fig 11 shows comparison of three
topologies with SDN against energy consumption and
number of nodes by varying up to 50 nodes. Comparatively
Random Topology has seen to consume highest energy
followed by Tree and then Grid. As a result it has been
observed that only Grid topology consumes less energy.
Fig 11: Energy Consumption of Different Topologies With
SDN
Fig -12: Energy Consumption of Different Topologies with
SDN against Time
The graph in Fig 12 elucidated, compares energy
consumption versus time taken in random, grid and tree
topology. The graph elucidates that in the given time,
Random Topology consumes more energy while there is a
slight variation in the Grid and tree topologies.
7. Conclusion And Future Work
Software-defined networking is a new concept to
manage and configure computer networks. The main idea of
the SDN concept is to separate the controlling layer of the
computer network fromthenetwork switchesandcentralize
it to the SDN controller. The centralized managementbrings
a new way to control network functionality with one single
application instead of configuring hundreds and thousands
of devices independently.
In this paper the SDN concept is addressed especially
from the perspective of network security. The security
improvements are explored and solutions are proposed for
an enhanced security. But, still more research needs to be
done to obtain highly secured network.NS2 software is used
to study the parameters involved and to develop the
proposed solution. Authentication mechanism is provided
which secures the communication between nodes, thereby
providing security. Different wireless topologies like grid,
tree and random has been created with SDN controller and
performance metrics like energy consumptionVsnumberof
nodes, energy Vs time, throughput, end to end delay and
packet delivery ratio are analyzed for the same. Energy
consumption and the time taken is analyzed and compared
with SDN and without SDN .Wherein, without SDN,
consumes less energy than the normal conventional
networks which is a great advantage for SDN and another
advantage is the lesser time consumed. Although this paper
gives out some advantages based on the project work, still
security can be enhanced to provide a highly secured
network. The SDN will be the leadingnetworkingtechnology
in the future but it still needs a little more time to evolve.
However the future perspectiveofusageofSDN isvery
high. As SDN has better featuresthanconventional networks
more research and development study shall be done as
regards to securing SDN by providing security key. Wide
usage of SDN in enhancing fields like underwater sensor
nodes, IOT has better prospects
8. BIBLIOGRAPHY
1. Diogo Menezes Ferrazani Mattos, Lyno Henrique
Goncžalves Ferraz,Otto Carlos Muniz Bandeira Duarte,
“AuthFlow: Authentication and Access Control
Mechanism for Software Defined Networking,”IEEE
International conference on computer networks,2013.
2. Feliksas Kuliesius, and Vainius Dangovas, “SDN
Enhanced Campus Network Authentication andAccess
Control System”,IEEE International Conference on
Computer Science and Network Technology, 2015.
3. Ruikang Zhou,Yingxu Lai,ZenghuiLiu,JingLiu,“Studyon
authentication protocol of SDN trusted domain”, IEEE
Twelfth International Symposium on Autonomous
Decentralized Systems, 2015.
4. Caraguay ALV, Lopez LIB, Villalba LJG,“Evolution and
Challenges of Software Defined Networking”, IEEE
Communications Magazine,2012.
5. Patouni E, Merentitis A, Panagiotopoulos P, Glentis A,
Alonistioti N, “Network VirtualisationTrends:Virtually
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2237
Anything Is Possible by Connecting the Unconnected”,
IEEE SDN for Future Networks and Services
(SDN4FNS),2013.
6. CasadoM, Koponen T, Shenker S, Tootoonchian A,
“Fabric: A retrospectiveon evolvingSDN”,International
journal on SDN, 2012.
7. Monteleone G, Paglierani P,“Session Border Controller
Virtualization Towards Service-Defined Networks
Based on NFV and SDN”,IEEE SDN for Future Networks
and Services (SDN4FNS), 2013.
8. Gelberger A, Yemini N, Giladi R, “Performance Analysis
of Software-Defined Networking (SDN)”,IEEE 21st
International Symposium on Modeling, Analysis &
Simulation of Computer and Telecommunication
Systems (MASCOTS),2013
9. Lara A, Kolasani A, Ramamurthy B, “Network
Innovation using OpenFlow: A Survey”, IEEE
Communications Surveys & Tutorials,2014
10. Akyildiz IF, Lee A, Wang P, Luo M, Chou W, “A roadmap
for traffic engineering in SDN-OpenFlow
networks”,International conference on Computer
Networks,2014
11. Jin D, Nicol DM, “simulation of software defined
networks”,springer,2013
12. Raghavan B, Koponen T, Ghodsi A, Casado M,
Ratnasamy S, Shenker S,”Software-defined internet
architecture: decoupling architecture from
infrastructure”,ACM Hotnets ’12,2012
13. Bhattacharya B, Das D,”SDNbasedArchitectureforQOS
Enabled Services across Networks with Dynamic
Service Level Agreement”,IEEE ANTS, 2013.
14. Kobayashi M, Seetharaman S, Parulkar G, Appenzeller
G, Little J, van Reijendam J, Weissmann P, McKeown
N,”Maturing of Open Flow and Software-defined
Networking through deployments”,IEEEConferenceon
Computer Networks,2014
15. Galis A, Clayman S, Mamatas L, Rubio Loyola J,
Manzalini A, Kuklinski S, Serrat J, Zahariadis
T,”Softwarization of Future Networks and Services -
Programmable Enabled Networks as Next Generation
Software Defined Networks”, IEEE SDN for Future
Networks and Services(SDN4FNS),2013.
16. Caraguay ALV, Lopez LIB, Villalba LJG,”Evolution and
Challenges of Software Defined Networking”, IEEE
Communications Magazine,2012.
17. Cahn A, Hoyos J, Hulse M, Keller E,”Software-Defined
Energy Communication Networks: From Substation
Automation to Future Smart Grids”,IEEE Smart Grid
Communication 2013 Symposium - Smart Grid
Services and Management Models,2013
18. Wang J, Wang Y, Hu H, Sun Q, Shi H, Zeng L,”Towards a
Security-Enhanced Firewall Application for OpenFlow
Networks”,Springer LNCS CSS,2013.

More Related Content

What's hot

Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Siyabonga Masuku
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetIOSR Journals
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelIRJET Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
 
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerUnified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerSaikat Chaudhuri
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET Journal
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkIRJET Journal
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters usingeSAT Publishing House
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANAn Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANrahulmonikasharma
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 

What's hot (19)

Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
 
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerUnified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
 
SEDRP
SEDRPSEDRP
SEDRP
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANAn Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 

Similar to Performance Analysis of Wireless Trusted Software Defined Networks

Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyIRJET Journal
 
Security sdn
Security sdnSecurity sdn
Security sdnPriya Singh
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET Journal
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfFernando Velez Varela
 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxrosemariebrayshaw
 
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architecturesController Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architecturesIJCNCJournal
 
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesController Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesIJCNCJournal
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow ControllerIRJET Journal
 
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...IRJET Journal
 
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringSoftware Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringQuEST Global (erstwhile NeST Software)
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...IRJET Journal
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...IJECEIAES
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkIRJET Journal
 

Similar to Performance Analysis of Wireless Trusted Software Defined Networks (20)

Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
 
Security sdn
Security sdnSecurity sdn
Security sdn
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
 
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architecturesController Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architectures
 
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesController Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
 
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringSoftware Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic Engineering
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Performance Analysis of Wireless Trusted Software Defined Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2231 PERFORMANCE ANALYSIS OF WIRELESS TRUSTED SOFTWARE DEFINED NETWORKS Angel Antonette Keziah .J 1, Rajarajeshwari.K.C2, M.Kirubha3 1 ,2,3 Assistant Professor, Dept. of Electronics and Communication Engineering, Sri Ramakrishna Institute of Technology, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Software defined network (SDN) provides a centralized intelligence andcontrolmodelbytheseparationof the data plane and the control plane that is well suited to provide much needed flexibility to network security deployments. Secured networks are critical to all businesses, especially with their increased migration to the cloud and the wave of innovation being unleashed by SDN. This paper focuses on performance analysis of wireless trusted software defined networks by considering performance matrices like energy consumption, throughput, end-to-end delay, packet delivery ratio for a particular topology model. Results show that the performance of SDN networks is better than the conventional networks which operate without SDN. Furthermore, comparison of energy consumptionfordifferent topology models which uses SDN is done. Key words— Authentication, End-To-End Delay, Packet Delivery Ratio, Throughput, SDN-Software Defined Network 1. INTRODUCTION Recently, Data centres have received significant attention as a very important infrastructure for its ability to store large amount of data and hosting large-scale service applications. Today large companies use data centres for their large scalecomputationsandITbusinesses.SDNoffersa dynamicapproach to networking byseparating(decoupling) the control plane and data forwarding plane of network devices. The data plane is responsible for the actual forwarding of the datapacketsthroughthenetworkusingthe paths chosen by the control plane. The control plane realizes the intelligence of a network. By decoupling the data and control planes routing decisions can becentralizedandmade by software, rather than decentralized decisions at every router within the network. As SDN has better featuresthanconventionalnetworks more research and development study are being done as regards to securing SDN by providing security key. Wide usage of SDN in enhancing fields like underwater sensor nodes, IOT has better prospects. This project began with a literaturestudy to provide relevant background information about the SDN networks and their security issues. SDN architectures were developed to provide improved routing and networking performance, however it changes the network’s communication patterns, allowing new types of attacks, and necessitating a new approach to securing the network .The SDN architectures have not focused on security.SDN security challenges are a combination of SDN, and network security vulnerabilities. The highly secureSDN Networks remains an open problem Fig -1: The SDN Stack. As seen from the Fig 1, SDN architectureis dividedinto three layers: application layer, control layer, and infrastructurelayer.Thisarchitectureprovidesthepossibility to centralize the stateof the networkandtheintelligenceinto one part of the network. This, enhances the property of network programmability, the network industry can start to innovateandenabledifferentiationinthedevelopingprocess. Therefore, SDN can make networks become more scalable, flexible and proactive. SDN architecture stack abstracts and decouples hardware from software, control plane from forwarding plane, and physical from logical configuration. 2. SDN BENEFITS AND CHALLENGES SDN, with its inherent decoupling of control plane from data plane, offers a greater control of a network through programming. This combined feature would bring potential benefits of enhanced configuration, improved performance, and encouraged innovation in network architecture and operations, as summarized in Table 1. Moreover, with an ability to acquire instantaneous network status, SDN permits a real-time centralized control of a network based on both instantaneous network status and user defined policies. This further leads to benefits in
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2232 optimizing network configurations and improving network performance. The potential benefit of SDN is further evidenced by the fact that SDN offers a convenient platform for experimentationsofnew techniquesandencourages new network designs, attributed to its network programmability and the ability to define isolated virtual networks via the control plane. In the subsection, we dwell on these afore mentioned benefits of SDN TABLE -1: Comparison Between SDN And Conventional Networks CHARACTERISTICS SDN CONVENTIONAL NETWORKING Features Decoupled data and control plane and programmability A new protocol per problem, complex network control Configuration Automated configuration with centralized validation Error prone manual configuration Performance Dynamic global control with cross layer information Limited information and relatively static configuration Innovation Easy software implementation for new ideas, sufficient test environment with isolation, and quick deployment using software upgrade. Difficult hardware implementation for new ideas, limited testing environment, long standardization process. In comparison from table 1, SDN encourages innovation by providing a programmable network platform to implement, experiment, and deploy new ideas, new applications, and new revenue earningservicesconveniently and flexibly. High configurability of SDN offers clear separation among virtual networks permitting experimentation on a real environment. Progressive deployment of new ideas can be performed through a seamless transition from an experimental phase to an operational phase. Given the promises of enhancedconfiguration,improved performance, and encouraged innovation, SDN is still in its infancy. Many fundamental issues still remain not fully solved, among which security is the most urgent ones. Common concerns include SDN interoperability with legacy network devices, performance and privacy concerns of centralized control, and lackof experts for technical support. 3. Performance Metrics The following are the metrics that are used for performance analyses.  End-to-end delay is the average time it takes a data packet to reach the destination. This includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue. This metric is calculated by subtracting time at which first packet was transmitted by source from time at which first data packetarrived to destination. Mathematically, it can be defined as: Avg.EED=S/N Where S is thesumof the time spent to deliver packets for each destination, and N is the number of packets received by the all destination nodes.  Packet delivery ratio is defined as the total number of packets delivered over the total simulation time.Packet delivery ratio Packet delivery ratio is defined as the ratio of data packets received by the destinations to those generated by the sources. Mathematically, it can be defined as: PDR= S1Ă· S2 Where, S1 is the sum of data packets received by the each destination and S2 is the sum of data packets generated by the each source.  Throughput is a measure of how many units of information a system can process in a given amount of time. Throughput is usually measured in bits per second (and sometimes in data packets per second or data packets per time slot. 4. Security Analyses Of SDN The basic properties of a secure communications network are: confidentiality, integrity, availability of information, authentication and non-repudiation. Inorderto provide a network protected from malicious attack or unintentionaldamage,securityprofessionalsmustsecurethe data, the network assets (e.g. devices) and the communication transactions across the network. The alterations to the network architecture introduced by SDN must be assessed to ensure that network security is sustained. Systems are becoming increasingly complex. This complexity in turn has led to increased risk and severity of bugs and errors in implementations. This complexity increases with virtualization within networks, as increasing numbers of traditional hardware functions are realized by software. This puts a large amount of pressure upon programmers to deliver flawless software solutions. Additionally, this pressure is increasing due to the business trend towards cloud computing. The aim is to ensure that networks are protected from attack by malicious intruders. Networks that are built according to SDN architecture principles need to protect a number of key security assets:  Availability – the network should remain operational even under attack.  Performance – the network should be able to guarantee a baseline bandwidth and latency in the event of an attack  Integrityand confidentiality–controlplaneanddata plane integrity and isolation should be upheld between tenants. To assure protection of these assets, a number of processes need to be in place. They are authentication and authorization, resiliency, multi-domain isolation and repudiation. Authentication and authorization are the processes used to identify an unknown source and then determine its access privileges.Implementedcorrectly,these processes can protect networks from certain types of attack,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2233 such as Provision of false (statistical) feedback to thesystem, Modification of a valid on-path request, Forwarding Traffic that is not meant to be forwarded or not forwarding, Gaining control access to any component. The critical nature of the SDNC dictates that additional security measures need to be taken to protect it.And so, all communication within the control plane must be mutually authenticated. Security protocols like TLS and IPSEC provide a means for mutual authentication as well as for replay attack protection, confidentiality, and integrity protection. Encryption and integrity protection without mutual authentication are less useful from a security point of view. The problem with mutual authentication is that it requires previousknowledge of the remotecommunicating endpoint – unless a commonly trusted third party exists. The major security threats are denial of service attack, vulnerability attack, connection flooding and bandwidth flooding. Due to these security threats thereisanurgingneed to focus on the security issues of SDN as SDN is the current emerging technology. 5. Proposed Methodology The SDN architectures have not focused on security.SDN security challenges are a combination of SDN, and network security vulnerabilities. The highly secure SDN Networks remains an open problem. The need of the hour is to develop a secured SDN to overcome the security issues by providing a secure networking architecture that secures the data within each layer of communication packet utilizing SDN centralized controller for secure routing and performance management. While advantage of the SDN framework has been recognized, solutions to tackle the challenges of securing the SDN network are fewer in number. SDNs provide us with the ability to easily program the network and to allow for the creation of dynamic flow policies. It is, in fact, this advantage that may also lead to security vulnerabilities. Within this dynamic environment, it is vital that network security policy is enforced. The promises of agility, simplified control, and real-time programmability offered by software-defined networking (SDN) are attractive incentives for operators to keep networkevolutionapacewithadvancesinvirtualization technologies. But thecapabilitiesthatunderminethesecurity is a question to be answered. The aim is to ensure that networks are protected from attack by malicious intruders. The proposed methodology is a secured SDN which focuses on the one of the three assets of security; Authentication which secures the communication between nodes. Various wireless topologies likegrid,randomandtree are developed based on theSDNconcepts.Inthesetopologies the data plane and control plane are separated and one node is made to act as SDN controller which controls the entire network. This approach provides us with the ability to easily program the network. AODV is used for authentication .One distinguishing feature of AODV is its use of a destination sequence number for each route entry. The destination sequence number is created by the destination to be included along with any route information it sends to requesting nodes. Given the choice between two routes to a destination, a requesting node is required to select the one with the greatest sequence number. Requests (RREQs), Route Replies (RREPs), and Route Errors (RERRs) are the message types defined by AODV. When a route to a new destination is needed, thenode broadcasts a RREQ to find a route to the destination. A route can be determined when the RREQ reaches the SDN controller. The route is madeavailable by unicasting a RREP back to the origination of the RREQ. Each node receiving the request caches a route back to the originator of the request, so that the RREP can be unicast from the destination along a path to that originator, or likewise from any intermediate node (SDN controller) that is able to satisfy the request. When a link break in an active route is detected, a RERR message is used to notify other nodes that thelossofthatlink has occurred. The RERR message indicates those destinations which are no longer reachable by way of the broken link. The Fig 2 gives a flow graph of the proposed work. The topologies withSDNcontrollerareauthenticatedbyusingthe above mentioned process and various analyses are considered based on the energy consumption, packet delivery, throughput and the time delay. Of which SDN out beats the conventional network in terms of energy consumption and the time taken
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2234 Fig- 2: Flow Chart for Authentication Process 6. EXPERIMENTAL RESULTS In this project the SDN concept is considered especially from the perspective of network authentication and the Data Plane and Control plane is separated in three wireless topologies and the performance metrics are calculated. Fig 3 illustrate wireless Grid Topology based on SDN concept wherein separation of Data Plane and Control plane is done by using one of the nodes as SDN Controller. The other nodes that wish to send their data have to obtain authentication from the SDN controller Fig-3: Grid Topology Random Topology is elaborated in Fig 4 by separating Data and Control Planes. In fig 5 Packet Drop is seen at times when more number of nodes send request to the controller at the same time. This Topology is less preferred owing to the packet drop. Fig 4: Random Topology Fig -5: Packet Drop In Random Topology
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2235 In the Tree Topology is shown in Fig 6. The Root Node is considered as SDN. Nodes C1, C2 and C3 are nodes which initiate transmission. C1first seeksauthenticationfromSDN, followed by C2 and C3 Fig -6: Tree Topology The following graph in Fig 7 illustrates energy consumption against time taken in grid topology .It elaborates that energy consumption in SDN networks is much lesser compared to the conventional networks Values varied to evaluate energy consumption by using upto 50 nodes. Fig -7: Energy Consumption With and Without SDN The below figure illustrates packet delivery ratio versus time in grid topology. The Packet delivery Ratio in network with SDN is higher in the given time compared to without SDN according to the graph obtained in Fig.8 Fig -8: Packet Delivery Ratio With and Without SDN The Fig 9 shows graph against end-to end delay and time with and without SDN using grid topology. The End-To-End Delay is observed to be less in SDN compared to traditional network without SDN Fig -9: End-To-End Delay with SDN and Without SDN In fig 10 throughputs versus time is plotted and as seen in the figure throughput in SDN is high when compared to without SDN. Fig 10: Throughput With and Without SDN
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2236 The below Fig 11 shows comparison of three topologies with SDN against energy consumption and number of nodes by varying up to 50 nodes. Comparatively Random Topology has seen to consume highest energy followed by Tree and then Grid. As a result it has been observed that only Grid topology consumes less energy. Fig 11: Energy Consumption of Different Topologies With SDN Fig -12: Energy Consumption of Different Topologies with SDN against Time The graph in Fig 12 elucidated, compares energy consumption versus time taken in random, grid and tree topology. The graph elucidates that in the given time, Random Topology consumes more energy while there is a slight variation in the Grid and tree topologies. 7. Conclusion And Future Work Software-defined networking is a new concept to manage and configure computer networks. The main idea of the SDN concept is to separate the controlling layer of the computer network fromthenetwork switchesandcentralize it to the SDN controller. The centralized managementbrings a new way to control network functionality with one single application instead of configuring hundreds and thousands of devices independently. In this paper the SDN concept is addressed especially from the perspective of network security. The security improvements are explored and solutions are proposed for an enhanced security. But, still more research needs to be done to obtain highly secured network.NS2 software is used to study the parameters involved and to develop the proposed solution. Authentication mechanism is provided which secures the communication between nodes, thereby providing security. Different wireless topologies like grid, tree and random has been created with SDN controller and performance metrics like energy consumptionVsnumberof nodes, energy Vs time, throughput, end to end delay and packet delivery ratio are analyzed for the same. Energy consumption and the time taken is analyzed and compared with SDN and without SDN .Wherein, without SDN, consumes less energy than the normal conventional networks which is a great advantage for SDN and another advantage is the lesser time consumed. Although this paper gives out some advantages based on the project work, still security can be enhanced to provide a highly secured network. The SDN will be the leadingnetworkingtechnology in the future but it still needs a little more time to evolve. However the future perspectiveofusageofSDN isvery high. As SDN has better featuresthanconventional networks more research and development study shall be done as regards to securing SDN by providing security key. Wide usage of SDN in enhancing fields like underwater sensor nodes, IOT has better prospects 8. BIBLIOGRAPHY 1. Diogo Menezes Ferrazani Mattos, Lyno Henrique Goncžalves Ferraz,Otto Carlos Muniz Bandeira Duarte, “AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking,”IEEE International conference on computer networks,2013. 2. Feliksas Kuliesius, and Vainius Dangovas, “SDN Enhanced Campus Network Authentication andAccess Control System”,IEEE International Conference on Computer Science and Network Technology, 2015. 3. Ruikang Zhou,Yingxu Lai,ZenghuiLiu,JingLiu,“Studyon authentication protocol of SDN trusted domain”, IEEE Twelfth International Symposium on Autonomous Decentralized Systems, 2015. 4. Caraguay ALV, Lopez LIB, Villalba LJG,“Evolution and Challenges of Software Defined Networking”, IEEE Communications Magazine,2012. 5. Patouni E, Merentitis A, Panagiotopoulos P, Glentis A, Alonistioti N, “Network VirtualisationTrends:Virtually
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2237 Anything Is Possible by Connecting the Unconnected”, IEEE SDN for Future Networks and Services (SDN4FNS),2013. 6. CasadoM, Koponen T, Shenker S, Tootoonchian A, “Fabric: A retrospectiveon evolvingSDN”,International journal on SDN, 2012. 7. Monteleone G, Paglierani P,“Session Border Controller Virtualization Towards Service-Defined Networks Based on NFV and SDN”,IEEE SDN for Future Networks and Services (SDN4FNS), 2013. 8. Gelberger A, Yemini N, Giladi R, “Performance Analysis of Software-Defined Networking (SDN)”,IEEE 21st International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS),2013 9. Lara A, Kolasani A, Ramamurthy B, “Network Innovation using OpenFlow: A Survey”, IEEE Communications Surveys & Tutorials,2014 10. Akyildiz IF, Lee A, Wang P, Luo M, Chou W, “A roadmap for traffic engineering in SDN-OpenFlow networks”,International conference on Computer Networks,2014 11. Jin D, Nicol DM, “simulation of software defined networks”,springer,2013 12. Raghavan B, Koponen T, Ghodsi A, Casado M, Ratnasamy S, Shenker S,”Software-defined internet architecture: decoupling architecture from infrastructure”,ACM Hotnets ’12,2012 13. Bhattacharya B, Das D,”SDNbasedArchitectureforQOS Enabled Services across Networks with Dynamic Service Level Agreement”,IEEE ANTS, 2013. 14. Kobayashi M, Seetharaman S, Parulkar G, Appenzeller G, Little J, van Reijendam J, Weissmann P, McKeown N,”Maturing of Open Flow and Software-defined Networking through deployments”,IEEEConferenceon Computer Networks,2014 15. Galis A, Clayman S, Mamatas L, Rubio Loyola J, Manzalini A, Kuklinski S, Serrat J, Zahariadis T,”Softwarization of Future Networks and Services - Programmable Enabled Networks as Next Generation Software Defined Networks”, IEEE SDN for Future Networks and Services(SDN4FNS),2013. 16. Caraguay ALV, Lopez LIB, Villalba LJG,”Evolution and Challenges of Software Defined Networking”, IEEE Communications Magazine,2012. 17. Cahn A, Hoyos J, Hulse M, Keller E,”Software-Defined Energy Communication Networks: From Substation Automation to Future Smart Grids”,IEEE Smart Grid Communication 2013 Symposium - Smart Grid Services and Management Models,2013 18. Wang J, Wang Y, Hu H, Sun Q, Shi H, Zeng L,”Towards a Security-Enhanced Firewall Application for OpenFlow Networks”,Springer LNCS CSS,2013.