Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
The design of MPE algorithm in software defined network
Author(s):
1. Saleem S. Sharqy: Faculty of Electronic Engineering and Technology, Universiti Malaysia Perlis, Pauh Putra, Arau Perlis, Malaysia; Software Development Manager, Department Of Religious Education and Islamic Studies, Baghdad, Iraq
2. Bi-Lynn Ong: Centre of Excellence for Advanced Computing, Faculty of Electronic Engineering and Technology (FKTEN),Universiti Malaysia Perlis (UniMAP), Pauh Putra Campus, Arau, Perlis,Malaysia
3. Naimah Yaakob: Faculty of Electronic Engineering and Technology,Universiti Malaysia Perlis, Pauh Putra, Arau Perlis,Malaysia
Abstract:
The biggest issue in the current encryption field is to secure any kind of data such that it cannot be used or misused by an unknown person. The journey from the old coding methods like embossing on leather, paper, etc., to advanced cryptographic systems has shown how craving we humans are for secure communications. Advancements in encryption methods from the increasing ubiquitous availability of quantum technology have also presented new challenges and opportunities. MPE merges more advanced ciphers like the rotating operation and binary codes to enable some of the most secure methods for encrypting data. This research proposes the utilization of SDN to enhance the MPE algorithm for the purpose of bolstering network security. The flexibility of SDN permits dynamically variable network designs, thereby enhancing the management of operations for resource distribution. Integrating MPE encrypted into the SDN design guarantees safe transmission across several tiers, safeguarding private data, including medical records, payments, and organisational content, from unwanted access. The integration offers a resilient framework for the safe transmission of encrypted data, guaranteeing that collected information remains indecipherable in the event of a breach. Furthermore, MPE's advanced rotating and cipher key procedures bolster the encryption's resistance, making it impervious to advancing technical threats. The results indicate that the integration of MPE with SDN markedly enhances network security and is a viable solution to forthcoming encryption difficulties.
Page(s): 334-344
DOI: DOI not available
Published: Journal: ARPN Journal of Engineering and Applied Sciences, Volume: 20, Issue: 6, Year: 2025
Keywords:
Encryption , MPE algorithm , softwaredefined network
References:
[1] Smith J.,Doe A. .2020 .Software-Defined Networking: Principles and Paradigms. , : .
[2] Brown L.,Green M. .2019 .The Evolution of SDN: From Concept to Deployment. Journal of Network Engineering, 15(3) : 123-135.
[3] Chen X.,Kumar P. .2021 .Cryptographic Challenges in Software-Defined Networks. International Journal of Cyber Security, 12(2) : 45-59.
[4] Wang Y.,Li H. .2022 .Advances in Cryptography for Quantum-Resistant Networks. Cryptography Today, 8(4) : 200-215.
[5] Davis S.,Patel R. .2023 .Enhancing SDN Security with Advanced Encryption Techniques. Network Security Review, 19(1) : 89-104.
[6] Miller T.,Clark B. .2018 .Understanding the SDN Architecture. Computer Networks, 10(2) : 67-80.
[7] Zhang Q.,Zhao Y. .2019 .OpenFlow Protocol: A Comprehensive Overview. Networking Journal, 14(3) : 150-165.
[8] Lee K.,Singh M. .2020 .The Role of Controllers in SDN. Journal of Computer Networks, 22(1) : 45-60.
[9] Gupta R.,Thompson J. R. .2021 .Data Plane Technologies in SDN. Advanced Networking, 18(2) : 130-145.
[10] Johnson M.,Liu S. .2019 .Security Vulnerabilities in Software-Defined Networking. Cyber Security Journal, 11(3) : 210-225.
[11] Kim D.,Park H. .2020 .Securing SDN ControllerDevice Communications. International Journal of Network Security, 13(4) : 301-316.
[12] Hernandez A.,Martinez E. .2021 .Cryptographic Solutions for SDN Security Challenges. Journal of Information Security, 16(1) : 50-65.
[13] Singh R.,Wong T. .2018 .Cryptographic Techniques in Modern Networking. Encryption and Security Journal, 9(2) : 75-90.
[14] Gupta S.,Sharma N. .2020 .AES Encryption in Network Security. Journal of Applied Cryptography, 7(1) : 30-45.
[15] Morales J.,Taylor B. .2019 .Asymmetric Encryption in SDN. Network Security Advances, 5(3) : 115-130.
[16] Wilson P.,Kim J. .2018 .Hash Functions for Data Integrity. Cryptographic Research Letters, 6(2) : 89-102.
[17] Garcia M.,Nguyen L. .2021 .Digital Signatures in Secure Communications. Information Security Journal, 14(1) : 40-55.
[18] 'Neill R. and Brown O,C. O .2022 .Implementing Cryptography in SDN Frameworks. Journal of Network Security, 19(2) : 160-175.
[19] Zhou Y.,Feng X. .2019 .TLS in OpenFlow: Securing Control Channels. Networking Protocols and Security, 12(4) : 250-265.
[20] Adams D.,White S. .2020 .Encryption Techniques for SDN Control and Data Planes. Secure Networking Review, 17(3) : 190-205.
[21] Patel S.,Gupta R. .2021 .Encrypting Control Messages in SDN. Journal of Secure Communications, 10(1) : 35-50.
[22] Robertson E.,Lee M. .2022 .Securing Control Channels in Software-Defined Networks. International Journal of Network Security, 14(2) : 140-155.
[23] Lee J.,Kim H. .2020 .Data Plane Encryption in SDN. Advanced Encryption Techniques, 8(1) : 60-75.
[24] Fisher T.,Nguyen P. .2019 .Implementing IPSec in SDN Environments. Journal of Networking Technologies, 11(3) : 200-215.
[25] Singh A.,Kumar V. .2021 .Dynamic Cryptographic Key Management in SDN. Cryptography and Network Security, 15(2) : 100-115.
[26] Huang Y.,Zhao L. .2022 .Quantum-Resistant Cryptography in Modern Networks. Journal of Quantum Computing, 5(1) : 50-65.
[27] Martin J. and Rodriguez F. .2023 .Exploring LatticeBased Cryptographic Algorithms for SDN. Security Algorithms Journal, 10(4) : 300-315.
[28] White S.,Adams D. .2021 .Commercial Enterprise Security with SDN and Encryption. Business Network Security, 13(2) : 130-145.
[29] Davis K.,Turner S. .2023 .Matrix-Based Encryption: A New Paradigm for Network Security. Cryptography Innovations, 9(2) : 120-135.
[30] Kumar V.,Lee K. .2020 .Performance Overheads in Encrypted SDN Networks. Journal of Network Performance, 9(2) : 95-110.
[31] Green M.,Patel R. .2023 .Enhancing SDN Security with Matrix-Based Encryption. Journal of Advanced Networking, 20(1) : 75-90.
[32] Singh R.,Morales J. R. .2021 .Balancing Security and Performance in SDN Deployments. Secure Networking and Computing, 7(3) : 180-195.
[33] Nguyen T.,Li P. .2021 .Homomorphic Encryption Applications in Software-Defined Networking. Secure Computing Journal, 13(3) : 180-195.
[34] Baker L.,Smith D. .2020 .Centralized Security Management in SDN. Network Security Insights, 16(2) : 110-125.
[35] Moore J.,Brown K. .2019 .Dynamic Policy Enforcement in SDN. Journal of Dynamic Networks, 7(3) : 145-160.
[36] Taylor H ,Clark D. .2021 .Network Monitoring and Intrusion Detection in SDN. Journal of Cyber Defense, 12(1) : 80-95.
[37] 'Connor O,Evans M.,R. M. .2022 .Integrating Cryptography for Enhanced Security in SDN. Secure Network Technologies, 18(2) : 140-155.
[38] Zhao Y.,Zhang Q. .2023 .Matrix-Based Encryption Techniques for Secure SDN Communications. Journal of Encryption and Security, 11(1) : 100-115.
[39] Liu J.,Wang T. .2021 .Securing Healthcare Data with SDN and AES Encryption. Healthcare Informatics Journal, 8(4) : 220-235.
[40] Smith A.,Brown L. .2020 .Financial Transaction Security using SDN and RSA. Journal of Financial Networks, 14(3) : 175-190.
[41] Nguyen P.,Hernandez A. .2022 .Military Applications of SDN with Integrated Cryptography. Defense Networking Journal, 10(2) : 160-175.
[42] Martinez E.,Garcia M. .2019 .Protecting Research Data in Universities through SDN Security Measures. Academic Networking Journal. 5, (1) : 90-105.
[43] Davis S.,Thompson J. .2022 .Adaptive Cryptographic Protocols for Dynamic SDN Environments. Journal of Adaptive Networks, 6(1) : 100-115.
[44] Baker L.,Patel S. .2023 .Future Directions in SDN Security and Cryptography. Advanced Network Security Journal, 12(1) : 60-75.
[45] Hernandez A.,Green M. .2023 .Machine Learning for Enhanced SDN Security with Cryptographic Integration. Journal of Intelligent Networks, 4(2) : 150-165.
[46] Turner S.,Davis K. .2024 .Homomorphic and Matrix-Based Encryption for Next-Generation SDN Security. Future Networks Journal, 1(1) : 30-45.
[47] Kreutz D.,Ramos F. M. V.,Verissimo P. E.,Rothenberg C. E.,Azodolmolky S.,Uhlig S. .2015 .Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1) : 14-76.
[48] Scott-Hayward S.,'Callaghan O,Sezer G.,S. G. .2016 .SDN security: A survey. IEEE Transactions on Network and Service Management, 13(3) : 828-846.
[49] Khan S. A.,Gani A.,Wahab A. W. A.,Guizani M.,Khan M. K. .2018 .Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art. IEEE Communications Surveys & Tutorials, 19(1) : 303-324.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

2

Views