Design and Implementation of Secure DataTransmission Using SDN and Advanced Cryptographic Techniques
محفوظ في:
| الحاوية / القاعدة: | International Journal of Advanced Networking and Applications vol. 16, no. 6 (May/Jun 2025), p. 6670 |
|---|---|
| المؤلف الرئيسي: | |
| مؤلفون آخرون: | |
| منشور في: |
Eswar Publications
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | Citation/Abstract Full Text Full Text - PDF |
| الوسوم: |
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3222668307 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 0975-0290 | ||
| 022 | |a 0975-0282 | ||
| 035 | |a 3222668307 | ||
| 045 | 2 | |b d20250501 |b d20250630 | |
| 084 | |a 161428 |2 nlm | ||
| 100 | 1 | |a Manikumar, S Lakshmana |u Department of Computer Science, Government Arts College, Udumalpet, Tamil Nadu, India | |
| 245 | 1 | |a Design and Implementation of Secure DataTransmission Using SDN and Advanced Cryptographic Techniques | |
| 260 | |b Eswar Publications |c May/Jun 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a With the rapid evolution of network technologies, ensuring secure and efficient data transmission has become a critical challenge, especially with the increasing adoption of Software-Defined Networking (SDN). Traditional network architectures struggle to address security threats such as data breaches, unauthorized access, and control-plane attacks. SDN, while offering centralized control and programmability, also introduces vulnerabilities that can be exploited by malicious actors. This research focuses on designing and implementing a secure data transmission framework that integrates SDN with advanced cryptographic techniques to mitigate these security risks. The proposed framework employs AES-256 encryption for data confidentiality, Diffie-Hellman (DH) key exchange for secure key distribution, and Transport Layer Security (TLS) for securing control-plane communication. Unlike existing approaches, this multi-layered security model enhances network resilience while maintaining optimal performance. The methodology involves developing an SDN-based network environment using the Ryu controller and Mininet emulator, implementing encryption mechanisms, and evaluating key performance metrics such as packet delivery rate, latency, and resource utilization. Experimental results demonstrate a 100% packet delivery rate, no packet loss, and an average latency of 3-5 ms. Despite the slight increase in CPU and memory utilization, the framework effectively balances security and efficiency, making it a robust solution for modern network infrastructures. | |
| 653 | |a Encryption | ||
| 653 | |a Software | ||
| 653 | |a Data integrity | ||
| 653 | |a Performance measurement | ||
| 653 | |a Performance evaluation | ||
| 653 | |a Infrastructure | ||
| 653 | |a Network security | ||
| 653 | |a Multilayers | ||
| 653 | |a Communication | ||
| 653 | |a Confidentiality | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Design | ||
| 653 | |a Software-defined networking | ||
| 653 | |a Blockchain | ||
| 653 | |a Data transmission | ||
| 653 | |a Data encryption | ||
| 653 | |a Cryptography | ||
| 653 | |a Resource utilization | ||
| 653 | |a Cloud computing | ||
| 653 | |a Internet of Things | ||
| 653 | |a Field programmable gate arrays | ||
| 653 | |a Business metrics | ||
| 700 | 1 | |a Savitha, K |u Department of Computer Science, Government Arts College, Udumalpet, Tamil Nadu, India | |
| 773 | 0 | |t International Journal of Advanced Networking and Applications |g vol. 16, no. 6 (May/Jun 2025), p. 6670 | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3222668307/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3222668307/fulltext/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3222668307/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |