Attacks notification of differentiated services code point (DSCP) values modifications

AA Alarood, AA Ibrahim, FS Alsubaei - IEEE Access, 2023‏ - ieeexplore.ieee.org
The DSCP is an integral component within the Internet Protocol (IP) header of a packet,
serving the purpose of categorizing and administering network traffic, as well as facilitating …

Beyond the Basics: An In-Depth Analysis and Multidimensional Survey of Programmable Switch in Software-Defined Networking

VA Shirsath, MM Chandane - International Journal of Networked and …, 2025‏ - Springer
The development of the programmable switch in software-defined networks (SDNs) is
known for its rapid technological advancements. This growing domain has a wealth of …

Transparent Broadband VPN Gateway: Achieving 0.39 Tbps per Tunnel with Bump-in-the-Wire

K Tanaka, T Uchida, Y Matsuda… - … -IEEE Conference on …, 2024‏ - ieeexplore.ieee.org
The demand for virtual private networks (VPNs) that provide confidentiality, integrity, and
authenticity of communications is growing every year. IPsec is one of the oldest and most …

Establishment of IPsec Security Associations with Diffie–Hellman following a SDN-based framework: Analysis and practical validation

JA Parra-Espín, R Marín-López, G López-Millán - Computer Networks, 2024‏ - Elsevier
The centralized management of IPsec Security Associations (SAs) by using Software
Defined Network (SDN) paradigm has been already explored and standardized …

Towards improving the security of wireless networks using secured session keys

NGN Amma, T Jayaraj, NGB Amma - Information Security Journal …, 2025‏ - Taylor & Francis
Wireless Networks are mostly based on the IEEE 802.11 standards and with so many
applications being wireless, without proper security, sensitive information may be at risk …

Investigating the Effectiveness of Internet Key Exchange (IKE) Protocol in Wireless Network Security

D Mondal, N Thangarasu, YS Ingle… - … on Smart Generation …, 2023‏ - ieeexplore.ieee.org
The Internet Key alternate (IKE) protocol is a widely used safety protocol for organizing
comfy tunnels and encrypting visitors in wireless networks. The protocol is designed to …