Software_Defined_Networking_Architecture
Software_Defined_Networking_Architecture
Fig. 5. Software defined network (SDN) as a security solution and security attacks that are unique to SDN.
TABLE I
T YPICAL S ECURITY A PPLICATIONS OF SDN AS A S ECURITY PARADIGM
leave a backdoor for network intrusions through spoof- On-path detection and off-path detection approaches have
ing or so with an aim of compromising or even crash- been proposed in [99]. In on-path detection, the suspicious
ing the targeted devices on a network. For instance, packets are detected by attaching the IDS system in the path
while mapping IP network addresses to the hardware of travel of packets. It is more effective than the off-path
addresses, ARP protocol does not perform authentication detection where the IDS is attached as a separate physical
on messages, allowing attackers to execute “man-in-the- module to the system. The other security feature is the abil-
middle” attacks. ity of the IDS to report suspicious activities to the controller
4) Traffic Flooding Attacks: Attacker can generate traf- using alerts/alarms so that the controller can immediately take
fic loads too heavy for the network to overwhelm the an action to mitigate the attacks.
overall network resources. These attacks can be easily IDS and IPS have been integrated with SDN
controlled using SDN. in [12], [13], and [92] to analyze attacks in a network
5) Trojan based Attack: This attack instigates DoS attacks, and supply suitable countermeasures for the attacks. The net-
erase stored data or open back doors to permit system work controller is utilized to gather the required information
control by outside attackers. for the attack analyzer to detect these threats/attacks.
There are different defense solutions based on SDN which SDN is implemented along with a prominent IDS system
are discussed below. CloudWatcher has been proposed in [91] called Snort [100] for the detection of threats in Advanced
for controlling the traffic flow in SDN with program logic and Metering Infrastructure (AMI) which are popular in smart
efficiently routing it through all security components present energy grids. The standalone IDS cannot prevent the mal-
in the infrastructure such as Network IDS and firewalls. This ware from entering the system, so SDN is embedded with
prevents the entry of malicious packets that may pose a threat it to guard and protect the system. Snort detects the mal-
to the network. ware based on predefined rules. These are different methods of
Network Intrusion detection and Countermeasure sElection incorporating snort with SDN including mirror implementation
in virtual network systems (NICE) has been proposed in [98] and PACKET_IN approach [100]. In mirror implementation,
for both intrusion detection and prevention. NICE has four Snort is connected to the OpenFlow switch in SDN where
modules: NICE-A, VM profiling, attack analyzer and a net- all the traffic is made to pass through both OpenFlow switch
work controller. The NICE-A works as a network IDS, VM and snort for detection of suspicious activity. In PACKET_IN
profiling stores the complete activities of VMs (including traf- approach, snort runs as a background application connected
fic conditions, open ports, vulnerabilities and security alerts to the OpenFlow controller and only suspicious activity are
etc.), attack analyzer is responsible for analyzing attacks and reported to the controller. The limitation of these methods is
providing countermeasures, and the network controller helps that there might be flooding of traffic in the network. The new
the analyzer by reporting the complete information of the method for integration is proposed in [92] where the rules
network conditions. of snort are incorporated into OpenFlow switches and snort
330 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. 1, FIRST QUARTER 2017
comes into play only when there is some suspicious activ- approach has been proposed in [94] where mobile traffic from
ity in the system. The additional features are also embedded the access points is directed to the controller attached with a
in OpenFlow which includes management server to controller malware detector. Four algorithms for detecting malware are
and policy checking agents in switches. Transparent Intrusion given below.
Prevention Systems (TIPS) [13] has been proposed to prevent 1) IP Blacklisting: A list of all suspicious IP addresses
intrusion attacks by integrating SDN and poll-mode packet is maintained in the system. When switches send
processing [13]. SDN-IPS has been proposed in [12] to prevent unmatched packets to OpenFlow controller, it verifies
the intrusion attacks in a network with high efficiency. the IP address to see if it is from the blacklist and drops
2) SDN for Anomaly Detection: Anomaly detection (or out- the packet if IP is found in that list.
lier detection) in a network is the identification of events or 2) Connection Success Ratio: If the number of unsuccess-
observations which do not conform to an expected pattern. ful connections of the users exceeds the fixed threshold
These days attacks are becoming more sophisticated which value then the user is identified as malicious one.
makes it hard to trace the actual origin of the attack. SDN tech- 3) Throttling Connection: The malicious device/host try-
nology gives us a privilege to configure the devices to serve our ing to attack many systems is identified based on the
need. For instance, home router that is configured using SDN Recently Accessed Host (RAH) list maintained in the
works effectively to detect the malware and spyware attack- system. If the waiting list of the host exceeds a fixed
ing the system [14]. A graphical approach has been proposed threshold value then the user is identified as a malicious
in [93] that relies on OpenFlow based switches to trace-back one.
the origin of attacks where all paths that are vulnerable to 4) Aggregate Analysis: If one host in the network is com-
anomaly attacks can be determined. promised by malicious activity then security of the other
With the implementation of SDN, collaborative detection users in the network is also at risk. This algorithm works
can be implemented through already existing centralized SDN for detection of other infected hosts based on the sim-
controller where each switch or host reports its attack detec- ilarities (i.e., connection time, destination and single
tion decision to the centralized controller. For binary decision platform).
variable di ∈ {0, 1} of each switch/host i = 1, 2, . . . , N, to The integration of SDN for the mobile cloud infrastructure
make a decision (D) about the attack, SDN controller can use has been further explored in [101] for designing a sophisti-
logical AND operation (∪) as cated mechanisms for protecting the network. The prime cause
for the occurrence of DDoS attack in system is due to bot-
D = ∪∀i di (1) nets. The protocol for easy recovery from botnet DDoS attacks
or logical OR operation () as is developed in [96] where the SDN controller is extended
with DDoS blocking module. In [95], SDN has been exploited
D = ∀i di . (2) to use Remote Triggered Black Hole (RBTH) approach for
Note that the AND operator in (1) says there is an attack the prevention of DDoS attacks. The SDN controller plays
when di = 1, ∀i and thus this approach is more restric- a major role in detecting the malicious traffic routed from
tive/conservative. Whereas the OR operator in (2) says there OpenFlow switch and discards them to prevent further damage
is an attack when any one of di ’s is true making it the least to the network. Furthermore, distributed collaborative frame-
conservative. Thus, alternative approach could be the majority work has been proposed in [97] to enable autonomic mitigation
based decision that is given as of DDoS attacks by avoiding privacy leakage and other legal
concerns.
N
N
D = 1 if di > , d = 0 otherwise, (3)
2
i=1 B. Security Attacks in SDN and Countermeasures
which could be a more appropriate scheme to enhance the As discussed, SDN offers defense solutions for vari-
performance of anomaly detection. ous security attacks through its programmability features.
3) SDN for Distributed Denial-of-Service (DDoS) Attack However, there are several new threats that arise as a result
Detection and Prevention: DDoS attacks deny legitimate users of SDN implementation. Note that attacks are prevalent in
to get access to network services. These attacks can cause a SDN as it is mostly dependent on the programs/software
significant damage by compromising the entire network [101]. for defining its behavior which may keep the security of
Conventional networks have some methods to detect DDoS the entire system at stake making it feasible for the attack-
attacks and protect the networks but do not offer very reliable ers to enter the system. In this section, we present security
and flexible defense solutions [102]. Due to the programmable attacks, challenges and countermeasures in SDN. Security vul-
features and reconfigurable nature of SDN, flexible and robust nerabilities in SDN can jeopardize the entire network and
approaches can be designed, deployed and evaluated to detect degrade the performance. The attacks on SDN may occur
and prevent DDoS attacks. in different modules such as controller, virtual machines and
The mobile devices have become more powerful compared OpenFlow switches [6]. There are several attacks that arise
to the past and usage of these devices have been exponen- along with SDN implementation [103]. Typical attack vec-
tially increasing. This increases the chance of attacks including tors and their locations of occurrence in SDN are shown
DDoS attacks in the network. Mobile malware detection in Fig. 6.
RAWAT AND REDDY: SOFTWARE DEFINED NETWORKING ARCHITECTURE, SECURITY AND ENERGY EFFICIENCY 331
TABLE II
S ECURITY ATTACKS AND C OUNTERMEASURES IN SDN
Note that DDoS attacks can be detected using techniques called Damask has been proposed in [128] to protect SDN
proposed for conventional network, however same defense from DDoS attacks.
techniques proposed for traditional networks cannot be imple- The entropy method has been proposed in [118] to detect
mented directly in SDN due to the differences in the DDoS attack on controller using a threshold value. The entropy
architecture. Ideas proposed for traditional networks can of the IP addresses is calculated after every incoming 50 pack-
be borrowed while designing attack detection techniques ets and if it is above the threshold value, it declares that
for SDN. there is a suspicious activity in the system. These attacks
Typical DDoS attacks are untraceable as they are carried are mostly directed during the communication with switches.
out by botnets with automated actions. To discover the DDoS Infected switches send overwhelming requests and controller
attacks, there are different approaches [123], [124] which will be involved in responding to these fake requests deny-
could easily detect botnets. Protocols and IP addresses can ing the requests of legitimate users. This attack creates direct
be verified to detect DDoS attacks, however botnets can spoof harm to the legitimate users. These attacks can be mitigated
the identity by faking legit addresses. In this case, the detec- by protecting controller from these malicious flows.
tion system might not be able to detect attacks since protocols TopoGuard has been developed in [105] as a security add-
and IP addresses are faked by attacker that seem legitimate on in an OpenFlow controller to address the vulnerabilities in
for malicious legitimate users or botnets. Furthermore, DDoS network topology. Network attacks have become most com-
attacks could occur at random interval and random time, and mon in many controllers available in today’s market such as
they are persistent. Important DDoS attack defense solutions flood-light, beacon and POX. It focuses on countermeasures
are briefly discuss below. for the vulnerabilities involving host tracking services and link
1) Attack Pattern Recognition [125]: If the attack is hap- discovery in OpenFlow controller. This architecture maintains
pening at particular intervals, such as at any given date the record of host profile which includes MAC address, IP
and time and repeating within similar intervals such as address and location information to provide a seamless ser-
year or months, then the pattern of attack can be rec- vice without delay in hand-off mechanism. The host profile is
ognized. We can also gauge the duration of attacks and monitored and tracked by the Host Tracking Services (HTS)
how long these attacks last. The nature of attack and present in the controller. This can be used for determining the
the packets of attacks can give us a hint of what kind of valid user. When the controller cannot match the host pro-
attack is being carried out. If these information can be file, the new profile is created and stored. If the location of
logged to create a database from the prior experiences host varies with the profile then it gets updated automatically
of attack to generate the statistics, pattern of attack can using HOST_MOVE event presuming the change of location
be recognized. of host. This kind of functionality is not very secure and cre-
2) System Clustering for Added Security [126]: For the ates the gateway for the hijackers and spoofing attacks as the
provided system, DDoS can be nullified or made com- users are not validated with any authentication mechanisms.
plicated to achieve by clustering the system. For each If the attacker can get the access to the location of the target
cluster created, user authentication can be added. With he can trick the controller by mimicking the host creating the
user authentication requirement, further credibility is Web impersonation attack. Public key based methods can be
necessary to penetrate and cause havoc. Therefore, clus- implemented to validate the host but would not be very effi-
tering of system can provide added layer of security to cient solution as the management of these keys would be a
be able to filter out attacks. Moreover, if an attack is car- tedious task involving cost factor. TopoGuard uses precondi-
ried out on one cluster of the system, rest of the cluster tion and post condition techniques for validation of the host
might be safe and not whole system is prone to DDoS migration. The precondition is Port_Down signal before host
attacks. migration and the post condition refers to verification of post
3) Detection of High Speed Flow-level Detection System location of the host and making sure that it cannot be reached
(HiFIND) [127]: In order to detect the DDoS attack in that location. The Link Discovery Service (LDS) uses Link
and provide substantial protection to victim and service Layer Discovery Protocol (LLDP) for discovering the internal
provider, HiFIND can be utilized. It is highly secured links between the switches. The link fabrication attacks occur
due to its high volume capacity and immune to DDoS by injecting fake LLDP packets that are capable of creat-
attacks for high density data packets. Thus, HiFIND is ing DoS attacks and man-in-the-middle-attacks. Methods for
less prone and highly stable when it comes to DDoS resolving these kind of attacks include the additional authen-
attacks that target weaker system; highly vulnerable to tication of LLDP packets using Type Length Variable (TLV)
satisfying only low volume traffic. and switch port confirmation [105]. Furthermore, LineSwitch,
Lightweight DDoS attack detection [119] has been proposed which is a solution based on probability and blacklisting, offers
which is map based detection scheme inspired from Self resiliency against SYN flooding-based control plane saturation
Organizing Map (SOM) technique. It is a three stage process attacks and protection from buffer saturation vulnerabilities in
consisting of flow collector, feature extractor and classifier. SDN [121].
The flow extractor is used for gathering the flow statistics from FortNOX technique has been introduced in [101] and [113]
OpenFlow switches. The feature extractor selects the specific to resolve the security threats in application layer and the con-
information required for the detection based on which classi- trol layer of SDN. It is a software solution implemented in
fier determines legitimate user. The security defense approach NOX OpenFlow system to secure the system. It responds to
RAWAT AND REDDY: SOFTWARE DEFINED NETWORKING ARCHITECTURE, SECURITY AND ENERGY EFFICIENCY 333
the requests based on the authorization and privileges granted networks that monitors the condition of the complete system
to the users. This method can help to prioritize valid users frequently and determines eleven kinds of bugs such as host
over fake users. unreachable after moving, delayed direct path, excess flooding,
Avant guard has been proposed in [17] that focuses on next TCP packet always dropped after reconfiguration, TCP
two key aspects i.e., security between the data plane and packet dropped after reconfiguration, ARP packets forgotten
control plane and increasing the response rate of controller during address resolution, duplicate SYN packets during tran-
to the data plane requests. These two issues of SDN can sitions, packets of a new flow are dropped, packets drop when
be resolved by the addition of some more security features the load reduces etc. NICE approach provides a report of the
into the system namely connection migration and actuating policy violations and origin of attack helping the system to
triggers. Connection migration is used for enhancing more retrieve back from these bugs.
security in data plane using classification, report, migration FRESCO-DB has been developed in [15] from the click
and relay stage. For providing a strict security, flow packets router [131] which contains two important modules that are
are allowed to interact with the controller only after pass- embedded in NOX controller to detect and countermeasure the
ing the TCP handshake mechanism. This method can help suspicious threats. The API module creates different schemes
in the detection of malicious users. The actuating trigger to counter attack the malware using IDS and other anti-
is enabled to increase the responsiveness between the con- malware applications. Security Enforcement Kernel (SEK)
troller and data plane. These triggers make the data plane module is used for the enforcement of the security related
report all the existing conditions in switches to the controller applications specified by the controller.
asynchronously. The confidentiality and authenticity of applications in SDN
In [129], a model has been proposed to analyze the threats can be protected by the method of encryption and cryp-
that may occur during the communication with data plane by tography [11], [132]. Z3 prover method uses a high level
using the OpenFlow protocol. The analysis is done by combi- programming language to distinguish a legitimate application
nation of STRIDE and attack trees to analyze the attacks such from malicious applications for protecting confidentiality and
as spoofing, tampering, repudiation, information disclosure, integrity of applications [6], [120].
denial of service and elevation of privilege. 3) Intrusion Attacks in SDN: The traditional networks
2) Anomaly Attacks in SDN: Anomaly attacks are involved have built-in middle boxes (which can integrate IDS, fire-
with many risks such as unauthorized access, malicious appli- wall and proxy) and other features to block malicious users.
cation injection etc. which can affect the security of both These middle boxes are not available in SDN but are essen-
applications and networks. Furthermore, these attacks are one tial to secure the SDN from security attacks in both data
of the most dangerous attacks that can occur in any layer of the plane components and controller. They may not be capa-
network and are untraceable and hard to detect. Four anomaly ble of completely preventing the attacks but can be helpful
detection techniques are proposed in [14] which are discussed for enhancing the basic security in SDN. However, integra-
below. tion of these modules in SDN comes with some difficulties
1) Threshold Random Walk with Credit-Based (TRW-CB) as SDN has decoupled structure that relies on centralized
Algorithm [114] considers the user to be suspicious if controller for all tasks such as updating the policies. Thus,
the probability value (i.e., ratio of the number of unsuc- incorporating extra modules may impose the overhead on the
cessful connection and attempts made by the user) is controller showing its impact on the entire network. This might
greater than the fixed threshold value. result in intrusion attacks in SDN when effect of attacks are
2) Rate Limiting Algorithm [115] considers the user to be overlooked as legitimate overhead on the controller [133].
suspicious if the user tries to establish communication There have been various methods proposed for detecting
with multiple devices in a given time above the threshold intrusion attacks in SDN without affecting overall network
value. performance.
3) Maximum Entropy Detection [116] provides the opera- FlowGuard has been proposed in [108] as an SDN fire-
tor with complete view of network from all dimensions. wall and is more sophisticated compared to the firewalls in
It is two staged process in which it first categorizes conventional networks. FlowGuard is associated with a dual
the packets into various classes based on destination functionality to work as packet filter and policy checker. It
and then detects the anomalies based of rapidly varying monitors the network for detecting malicious packets and
traffic patterns. policy violations in SDN.
4) Network Advertisement (NETAD) [117] is a two staged FlowTag architecture has been proposed in [109] for opti-
process. In the first stage, it filters out all unnec- mizing the system by adding the extended architecture along
essary data such as non IP packets, leaving flows, with the middle-box which tags packets passing through it.
etc. In the second stage, it monitors the network and This makes it easier to track the missed and malware packets
detects rarely occurring events and then reports to the present in the network among others [109], [134]. Though the
controller. middle boxes have many advantages associated with it, the
The programmability features of SDN make it convenient management of the middle boxes in SDN is the tedious task.
to debug the errors as well as attract the attackers [130]. NIMBLE architecture has been proposed in [110] for man-
Similarly, No bugs In the Controller Execution (NICE) has aging the middle boxes based on the policy rules provided
been proposed in [112] which is a debugging tool in OpenFlow by the administrator. The slick architecture has been proposed
334 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. 1, FIRST QUARTER 2017
Fig. 13. Comparison of energy consumption with and without SDN imple-
mentation with 1024 bits key size for RSA based digital signatures and Fig. 15. Comparison of energy consumption for SSL handshake with and
transmission. without SDN implementation with increasing transaction sizes.
amount of energy consumed by networks. The need for con- provide the service. This leads to the energy efficient proper
tinuous availability and its huge architecture make network utilization of the networks.
energy consumption high. The companies pay a significant Content based method [148] has been implemented in soft-
percentage of their revenue to power their network infras- ware defined Information Centric Network (ICN) for proper
tructures [136]. Usage of the energy efficient networks such utilization of resources with reduced power consumption in
as SDN is regarded as a solution for reducing the overall the network. ICN has prior information about the length of
consumption of power in the network [23]. This attracted com- content that needs to be delivered and allocates only required
panies like Google to incorporate SDN in their networks [64]. amount of resources. This method also keeps track of these
Implementation of some energy saving strategies in SDN can resources to ensure proper utilization. Elastic tree model
reduce the overall power consumption which leads to the cost proposed in [89] showed 50% reduction in power usage where
reduction [89]. The openness, feasibility and programmability optimizer module allocates most suitable link to efficiently
of SDN reduces the complexity to implement energy effi- handle the traffic load while meeting QoS requirements. The
ciency approaches in both hardware and software. It would be unused links in network are put in sleep mode to save the
more efficient to apply power saving schemes in each module energy.
for overall energy saving [137]. For this purpose the power Multi Layer Traffic Engineering (MLTE) [149] and
consumed in SDN by each module such as chassis, routers GreCO [150] follow the similar approach as elastic tree and
and nodes in the network needs to be known. Furthermore, these approaches insignificantly save power consumption in
SDN is regarded as a viable solution where minimal resources SDN [88]. The exclusive routing algorithm (EXR) in [173]
could be used to perform a task without degrading overall routes the traffic based on the time dimension and this method
network performance (such as security) that reduces energy of routing is more effective and quick compared to other
consumption. energy saving algorithms. In [174], energy efficient routing
Measurement model has been presented in [138], where the protocols are proposed to route the network traffic to the
power consumed by OpenFlow switches such as OF hardware most suitable and shortest path to meet the requirements of
Switch and OF vSwitch running on the server are considered the users. The queue engineering process has been adopted
for the experiment. According to the results obtained, enabling for energy saving of OpenFlow switch in NETFPGA plat-
sleeping mechanisms can improvise the energy efficiency of form [175]. The clock controller is combined with OpenFlow
OF vSwitch as the power consumption of network is depen- controller for supporting various modes for power manage-
dent on number of active links in the network. The additional ment. This method has a separate module that lowers the
savings up to 6.6% of overall power can be achieved by set- frequency to 0 MHz in no traffic conditions for proper usage
ting port configuration rate to 10 Mbps. The obtained power of power [176]. Reducing the replication of unwanted data can
measurements are expected to have error less than 1% in hard- reduce the power consumption of network to some extent [22].
ware switches and 8% in software. The frequent powering off To avoid redundancy in storage of data SMart In-Network
and on can show its impact on decreasing the life time of net- Duplication (SMIND) method has been implemented in [177].
working devices. The efficiency can only be achieved when This method identifies the redundant data using fingerprinting
the adopted schemes do not affect the performance of the technique.
system. So, the method to be implemented in network should 2) Energy Efficient Traffic Engineering/Management:
be selected based on characteristics of the network. Traffic engineering/management for energy optimization is
Table III and Table IV provide a comparison between var- not a new concept. This approach is popular in traditional
ious energy efficiency techniques that have been proposed to networks and is used in SDNs for energy efficiency. The
implement in SDN. These tables provide working principle Asynchronous Transfer Mode (ATM) network [178] has strict
of each method along with advantages and disadvantages that and limited policies for protecting the entire network with-
they offer when they are implemented in SDN. out degrading Quality of Service (QoS) of the users. These
The energy efficient schemes that can be implemented in features are beneficial to SDN. Flow management and load
SDN are discussed below. balancing techniques can be implemented in both switches and
1) Energy Efficiency Through Optimal Network Resource controller for energy efficiency in SDN [65], [179]. Energy
Utilization: The amount of traffic during the different times of usage is minimized in Internet Protocol (IP) based traditional
day is not similar, especially during night times the traffic load networks using load balancing and efficient routing paths such
may be reduced to great extent and most of the nodes in net- as shortest path routing protocols [180]. These features are
work remain unutilized or underutilized (as shown in Fig. 16). also regarded as energy saving schemes in SDN. Similarly,
However, when security defense techniques are implemented, MultiProtocol Label Switching protocol (MPLS) is mostly
power consumption increase significantly. In SDN, due to focused on implementation of traffic engineering (TE) schemes
the flexibility to control the networking devices using a high in the Internet infrastructure [181] for efficient delivery of
level programming language, the rerouting techniques can be packets with optimal energy. This method is suitable for traf-
implemented with ease [88]. The controller in SDN can make fic engineering in SDN where drawbacks of MPLS can be
decisions according to the traffic load in system promoting addressed by the OpenFlow networks.
green networks and efficient resource utilization. The nodes Hash based ECMP has been proposed in [139] as an
that have no traffic can be sent in sleep mode and the nodes Equal Cost Multi Path switch based load balancing scheme
with low traffic can be rerouted to few active networks to that directs the flow to multiple paths in the network to
338 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. 1, FIRST QUARTER 2017
TABLE III
E NERGY E FFICIENCY T ECHNIQUES IN SDN
enhance energy efficiency. The major drawbacks of this load balancing scheme capable of handling the large flows [140]. In
balancing technique are computational complexity and low Hedera, controller manages the traffic based on the informa-
performance. Hedera has been regarded as an intelligent load tion obtained from switches and consumes minimum energy.
RAWAT AND REDDY: SOFTWARE DEFINED NETWORKING ARCHITECTURE, SECURITY AND ENERGY EFFICIENCY 339
TABLE IV
E NERGY E FFICIENCY T ECHNIQUES IN SDN (C ONTD ...)
This helps to avoid collisions. Mahout [141], a load balancing network receive and store it along with the version number.
scheme, has been implemented in data centers to enhance net- When multiple policies exist in the switches then the packet
work performance and reduce energy consumption. DevoFlow is differentiated based on the version number and processed
load balancing has been implemented in [142] in enterprise by using new policy or old policy.
networks and data center environments to reduce the burden A method with per packet consistency and all packet con-
on controller by providing the switches with a set of additional sistency update in SDN has been presented in [48]. The SDN
wild card rules and minimize the overall energy consumption. controller updates the system in a timely manner and elimi-
Other advantages of this method includes performance and nates the old policies when it stops receiving the packets using
scalability. An approach called DIFANE has been capable of the old versions. Some other controllers set expiration date
achieving controller load balancing by implementing detailed for the older versions and do not support them after this fixed
and strict policies in enterprise networks [143]. The goal of the date. The major limitation of this method is it should store
DIFANE is similar to DevoFlow, however this scheme adds both versions in the flow table for certain time. This may
additional switches in the network called authority switches overwhelm the flow table entries and consume more space in
which store all the important flow entries. When the packet memory and increase the energy consumption. A new method
does not match with the flow table rules in the regular switches that deals with single set of rules has been proposed in [158]
they are immediately forwarded to authority switches for mak- to address the issues of memory consumption and energy
ing the decision. Hyperflow has been proposed in [144] as an consumption. In TIMECONF method proposed in [159], new
event based distributed control plane platform, which can pro- policies are updated sequentially in a scheduled time. However
vide the benefits offered by the OpenFlow and also overcome this method is associated with some delay as controller updates
its limitation of scalability. Balance Flow has been proposed the next switch only after it receives an acknowledgment
in [145] as a controller load balancing scheme in OpenFlow from the updated switch. Incremental update method called
networks. It has been proposed as an extension in OpenFlow Net-Plumber [157] has been proposed to enable quick policy
switches called Controller X action. This classifies the flows updates in network by configuring only the portion of switches
into various categories based on the switches from which they that needs an update resulting in lower energy consumption. It
originated and directs them to different controller. SDN/OSPF is located between data plane and control plane, and enforces
Traffic Engineering (SOTE) has been proposed in [147] as a policies into switches at the rate of 50 − 500µs [157].
hybrid traffic engineering method with the combination open Note that the energy can be saved in SDN by lower the
shortest path first and SDN to lower the link utilization in speed of the link while updating the SDN policies. Note that
the network. The main goal of this method is load balanc- the SDN policies can be easily updated with 10 Mbps links in
ing by directing them evenly through all the SDN nodes and real-time and consume 4 watts lower than that of 1Gbps link.
minimize the overall energy consumption. 4) Energy Efficient Monitoring of Traffic Conditions:
3) Energy Efficient SDN Policy Updating Including Security Energy saving in the network can be obtained by dynamically
Policies: Conventional networks update the network policies programming the network according to traffic conditions. In
once in a while, whereas SDN being an adaptive architecture order to dynamically adjust the system based on traffic flow,
needs to be updated frequently to adapt itself to updated envi- it is required to have updated information about the traffic
ronment. The constant updates in the system can hinder the conditions in the network. This necessitates need for traffic
performance of network and also increase power consump- monitoring approaches to be implemented in SDN. Though
tion. In SDN, the controller is responsible for updating and these monitoring schemes are not completely accurate, they
enforcing the new policies in the network. Whenever a new can help the controller to have an idea about traffic flow in
policy is updated in a network, all switches present in the the network including network security attacks.
340 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. 1, FIRST QUARTER 2017
An approach called Open TM has been proposed in [151] purpose of identification. The other advantage of the compact
as a query based monitoring system that relies on the features TCAM includes the usage of SDN for removal of redun-
of OpenFlow switches to measure the network traffic. The dant information. By the implementation of compact TCAM
information cannot be obtained from all switches as it may method 80% of the power reduction can be achieved. TCAM
impose overhead on the network and consume more energy. razor has been proposed in [160] to reduce number of flow
The switch from which the traffic statistics are to be col- entries in the flow table by implementing four step mechanism
lected are intelligently chosen from the routing information that compresses the TCAM by 29.0% which leads to the sav-
present in the controller to minimize the energy consumption ings of 54% energy. In this method multidimensional rules are
and boost the overall network performance. Payless has been fragmented into many one dimensional rule lists. BitWeaving
presented in [152] as a pull based traffic monitoring scheme has been proposed in [162] as a non-prefix ternary classifier
that uses adaptive statistics collection algorithm for obtaining implemented for the compression of rules in TCAM using
highly error free traffic conditions in the entire network. In this two different approaches: bit swapping and bit merging. In
method, controller queries the switches in data plane continu- this method flow entries with same decision and just differ by
ously for the updates regarding the traffic flow. Payless proved the single bit can be combined together. BitWeaving method
to be the effective method by lowering the energy consumption was able to achieve the compression ratio of 23.6% with high
in the network. The drawback of this system the querying the speed and energy efficiency [162].
controller continuously for maintaining accuracy which may Palette distribution [163] has been proposed to offer a solu-
impose overhead on the controller. tion for rule placement problem by breaking the large SDN
FlowSense has been proposed in [153] as a push based mon- tables into small sub-tables using pivot bit decomposition. As
itoring method that focuses on estimating the link utilization. all rules cannot be stored under the single network they are
The switches forward the message regarding the detection of divided and distributed among the multiple networks under
new flows to the controller using PacketIn and FlowRemoved SDN. Joint optimization method has been proposed in [164]
commands based on which the controller enforces new poli- that uses both rule allocation and traffic engineering to achieve
cies into the system. These messages could favor FlowSense energy optimization and security in the network. Integer Linear
monitoring scheme to estimate the resource utilization, band- Program has been proposed in [165] that uses greedy heuristic
width and energy consumption in the network. OpenSketch method for achieving the energy saving. Though the software
has been proposed in [155] as a push based traffic flow moni- switches can eliminate the issues such as high cost and can also
toring scheme which follows the similar concept of decoupling update the flow tables up to 10 times quicker than the hardware
the planes as SDN and uses three major stages namely hash- switches, they are associated with some delay in the packet
ing, filtering and counting. Hashing is used for providing a processing. CacheFlow has the hybrid switch embedded with
brief overview on the flows that needs to be measured. The both features of hardware and software switches [166], [167]
filtering stage eliminates the unnecessary data and statistics are that offers energy efficient solutions.
obtained in the counting stage. The results obtained are highly 6) Proper Placement of SDN Devices for Energy Efficiency
accurate. MicroTE has been proposed in [156] as a traffic mon- and Network Security: As SDN controller is regarded as a
itoring scheme in the network. It dynamically adjust itself to brain of the SDN to control behaviors of the network, its
the traffic conditions in the network and immediately respond placement location has a crucial role. The controller should
to the changes in the network. The updates on the recent traf- be capable of managing the provided number of switches
fic conditions received from the agent installed in the server in the network. The proper placement of the controller can
and immediately reported to the controller. OpenSample has improve the overall efficiency in the SDN and can also serve
been proposed in [154] as a push based monitoring scheme as a benefactor for reducing the cost. Deployment of many
that relies on sFlow packet sampling tool for obtaining the controllers in SDN has both pros and cons. The significant
packet headers from network. amount of research has been conducted on SDN controllers
5) Ternary Content Addressable Memory (TCAM) that are needed to be integrated in the system. The number of
Compression for Energy Efficiency and Network Security: controllers in the SDN should be based on the amount of traf-
The rules that are to be implemented in the SDN are stored fic load and network security requirement, and the size of the
in flow table present in Ternary content addressable mem- network that a given controller needs to control A mathemat-
ory (TCAM). It can compare all incoming flows parallelly ical model has been proposed in [171] for the placement of
and enable quick packet processing [182]. The number of the controllers with a motive to minimize the energy cost and to
entries in the flow table are limited as the TCAM usage is boost the network performance. The factors such as the loca-
associated with cost factor. TCAM is expected to impose the tion of the switches, length and bandwidth of the switches
burden of 400 times more cost and 100 times more power and other information is taken into consideration. The con-
usage [183] than the traditional memory storage devices troller placement problem for the minimization of cost can be
such as RAM. The other main concerning issue of TCAM expressed as
is its update time that is limited to 40−50 rule-tables per
Minimize Cc (x) + Cl (v) + Ct (z), (4)
second [166], [167], [184].
Compact TCAM has been proposed in [161] that condenses where Cc (x), Cl (v), Ct (z) are the cost of installing switches,
the structure of TCAM by lowering the size of the flow IDs in cost of linking controllers to switches and the cost for linking
a flow table. The flows assigned with a specific flow ID for the the controllers together respectively. The equation (4) should
RAWAT AND REDDY: SOFTWARE DEFINED NETWORKING ARCHITECTURE, SECURITY AND ENERGY EFFICIENCY 341
Note that the selection of different parameters depends on [11] N. McKeown et al. (2011). OpenFlow Switch Specification. Accessed
the application that the SDN is envisioned to support. For on Aug. 1, 2016. [Online]. Available: https://www.opennetworking.org/
images/stories/downloads/sdn-resources/onf-specifications/openflow/
instance, optimal parameters in SDN for smart grid may not openflow-spec-v1.4.0.pdf
be optimal SDN parameters for traditional data center net- [12] T. Xing, Z. Xiong, D. Huang, and D. Medhi, “SDNIPS: Enabling
works [188], optimal SDN for IoT may not be optimal SDN software-defined networking based intrusion prevention system in
clouds,” in Proc. 10th Int. Conf. Netw. Service Manag. (CNSM),
for cyber-physical systems, and so on. Rio de Janeiro, Brazil, 2014, pp. 308–311.
[13] O. Joldzic, Z. Djuric, and D. Vukovic, “Building a transparent intrusion
detection and prevention system on SDN,” Norsk informasjonssikker-
VI. C ONCLUSION hetskonferanse, vol. 7, no. 1, pp. 1–4, 2014.
[14] S. A. Mehdi, J. Khalid, and S. A. Khayam, “Revisiting traffic
In this survey, we have explored Software Defined Network anomaly detection using software defined networking,” in Recent
(SDN) architecture, various security threats that are resolved Advances in Intrusion Detection. Heidelberg, Germany: Springer, 2011,
by SDN and new threats that arose as a result of SDN imple- pp. 161–180.
[15] S. Shin et al., “FRESCO: Modular composable security services for
mentation as well as energy efficiency. We have summarized software-defined networks,” in Proc. NDSS, San Diego, CA, USA,
the recent security attacks and countermeasures in SDN in a 2013, pp. 1–16.
tabular form for side-by-side comparison. We have also pro- [16] S. Scott-Hayward, G. O’Callaghan, and S. Sezer, “SDN security: A
survey,” in Proc. IEEE SDN Future Netw. Services (SDN4FNS), Trento,
vided a survey on different strategies that are implemented Italy, 2013, pp. 1–7.
to achieve energy efficiency in the networks through SDN [17] S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “AVANT-GUARD:
implementation and presented in a tabular form. In an effort to Scalable and vigilant switch flow management in software-defined
networks,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security,
anticipate the future evolution of this new paradigm, we dis- Berlin, Germany, 2013, pp. 413–424.
cuss the challenges and research efforts in SDN. Note that the [18] D. B. Rawat and C. Bajracharya, Vehicular Cyber Physical Systems:
selection of different SDN parameters depends on the appli- Adaptive Connectivity and Security. Cham, Switzerland: Springer,
2016.
cations that the SDN is envisioned to support. For instance, [19] D. B. Rawat and C. Bajracharya, “Software defined networking for
optimal SDN parameters for smart grid networking may not reducing energy consumption and carbon emission,” in Proc. IEEE
be optimal SDN parameters for traditional data center net- SoutheastCon, Norfolk, VA, USA, 2016, pp. 1–2.
[20] E. Gelenbe and Y. Caseau, “The impact of information technology on
works and optimal SDN for IoT may not be optimal SDN for energy consumption and carbon emissions,” Ubiquity, vol. 2015, p. 1,
cyber-physical systems and so on. Jun. 2015.
It is noted that the future work should be focused on [21] D. B. Rawat and S. Reddy, “Recent advances on software defined wire-
less networking,” in Proc. IEEE SoutheastCon, Norfolk, VA, USA,
designing low power consuming security mechanisms that can 2016, pp. 1–8.
enhance the overall network performance with high visibility [22] R. Wang et al., “Energy-aware routing algorithms in software-defined
and scalability. networks,” in Proc. IEEE 15th Int. Symp. A World Wireless Mobile
Multimedia Netw. (WoWMoM), Sydney, NSW, Australia, 2014, pp. 1–6.
[23] B. Yan, J. Zhou, J. Wu, and Y. Zhao, “Poster: SDN based energy
management system for optical access network,” in Proc. 9th Int.
ACKNOWLEDGMENT Conf. Commun. Netw. China (CHINACOM), Maoming, China, 2014,
However, any opinion, finding, and conclusions or recom- pp. 658–659.
[24] B. B. Bista, A. Fukushi, T. Takata, and D. B. Rawat, “Reducing energy
mendations expressed in this material are those of the author consumption in wired OpenFlow-based networks,” Int. J. Control
and do not necessarily reflect the views of NSF. The authors Autom., vol. 7, no. 6, pp. 401–412, 2014.
are grateful to the anonymous reviewers for their constructive [25] B. B. Bista, M. Takanohashi, T. Takata, and D. B. Rawat, “A power
saving scheme for open flow network,” J. Clean Energy Technol., vol. 1,
comments on the paper. no. 4, pp. 276–280, 2013.
[26] K. Dhamecha and B. Trivedi, “SDN issues—A survey,” Int. J. Comput.
Appl., vol. 73, no. 18, pp. 30–35, 2013.
R EFERENCES [27] S. Scott-Hayward, S. Natarajan, and S. Sezer, “A survey of security
in software defined networks,” IEEE Commun. Surveys Tuts., vol. 18,
[1] S. Jeschke, C. Brecher, H. Song, and D. B. Rawat, Industrial Internet of no. 1, pp. 623–654, 1st Quart., 2016.
Things: Cyber-Manufacturing Systems. Cham, Switzerland: Springer, [28] I. Alsmadi and D. Xu, “Security of software defined networks: A
2016. survey,” Comput. Security, vol. 53, pp. 79–108, Sep. 2015.
[2] D. B. Rawat, J. J. Rodrigues, and I. Stojmenović, Cyber-Physical [29] W. Li, W. Meng, and L. F. Kwok, “A survey on OpenFlow-based
Systems: From Theory to Practice. Boca Raton, FL, USA: CRC Press, software defined networks: Security challenges and countermeasures,”
2015. J. Netw. Comput. Appl., vol. 68, pp. 126–139, Jun. 2016.
[3] P. Goransson and C. Black, Software Defined Networks: A [30] N. Feamster, H. Balakrishnan, J. Rexford, A. Shaikh, and
Comprehensive Approach. St. Louis, MO, USA: Elsevier, 2014. J. van Der Merwe, “The case for separating routing from routers,” in
[4] N. McKeown, “Software-defined networking,” INFOCOM Keynote Proc. ACM SIGCOMM Workshop Future Directions Netw. Architect.,
Talk, vol. 17, no. 2, pp. 30–32, 2009. Portland, OR, USA, 2004, pp. 5–12.
[5] T. D. Nadeau and K. Gray, SDN: Software Defined Networks. [31] A. Greenberg et al., “A clean slate 4D approach to network control
Sebastopol, CA, USA: O’Reilly Media, 2013. and management,” ACM SIGCOMM Comput. Commun. Rev., vol. 35,
[6] F. Hu, Q. Hao, and K. Bao, “A survey on software-defined network and no. 5, pp. 41–54, 2005.
OpenFlow: From concept to implementation,” IEEE Commun. Surveys [32] M. Casado et al., “Ethane: Taking control of the enterprise,” ACM
Tuts., vol. 16, no. 4, pp. 2181–2206, 4th Quart., 2014. SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 1–12, 2007.
[7] D. Kreutz et al., “Software-defined networking: A comprehensive [33] N. Feamster, J. Rexford, and E. Zegura, “The road to SDN: An intel-
survey,” Proc. IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015. lectual history of programmable networks,” ACM SIGCOMM Comput.
[8] Open Networking Foundation. Accessed on May 8, 2016. [Online]. Commun. Rev., vol. 44, no. 2, pp. 87–98, 2014.
Available: https://www.opennetworking.org [34] S. Bhattacharjee, K. L. Calvert, and E. W. Zegura, An Architecture for
[9] Floodlight. Accessed on May 8, 2016. [Online]. Available: Active Networking. New York, NY, USA: Springer, 1997.
http://www.projectfloodlight.org/ floodlight [35] D. L. Tennenhouse and D. J. Wetherall, “Towards an active network
[10] OpenDayLight. Accessed on May 8, 2016. [Online]. Available: architecture,” in Proc. DARPA Act. Netw. Conf. Expo., San Francisco,
https://www.opendaylight.org CA, USA, 2002, pp. 2–15.
RAWAT AND REDDY: SOFTWARE DEFINED NETWORKING ARCHITECTURE, SECURITY AND ENERGY EFFICIENCY 343
[36] D. J. Wetherall, J. V. Guttag, and D. L. Tennenhouse, “ANTS: A toolkit [59] J. Reich, C. Monsanto, N. Foster, J. Rexford, and D. Walker,
for building and dynamically deploying network protocols,” in Proc. “Modular SDN programming with pyretic,” USENIX Tech.
IEEE Open Architect. Netw. Program., San Francisco, CA, USA, 1998, Rep., 2013, accessed on Aug. 1, 2016. [Online]. Available:
pp. 117–129. https://www.cs.princeton.edu/∼jrex/papers/pyretic13.pdf
[37] J. E. van der Merwe, S. Rooney, L. Leslie, and S. Crosby, “The [60] A. Blenk, A. Basta, and W. Kellerer, “HyperFlex: An SDN virtualiza-
tempest-a practical framework for network programmability,” IEEE tion architecture with flexible hypervisor function allocation,” in Proc.
Netw., vol. 12, no. 3, pp. 20–28, May/Jun. 1998. IFIP/IEEE IM, Ottawa, ON, Canada, 2015, pp. 397–405.
[38] A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, [61] L. Velasco, A. Asensio, J. L. Berral, A. Castro, and V. López, “Towards
“In VINI veritas: Realistic and controlled network experimentation,” a carrier SDN: An example for elastic inter-datacenter connectivity,”
ACM SIGCOMM Comput. Commun. Rev., vol. 36, no. 4, pp. 3–14, Opt. Exp., vol. 22, no. 1, pp. 55–61, 2014.
2006. [62] V. Pandey, “Towards widespread SDN adoption: Need for synergy
[39] D. S. Alexander et al., “The SwitchWare active network architecture,” between photonics and SDN within the data center,” in Proc. IEEE
IEEE Netw., vol. 12, no. 3, pp. 29–36, May/Jun. 1998. Photon. Soc. Summer Topical Meeting Series, Waikoloa, HI, USA,
[40] N. McKeown et al., “OpenFlow: Enabling innovation in campus net- 2013, pp. 227–228.
works,” ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, [63] J. Kempf, Y. Zhang, R. Mishra, and N. Beheshti, “Zeppelin—A third
pp. 69–74, 2008. generation data center network virtualization technology based on SDN
and MPLS,” in Proc. IEEE 2nd Int. Conf. Cloud Netw. (CloudNet),
[41] W. Stallings, “Software-defined networks and OpenFlow,” Internet
San Francisco, CA, USA, 2013, pp. 1–9.
Protocol J., vol. 16, no. 1, pp. 1–6, 2013.
[64] S. Jain et al., “B4: Experience with a globally-deployed software
[42] SDN-Ready White Box Data Center. Accessed on May 8, 2016.
defined WAN,” ACM SIGCOMM Comput. Commun. Rev., vol. 43,
[Online]. Available: http://www.pica8.com/open-networking/sdn-ready-
no. 4, pp. 3–14, 2013.
white-box-data-center.php
[65] I. F. Akyildiz, A. Lee, P. Wang, M. Luo, and W. Chou, “A roadmap
[43] A. Voellmy and P. Hudak, “Nettle: Taking the sting out of program- for traffic engineering in SDN-OpenFlow networks,” Comput. Netw.,
ming network routers,” in Practical Aspects of Declarative Languages. vol. 71, pp. 1–30, Oct. 2014.
Heidelberg, Germany: Springer, 2011, pp. 235–249. [66] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of
[44] N. Gude et al., “NOX: Towards an operating system for networks,” Things (IoT): A vision, architectural elements, and future directions,”
ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 3, pp. 105–110, Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
2008. [67] A. Gupta et al., “SDX: A software defined Internet exchange,” in Proc.
[45] A. Voellmy, H. Kim, and N. Feamster, “Procera: A language for high- ACM Conf. SIGCOMM, Chicago, IL, USA, 2014, pp. 551–562.
level reactive network control,” in Proc. 1st Workshop Hot Topics Softw. [68] V. Kotronis, X. Dimitropoulos, and B. Ager, “Outsourcing the routing
Defined Netw., Helsinki, Finland, 2012, pp. 43–48. control logic: Better Internet routing based on SDN principles,” in Proc.
[46] Defining Openness for Open SDN and NFV. Accessed on Nov. 16, 11th ACM Workshop Hot Topics Netw., Redmond, WA, USA, 2012,
2015. [Online]. Available: https://www.sdxcentral.com/articles/ pp. 55–60.
featured/defining-open-sdn-nfv-a-primer-network-operators/2014/07/ [69] J. Costa-Requena, “SDN integration in LTE mobile backhaul net-
[47] S. Gutz, A. Story, C. Schlesinger, and N. Foster, “Splendid isolation: A works,” in Proc. Int. Conf. Inf. Netw. (ICOIN), Phuket, Thailand, 2014,
slice abstraction for software-defined networks,” in Proc. 1st Workshop pp. 264–269.
Hot Topics Softw. Defined Netw., Helsinki, Finland, 2012, pp. 79–84. [70] P. Berthou, “Leveraging SDN for the 5G networks,” in Software
[48] M. Reitblatt, N. Foster, J. Rexford, and D. Walker, “Consistent updates Defined Mobile Networks (SDMN): Beyond LTE Network Architecture.
for software-defined networks: Change you can believe in!” in Proc. Hoboken, NJ, USA: Wiley, 2015, pp. 61–80.
10th ACM Workshop Hot Topics Netw., Cambridge, MA, USA, 2011, [71] D. B. Rawat, S. Shetty, and C. Xin, “Stackelberg-game-based dynamic
p. 7. spectrum access in heterogeneous wireless systems,” IEEE Syst. J.,
[49] C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker, vol. 10, no. 4, 2016.
“Composing software defined networks,” in Proc. NSDI, Lombard, IL, [72] J. Sánchez, I. M. B. Yahia, N. Crespi, T. Rasheed, and D. Siracusa,
USA, 2013, pp. 1–13. “Softwarized 5G networks resiliency with self-healing,” in Proc. 1st
[50] C. Liang and F. R. Yu, “Wireless network virtualization: A survey, Int. Conf. 5G Ubiquitous Connectivity (5GU), 2014, pp. 229–233.
some research issues and challenges,” IEEE Commun. Surveys Tuts., [73] A. Gember, C. Dragga, and A. Akella, “ECOS: Leveraging software-
vol. 17, no. 1, pp. 358–380, 1st Quart., 2015. defined networks to support mobile application offloading,” in Proc. 8th
[51] K. Barr et al., “The VMware mobile virtualization platform: Is that a ACM/IEEE Symp. Architect. Netw. Commun. Syst., Austin, TX, USA,
hypervisor in your pocket?” ACM SIGOPS Oper. Syst. Rev., vol. 44, 2012, pp. 199–210.
no. 4, pp. 124–135, 2010. [74] J. Lee et al., “meSDN: Mobile extension of SDN,” in Proc. 5th Int.
Workshop Mobile Cloud Comput. Services, Bretton Woods, NH, USA,
[52] C. Dixon et al., “Software defined networking to support the soft-
2014, pp. 7–14.
ware defined environment,” IBM J. Res. Develop., vol. 58, nos. 2–3,
[75] K.-K. Yap et al., “The Stanford openroads deployment,” in Proc. 4th
pp. 1–14, Mar./May 2014.
ACM Int. Workshop Exp. Eval. Characterization, Beijing, China, 2009,
[53] R. Sherwood et al., “FlowVisor: A network virtualization layer,”
pp. 59–66.
OpenFlow Switch Consortium, Stanford Univ., Stanford, CA, USA,
[76] R. Muñoz, R. Vilalta, R. Casellas, and R. Martínez, “SDN orchestra-
Tech. Rep., 2009, accessed on Aug. 1, 2016. [Online]. Available:
tion and virtualization of heterogeneous multi-domain and multi-layer
http://archive.openflow.org/downloads/technicalreports/openflow-tr-
transport networks: The STRAUSS approach,” in Proc. IEEE Int. Black
2009-1-flowvisor.pdf
Sea Conf. Commun. Netw. (BlackSeaCom), Constanta, Romania, 2015,
[54] E. Salvadori, R. D. Corin, A. Broglio, and M. Gerola, “Generalizing pp. 142–146.
virtual network topologies in OpenFlow-based networks,” in Proc. [77] T. Szyrkowiec et al., “Demonstration of SDN based optical network
IEEE Glob. Telecommun. Conf. (GLOBECOM), Houston, TX, USA, virtualization and multidomain service orchestration,” in Proc. 3rd Eur.
2011, pp. 1–6. Workshop Softw. Defined Netw. (EWSDN), Budapest, Hungary, 2014,
[55] Z. Bozakov and P. Papadimitriou, “AutoSlice: Automated and scalable pp. 137–138.
slicing for software-defined networks,” in Proc. ACM Conf. CoNEXT [78] Q. Qi, W. Wang, X. Gong, and X. Que, “A SDN-based network virtual-
Student Workshop, Nice, France, 2012, pp. 3–4. ization architecture with autonomie management,” in Proc. Globecom
[56] P. Skoldstrom and W. John, “Implementation and evaluation of a Workshops (GC Wkshps), Austin, TX, USA, 2014, pp. 178–182.
carrier-grade OpenFlow virtualization scheme,” in Proc. 2nd Eur. [79] M. S. Malik, M. Montanari, J. H. Huh, R. B. Bobba, and
Workshop Softw. Defined Netw. (EWSDN), Berlin, Germany, 2013, R. H. Campbell, “Towards SDN enabled network control delegation
pp. 75–80. in clouds,” in Proc. 43rd Annu. IEEE/IFIP Int. Conf. Depend. Syst.
[57] P. Lin, J. Bi, and H. Hu, “VCP: A virtualization cloud plat- Netw. (DSN), Budapest, Hungary, 2013, pp. 1–6.
form for SDN intra-domain production network,” in Proc. 20th [80] R. D. Corin, M. Gerola, R. Riggio, F. De Pellegrini, and E. Salvadori,
IEEE Int. Conf. Netw. Protocols (ICNP), Austin, TX, USA, 2012, “VeRTIGO: Network virtualization and beyond,” in Proc. Eur.
pp. 1–2. Workshop Softw. Defined Netw. (EWSDN), Darmstadt, Germany, 2012,
[58] D. Drutskoy, E. Keller, and J. Rexford, “Scalable network virtualization pp. 24–29.
in software-defined networks,” IEEE Internet Comput., vol. 17, no. 2, [81] D. B. Rawat, M. Song, and S. Shetty, Dynamic Spectrum Access for
pp. 20–27, Mar./Apr. 2013. Wireless Networks. Cham, Switzerland: Springer, 2015.
344 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. 1, FIRST QUARTER 2017
[82] D. B. Rawat and N. Sharma, “Wireless network virtualization for [105] S. Hong, L. Xu, H. Wang, and G. Gu, “Poisoning network visibility
enhancing security: Status, challenges and perspectives,” in Proc. IEEE in software-defined networks: New attacks and countermeasures,” in
SoutheastCon, Norfolk, VA, USA, 2016, pp. 1–8. Proc. NDSS, 2015, pp. 1–15.
[83] A. Gudipati, D. Perry, L. E. Li, and S. Katti, “SoftRAN: Software [106] X. Du, M.-Z. Wang, X. Zhang, and L. Zhu, “Traffic-based mali-
defined radio access network,” in Proc. 2nd ACM SIGCOMM Workshop cious switch detection in SDN,” Int. J. Security Appl., vol. 8, no. 5,
Hot Topics Softw. Defined Netw., Hong Kong, 2013, pp. 25–30. pp. 119–130, 2014.
[84] M. Peng, C. Wang, V. Lau, and H. V. Poor, “Fronthaul-constrained [107] M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “SPHINX:
cloud radio access networks: Insights and challenges,” IEEE Wireless Detecting security attacks in software-defined networks,” in Proc. Netw.
Commun., vol. 22, no. 2, pp. 152–160, Apr. 2015. Distrib. Syst. Security (NDSS) Symp., San Diego, CA, USA, 2015,
[85] M. Y. Arslan, K. Sundaresan, and S. Rangarajan, “Software-defined pp. 1–15.
networking in cellular radio access networks: Potential and challenges,” [108] H. Hu, W. Han, G.-J. Ahn, and Z. Zhao, “FLOWGUARD: Building
IEEE Commun. Mag., vol. 53, no. 1, pp. 150–156, Jan. 2015. robust firewalls for software-defined networks,” in Proc. 3rd Workshop
[86] M. Yang et al., “OpenRAN: A software-defined ran architecture via Hot Topics Softw. Defined Netw., Chicago, IL, USA, 2014, pp. 97–102.
virtualization,” ACM SIGCOMM Comput. Commun. Rev., vol. 43, no. 4, [109] S. K. Fayazbakhsh, V. Sekar, M. Yu, and J. C. Mogul, “FlowTags:
pp. 549–550, 2013. Enforcing network-wide policies in the presence of dynamic middlebox
[87] A. P. Bianzino, C. Chaudet, D. Rossi, and J.-L. Rougier, “A survey actions,” in Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw.
of green networking research,” IEEE Commun. Surveys Tuts., vol. 14, Defined Netw., Hong Kong, 2013, pp. 19–24.
no. 1, pp. 3–20, 1st Quart., 2012. [110] Z. Qazi et al., “Practical and incremental convergence between SDN
[88] D. Staessens, S. Sharma, D. Colle, M. Pickavet, and P. Demeester, and middleboxes,” in Proc. Open Netw. Summit, Santa Clara, CA, USA,
“Software defined networking: Meeting carrier grade requirements,” in 2013, pp. 1–15.
Proc. 18th IEEE Workshop Local Metropol. Area Netw. (LANMAN), [111] B. Anwer, T. Benson, N. Feamster, D. Levin, and J. Rexford, “A
Chapel Hill, NC, USA, 2011, pp. 1–6. slick control plane for network middleboxes,” in Proc. 2nd ACM
[89] B. Heller et al., “ElasticTree: Saving energy in data center networks,” SIGCOMM Workshop Hot Topics Softw. Defined Netw., Hong Kong,
in Proc. NSDI, vol. 10. San Jose, CA, USA, 2010, pp. 249–264. 2013, pp. 147–148.
[90] L. Schehlmann, S. Abt, and H. Baier, “Blessing or curse? Revisiting [112] M. Canini, D. Venzano, P. Perešíni, D. Kostić, and J. Rexford, “A
security aspects of software-defined networking,” in Proc. 10th Int. NICE way to test OpenFlow applications,” in Proc. NSDI, vol. 12.
Conf. Netw. Service Manag. (CNSM), Rio de Janeiro, Brazil, 2014, San Jose, CA, USA, 2012, pp. 127–140.
pp. 382–387. [113] P. Porras et al., “A security enforcement kernel for OpenFlow net-
[91] S. Shin and G. Gu, “CloudWatcher: Network security monitoring using works,” in Proc. 1st Workshop Hot Topics Softw. Defined Netw.,
OpenFlow in dynamic cloud networks (or: How to provide security Helsinki, Finland, 2012, pp. 121–126.
monitoring as a service in clouds?),” in Proc. 20th IEEE Int. Conf. [114] S. E. Schechter, J. Jung, and A. W. Berger, “Fast detection of scan-
Netw. Protocols (ICNP), Austin, TX, USA, 2012, pp. 1–6. ning worm infections,” in Recent Advances in Intrusion Detection.
[92] P.-W. Chi, C.-T. Kuo, H.-M. Ruan, S.-J. Chen, and C.-L. Lei, “An Heidelberg, Germany: Springer, 2004, pp. 59–81.
AMI threat detection mechanism based on SDN networks,” in Proc. [115] J. Twycross and M. M. Williamson, “Implementing and testing a virus
SECURWARE, Lisbon, Portugal, 2014, pp. 208–211. throttle,” in Proc. USENIX Security, 2003, p. 20.
[93] J. François and O. Festor, “Anomaly traceback using software [116] Y. Gu, A. McCallum, and D. Towsley, “Detecting anomalies in net-
defined networking,” in Proc. Nat. Conf. Parallel Comput. Technol. work traffic using maximum entropy estimation,” in Proc. 5th ACM
(PARCOMPTECH), Atlanta, GA, USA, 2015, pp. 203–208. SIGCOMM Conf. Internet Meas., Berkeley, CA, USA, 2005, p. 32.
[94] R. Jin and B. Wang, “Malware detection for mobile devices using [117] M. V. Mahoney, “Network traffic anomaly detection based on packet
software-defined networking,” in Proc. 2nd GENI Res. Educ. Exp. bytes,” in Proc. ACM Symp. Appl. Comput., Melbourne, FL, USA,
Workshop (GREE), Salt Lake City, UT, USA, 2013, pp. 81–88. 2003, pp. 346–350.
[95] K. Giotis, G. Androulidakis, and V. Maglaris, “Leveraging SDN for [118] S. M. Mousavi and M. St-Hilaire, “Early detection of DDoS attacks
efficient anomaly detection and mitigation on legacy networks,” in against SDN controllers,” in Proc. Int. Conf. Comput. Netw. Commun.
Proc. 3rd Eur. Workshop Softw. Defined Netw. (EWSDN), Budapest, (ICNC), Garden Grove, CA, USA, 2015, pp. 77–81.
Hungary, 2014, pp. 85–90. [119] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack
[96] S. Lim, J.-I. Ha, H. Kim, Y. Kim, and S. Yang, “A SDN-oriented DDoS detection using NOX/OpenFlow,” in Proc. IEEE 35th Conf. Local
blocking scheme for botnet-based attacks,” in Proc. 6th Int. Conf. Comput. Netw. (LCN), Denver, CO, USA, 2010, pp. 408–415.
Ubiquitous Future Netw. (ICUFN), Shanghai, China, 2014, pp. 63–68. [120] C. Schlesinger, A. Story, S. Gutz, N. Foster, and D. Walker, “Splendid
[97] R. Sahay, G. Blanc, Z. Zhang, and H. Debar, “Towards autonomic isolation: Language-based security for software-defined networks,” in
DDoS mitigation using software defined networking,” in Proc. NDSS Proc. Workshop Hot Topics Softw. Defined Netw., Helsinki, Finland,
Workshop Security Emerg. Netw. Technol. (SENT), San Diego, CA, 2012, pp. 79–84.
USA, 2015, pp. 1–7. [121] M. Ambrosin, M. Conti, F. De Gaspari, and R. Poovendran,
[98] C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, “NICE: “LinesWitch: Efficiently managing switch flow in software-defined net-
Network intrusion detection and countermeasure selection in virtual working while effectively tackling DoS attacks,” in Proc. 10th ACM
network systems,” IEEE Trans. Depend. Secure Comput., vol. 10, no. 4, Symp. Inf. Comput. Commun. Security, Singapore, 2015, pp. 639–644.
pp. 198–211, Jul./Aug. 2013. [122] J. M. Dover. A Denial of Service Attack Against the Open Floodlight
[99] A. G. P. Lobato, U. da Rocha Figueiredo, and O. C. M. B. Duarte, “An SDN Controller. Accessed on Aug. 1, 2016. [Online]. Available:
architecture for intrusion prevention using software defined networks,” http://dovernetworks.com/wp-content/uploads/2013/12/OpenFlood
in Proc. WNetVirt, Rio de Janeiro, Brazil, 2013, p. 1. light-12302013.pdf
[100] M. Roesch et al., “Snort: Lightweight intrusion detection for networks,” [123] J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS
in Proc. LISA, vol. 99. Seattle, WA, USA, 1999, pp. 229–238. defense mechanisms,” ACM SIGCOMM Comput. Commun. Rev.,
[101] Q. Yan and F. R. Yu, “Distributed denial of service attacks in software- vol. 34, no. 2, pp. 39–53, 2004.
defined networking with cloud computing,” IEEE Commun. Mag., [124] M. Drašar, M. Vizváry, and J. Vykopal, “Similarity as a central
vol. 53, no. 4, pp. 52–59, Apr. 2015. approach to flow-based anomaly detection,” Int. J. Netw. Manag.,
[102] M. Abliz, “Internet denial of service attacks and defense mechanisms,” vol. 24, no. 4, pp. 318–336, 2014.
Dept. Comput. Sci., Univ. Pittsburgh, Pittsburgh, PA, USA, Tech. [125] A.-S. Kim, H.-J. Kong, S.-C. Hong, S.-H. Chung, and J. W. Hong, “A
Rep. TR-11-178, 2011. flow-based method for abnormal network traffic detection,” in Proc.
[103] D. Kreutz, F. M. V. Ramos, and P. Verissimo, “Towards secure and IEEE/IFIP Netw. Oper. Manag. Symp., vol. 1. Seoul, South Korea,
dependable software-defined networks,” in Proc. 2nd ACM SIGCOMM 2004, pp. 599–612.
Workshop Hot Topics Softw. Defined Netw., Hong Kong, 2013, [126] P. Casas, J. Mazel, and P. Owezarski, “Unsupervised network intru-
pp. 55–60. sion detection systems: Detecting the unknown without knowledge,”
[104] J. H. Jafarian, E. Al-Shaer, and Q. Duan, “OpenFlow random host Comput. Commun., vol. 35, no. 7, pp. 772–783, 2012.
mutation: Transparent moving target defense using software defined [127] Z. Li, Y. Gao, and Y. Chen, “HiFIND: A high-speed flow-level intrusion
networking,” in Proc. 1st Workshop Hot Topics Softw. Defined Netw., detection approach with DoS resiliency,” Comput. Netw., vol. 54, no. 8,
Helsinki, Finland, 2012, pp. 127–132. pp. 1282–1299, 2010.
RAWAT AND REDDY: SOFTWARE DEFINED NETWORKING ARCHITECTURE, SECURITY AND ENERGY EFFICIENCY 345
[128] B. Wang, Y. Zheng, W. Lou, and Y. T. Hou, “DDoS attack protection in [150] A. Ruiz-Rivera, K.-W. Chin, and S. Soh, “GreCo: An energy aware
the era of cloud computing and software-defined networking,” Comput. controller association algorithm for software defined networks,” IEEE
Netw., vol. 81, pp. 308–319, Apr. 2015. Commun. Lett., vol. 19, no. 4, pp. 541–544, Apr. 2015.
[129] R. Kloti, V. Kotronis, and P. Smith, “OpenFlow: A security analy- [151] A. Tootoonchian, M. Ghobadi, and Y. Ganjali, “OpenTM:
sis,” in Proc. 21st IEEE Int. Conf. Netw. Protocols (ICNP), Göttingen, Traffic matrix estimator for OpenFlow networks,” in Passive
Germany, 2013, pp. 1–6. and Active Measurement. Heidelberg, Germany: Springer, 2010,
[130] N. Handigol, B. Heller, V. Jeyakumar, D. Maziéres, and N. McKeown, pp. 201–210.
“Where is the debugger for my software-defined network?” in Proc. [152] S. R. Chowdhury, M. F. Bari, R. Ahmed, and R. Boutaba, “PayLess:
1st Workshop Hot Topics Softw. Defined Netw., Helsinki, Finland, 2012, A low cost network monitoring framework for software defined net-
pp. 55–60. works,” in Proc. IEEE Netw. Oper. Manag. Symp. (NOMS), Kraków,
[131] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, “The Poland, 2014, pp. 1–9.
click modular router,” ACM Trans. Comput. Syst., vol. 18, no. 3, [153] C. Yu et al., “FlowSense: Monitoring network utilization with zero
pp. 263–297, 2000. measurement cost,” in Passive and Active Measurement. Heidelberg,
[132] K. Benton, L. J. Camp, and C. Small, “OpenFlow vulnerability assess- Germany: Springer, 2013, pp. 31–41.
ment,” in Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. [154] J. Suh, T. T. Kwon, C. Dixon, W. Felter, and J. Carter, “OpenSample: A
Defined Netw., Hong Kong, 2013, pp. 151–152. low-latency, sampling-based measurement platform for SDN,” in Proc.
[133] A. Bates, K. Butler, A. Haeberlen, M. Sherr, and W. Zhou, “Let ICDCS, Madrid, Spain, 2014, pp. 1–10.
SDN be your eyes: Secure forensics in data center networks,” in [155] M. Yu, L. Jose, and R. Miao, “Software defined traffic measurement
Proc. NDSS Workshop Security Emerg. Netw. Technol. (SENT), 2014, with OpenSketch,” in Proc. NSDI, vol. 13. Lombard, IL, USA, 2013,
pp. 1–7. pp. 29–42.
[134] M. Suh, S. H. Park, B. Lee, and S. Yang, “Building firewall over [156] T. Benson, A. Anand, A. Akella, and M. Zhang, “MicroTE: Fine
the software-defined network controller,” in Proc. 16th Int. Conf. Adv. grained traffic engineering for data centers,” in Proc. 7th Conf. Emerg.
Commun. Technol. (ICACT), 2014, pp. 744–748. Netw. Exp. Technol., Tokyo, Japan, 2011, p. 8.
[135] W. P. de Jesus, D. A. da Silva, R. T. de Sousa, Jr., and F. V. L. da Frota, [157] P. Kazemian et al., “Real time network policy checking using header
“Analysis of SDN contributions for cloud computing security,” in Proc. space analysis,” in Proc. NSDI, Lombard, IL, USA, 2013, pp. 99–111.
IEEE/ACM 7th Int. Conf. Utility Cloud Comput. (UCC), London, U.K., [158] R. McGeer, “A safe, efficient update protocol for OpenFlow networks,”
2014, pp. 922–927. in Proc. 1st Workshop Hot Topics Softw. Defined Netw., Helsinki,
[136] R. Buyya, A. Beloglazov, and J. Abawajy, “Energy-efficient man- Finland, 2012, pp. 61–66.
agement of data center resources for cloud computing: A vision, [159] T. Mizrahi and Y. Moses, “Time-based updates in software defined
architectural elements, and open challenges,” in Proc. Green Cloud, networks,” in Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw.
2010, pp. 1–6. Defined Netw., Hong Kong, 2013, pp. 163–164.
[137] B. G. Assefa and O. Ozkasap, “State-of-the-art energy effi-
[160] C. R. Meiners, A. X. Liu, and E. Torng, “TCAM Razor: A system-
ciency approaches in software defined networking,” in Proc. ICN,
atic approach towards minimizing packet classifiers in TCAMs,” in
San Francisco, CA, USA, 2015, p. 268.
Proc. IEEE Int. Conf. Netw. Protocols (ICNP), Beijing, China, 2007,
[138] F. Kaup, S. Melnikowitsch, and D. Hausheer, “Measuring and modeling pp. 266–275.
the power consumption of OpenFlow switches,” in Proc. 10th Int.
[161] K. Kannan and S. Banerjee, “Compact TCAM: Flow entry compaction
Conf. Netw. Service Manag. (CNSM), Rio de Janeiro, Brazil, 2014,
in TCAM for power aware SDN,” in Distributed Computing and
pp. 181–186.
Networking. Heidelberg, Germany: Springer, 2013, pp. 439–444.
[139] C. E. Hopps. (2000). Analysis of an Equal-Cost Multi-Path
Algorithm. Accessed on Aug. 1, 2016. [Online]. Available: [162] C. R. Meiners, A. X. Liu, and E. Torng, “Bit Weaving: A non-prefix
https://tools.ietf.org/html/rfc2992 approach to compressing packet classifiers in TCAMs,” IEEE/ACM
Trans. Netw., vol. 20, no. 2, pp. 488–500, Apr. 2012.
[140] M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat,
“Hedera: Dynamic flow scheduling for data center networks,” in Proc. [163] Y. Kanizo, D. Hay, and I. Keslassy, “Palette: Distributing tables in
NSDI, vol. 10. San Jose, CA, USA, 2010, p. 19. software-defined networks,” in Proc. IEEE INFOCOM, Turin, Italy,
[141] A. R. Curtis, W. Kim, and P. Yalagandula, “Mahout: Low- 2013, pp. 545–549.
overhead datacenter traffic management using end-host-based ele- [164] H. Huang, P. Li, S. Guo, and B. Ye, “The joint optimization of rules
phant detection,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, allocation and traffic engineering in software defined network,” in Proc.
pp. 1629–1637. IEEE 22nd Int. Symp. Qual. Service (IWQoS), Hong Kong, 2014,
[142] A. R. Curtis et al., “DevoFlow: Scaling flow management for high- pp. 141–146.
performance networks,” ACM SIGCOMM Comput. Commun. Rev., [165] F. Giroire, J. Moulierac, and T. K. Phan, “Optimizing rule place-
vol. 41, no. 4, pp. 254–265, 2011. ment in software-defined networks for energy-aware routing,” in Proc.
[143] M. Yu, J. Rexford, M. J. Freedman, and J. Wang, “Scalable flow-based IEEE Glob. Commun. Conf. (GLOBECOM), Austin, TX, USA, 2014,
networking with DIFANE,” ACM SIGCOMM Comput. Commun. Rev., pp. 2523–2529.
vol. 40, no. 4, pp. 351–362, 2010. [166] M. Dong, H. Li, K. Ota, and J. Xiao, “Rule caching in SDN-enabled
[144] A. Tootoonchian and Y. Ganjali, “HyperFlow: A distributed control mobile access networks,” IEEE Netw., vol. 29, no. 4, pp. 40–45,
plane for OpenFlow,” in Proc. Internet Netw. Manag. Conf. Res. Jul./Aug. 2015.
Enterprise Netw., San Jose, CA, USA, 2010, p. 3. [167] N. Katta, O. Alipourfard, J. Rexford, and D. Walker, “Rule-
[145] Y. Hu, W. Wang, X. Gong, X. Que, and S. Cheng, “BalanceFlow: caching algorithms for software-defined networks,” Tech.
Controller load balancing for OpenFlow networks,” in Proc. IEEE 2nd Rep., 2014, accessed on Aug. 1, 2016. [Online]. Available:
Int. Conf. Cloud Comput. Intell. Syst. (CCIS), vol. 2. Hangzhou, China, http://www.cs.princeton.edu/~nkatta/papers/cacheflow-long14.pdf
2012, pp. 780–785. [168] M. Jarschel and R. Pries, “An OpenFlow-based energy-efficient data
[146] S. H. Yeganeh and Y. Ganjali, “Kandoo: A framework for effi- center approach,” in Proc. ACM SIGCOMM Conf. Appl. Technol.
cient and scalable offloading of control applications,” in Proc. 1st Architect. Protocols Comput. Commun., Helsinki, Finland, 2012,
Workshop Hot Topics Softw. Defined Netw., Helsinki, Finland, 2012, pp. 87–88.
pp. 19–24. [169] D. Kakadia and V. Varma. (2012). Energy Efficient Data Center
[147] Y. Guo, Z. Wang, X. Yin, X. Shi, and J. Wu, “Traffic engi- Networks—A SDN Based Approach. Accessed on Aug. 1, 2016.
neering in SDN/OSPF hybrid network,” in Proc. IEEE 22nd [Online]. Available: http://goo.gl/6o5MBj
Int. Conf. Netw. Protocols (ICNP), Raleigh, NC, USA, 2014, [170] J. M. Wang, Y. Wang, X. Dai, and B. Bensaou, “SDN-based multi-class
pp. 563–568. QoS-guaranteed inter-data center traffic management,” in Proc. IEEE
[148] A. Chanda, C. Westphal, and D. Raychaudhuri, “Content based traffic 3rd Int. Conf. Cloud Netw. (CloudNet), 2014, pp. 401–406.
engineering in software defined information centric networks,” in Proc. [171] A. Sallahi and M. St-Hilaire, “Optimal model for the controller place-
IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), ment problem in software defined networks,” IEEE Commun. Lett.,
Turin, Italy, 2013, pp. 357–362. vol. 19, no. 1, pp. 30–33, Jan. 2015.
[149] B. Puype, W. Vereecken, D. Colle, M. Pickavet, and P. Demeester, [172] S.-H. Wang, “Virtual machine placement for energy efficiency and QoS
“Multilayer traffic engineering for energy efficiency,” Photon. Netw. in software defined datacenter networks,” Ph.D. dissertation, College
Commun., vol. 21, no. 2, pp. 127–140, 2011. Elect. Comput. Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan, 2013.
346 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. 1, FIRST QUARTER 2017
[173] D. Li, Y. Shang, and C. Chen, “Software defined green data center Danda B. Rawat (S’07–M’09–SM’13) received
network with exclusive routing,” in Proc. IEEE INFOCOM, Toronto, the Ph.D. degree in electrical and computer engi-
ON, Canada, 2014, pp. 1743–1751. neering from Old Dominion University, Norfolk,
[174] A. Markiewicz, P. N. Tran, and A. Timm-Giel, “Energy consump- VA, USA. He is an Associate Professor with
tion optimization for software defined networks considering dynamic the Department of Electrical Engineering and
traffic,” in Proc. IEEE 3rd Int. Conf. Cloud Netw. (CloudNet), 2014, Computer Science, Howard University, Washington,
pp. 155–160. DC, USA. He was with the College of Engineering
[175] J. Naous, D. Erickson, G. A. Covington, G. Appenzeller, and and Information Technology, Georgia Southern
N. McKeown, “Implementing an OpenFlow switch on the NetFPGA University, Statesboro, GA, USA, as a Faculty
platform,” in Proc. 4th ACM/IEEE Symp. Architect. Netw. Commun. Member until 2016. He has published over 120
Syst., San Jose, CA, USA, 2008, pp. 1–9. scientific/technical articles and eight books. His
[176] T. H. Vu, V. C. Luc, N. T. Quan, N. H. Thanh, and P. N. Nam, “Energy research focuses on wireless communication networks, cybersecurity, cyber-
saving for OpenFlow switch on the NetFPGA platform based on queue physical systems, Internet-of-Things, big data analytics, wireless virtualiza-
engineering,” SpringerPlus, vol. 4, no. 1, p. 64, 2015. tion, software-defined networks, smart grid systems, wireless sensor networks,
[177] Y. Hua, X. Liu, and D. Feng, “Smart in-network deduplication for and vehicular/wireless ad-hoc networks. His research is supported by U.S.
storage-aware SDN,” ACM SIGCOMM Comput. Commun. Rev., vol. 43, National Science Foundation, University Sponsored Programs and Center for
no. 4, pp. 509–510, 2013. Sustainability grants. He was a recipient of the NSF Faculty Early Career
[178] S. Keshav, An Engineering Approach to Computer Networking: ATM Development (CAREER) Award and the Outstanding Research Faculty Award
Networks, the Internet, and the Telephone Network, vol. 11997. (Award for Excellence in Scholarly Activity) in 2015, from Allen E. Paulson
Reading, MA, USA: Addison-Wesley, 1997. College of Engineering and Technology, Georgia Southern University among
[179] D. Awduche, A. Chiu, A. Elwalid, I. Widjaja, and X. Xiao, others, and nominated for the Faculty Award of Excellence in Teaching
“Overview and principles of Internet traffic engineering,” Tech. in 2016 from College of Engineering and Technology, Georgia Southern
Rep., 2002, accessed on Aug. 1, 2016. [Online]. Available: University. He has been serving as an Editor/Guest Editor for over ten
https://tools.ietf.org/html/rfc3272 international journals. He serves as the Web-Chair for the IEEE INFOCOM
[180] B. Fortz, J. Rexford, and M. Thorup, “Traffic engineering with tra- 2016/2017, served as the Student Travel Grant Co-Chair of the IEEE
ditional IP routing protocols,” IEEE Commun. Mag., vol. 40, no. 10, INFOCOM 2015, and the Track Chair for Wireless Networking and Mobility
pp. 118–124, Oct. 2002. of the IEEE CCNC 2016 and Communications Network and Protocols of
[181] D. O. Awduche and B. Jabbari, “Internet traffic engineering using the IEEE AINA 2015. He served as the Program Chair, the General Chair,
multi-protocol label switching (MPLS),” Comput. Netw., vol. 40, no. 1, and the Session Chair for numerous international conferences and workshops,
pp. 111–129, 2002. and served as a Technical Program Committee Member for several interna-
[182] N. Katta, O. Alipourfard, J. Rexford, and D. Walker, “Infinite tional conferences including the IEEE INFOCOM, the IEEE GLOBECOM,
CacheFlow in software-defined networks,” in Proc. 3rd Workshop Hot the IEEE CCNC, the IEEE GreenCom, the IEEE AINA, the IEEE ICC, the
Topics Softw. Defined Netw., Chicago, IL, USA, 2014, pp. 175–180. IEEE WCNC, and the IEEE VTC conferences. He is the Founder and the
[183] E. Spitznagel, D. Taylor, and J. Turner, “Packet classification using Director of the Cyber-Security and Wireless Networking Innovations (CWiNs)
extended TCAMs,” in Proc. 11th IEEE Int. Conf. Netw. Protocols, Research Laboratory. He served as the Vice Chair of the Executive Committee
Atlanta, GA, USA, 2003, pp. 120–131. of the IEEE Savannah Section and Webmaster for the section from 2013 to
[184] X. Jin et al., “Dynamic scheduling of network updates,” in Proc. ACM 2017. He is a member of ACM and ASEE.
Conf. SIGCOMM, Chicago, IL, USA, 2014, pp. 539–550.
[185] S. Sezer et al., “Are we ready for SDN? Implementation challenges
for software-defined networks,” IEEE Commun. Mag., vol. 51, no. 7,
pp. 36–43, Jul. 2013. Swetha R. Reddy (S’15–M’16) received
[186] Á. L. V. Caraguay, A. B. Peral, L. I. B. López, and L. J. G. Villalba, the bachelor’s degree from Jawaharlal Nehru
“SDN: Evolution and opportunities in the development IoT applica- Technological University, India, in 2014, and the
tions,” Int. J. Distrib. Sens. Netw., vol. 2014, 2014, Art. no. 735142. master’s degree in electrical and electronics systems
[187] Z. Qin, G. Denker, C. Giannelli, P. Bellavista, and from the Department of Electrical Engineering,
N. Venkatasubramanian, “A software defined networking archi- Georgia Southern University, Statesboro GA,
tecture for the Internet-of-Things,” in Proc. IEEE Netw. Oper. Manag. USA, in 2016. She was a Graduate Research
Symp. (NOMS), Kraków, Poland, 2014, pp. 1–9. Assistant with the Cybersecurity, Wireless Systems
[188] N. Dorsch, F. Kurtz, H. Georg, C. Hägerling, and C. Wietfeld, and Networking Innovations Laboratory, College
“Software-defined networking for smart grid communications: of Engineering and Information Technology,
Applications, challenges and advantages,” in Proc. IEEE Int. Georgia Southern University, Statesboro, GA,
Conf. Smart Grid Commun. (SmartGridComm), Venice, Italy, 2014, USA. Her research lies in the areas of wireless communication networks,
pp. 422–427. software-defined networks, and network security.