{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:53:22Z","timestamp":1761630802725},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/cit.2017.45","type":"proceedings-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T20:49:56Z","timestamp":1505422196000},"page":"286-291","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services"],"prefix":"10.1109","author":[{"given":"Madhusanka","family":"Liyanage","sequence":"first","affiliation":[]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.017"},{"journal-title":"Alcatel-Lucent Network Routing Specialist II (NRS II) Self-Study Guide Preparing for the NRS II Certification Exams Self-Study Guide (paperback)","year":"2011","author":"warnock","key":"ref38"},{"journal-title":"Juniper Networks Inc Tech Rep","article-title":"Demystifying H-VPLS","year":"2010","key":"ref33"},{"journal-title":"CISCO Cooperation Tech Rep","article-title":"H-VPLS N-PE Redundancy for QinQ and MPLS Access","year":"2011","key":"ref32"},{"key":"ref31","article-title":"IP-Only LAN Service (IPLS)","author":"shah","year":"2007","journal-title":"Internet Draft IETF"},{"key":"ref30","article-title":"HIP-based Virtual Private LAN Service (HIPLS)","author":"henderson","year":"2011","journal-title":"IETF"},{"journal-title":"Hierarchical Virtual Private LAN Service Protection Scheme","year":"2007","author":"zelig","key":"ref37"},{"journal-title":"Enhanced H-VPLS Service Architecture Using Control Word","year":"2009","author":"hu","key":"ref36"},{"key":"ref35","article-title":"Virtual Hierarchical LAN Services","author":"sodder","year":"2003","journal-title":"Internet Draft IETF"},{"key":"ref34","article-title":"Hierarchical Virtual Private LAN Service","author":"khandekar","year":"2002","journal-title":"Internet Draft IETF"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883778"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090108"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918913"},{"key":"ref12","first-page":"1","author":"liyanage","year":"2014","journal-title":"Securing the Control Channel of Software-Defined Mobile Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247513"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2015.7194059"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2015.43"},{"journal-title":"Performance Analysis of Open-Source Linux-Based HIP Implementations","year":"2015","author":"okwuibe","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIINFS.2015.7399014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444836"},{"key":"ref19","article-title":"New Concepts for Traffic, Resource and Mobility Management in Software-Defined Mobile Networks","author":"ahmad","year":"2016","journal-title":"Proc 4th Conference on Wireless On demand Network Systems and Services (WONS)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4761"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2447014"},{"journal-title":"Alcatel-Lucent Technical Report","article-title":"Virtual Private LAN Service (VPLS) Technical Primer for Government Agencies","year":"2008","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0818-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1411"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4762"},{"key":"ref5","article-title":"Opportunities and Challenges of Software-Defined Mobile Networks in Network Security Perspective","author":"liyanage","year":"0","journal-title":"IEEE Security and Privacy Magazine 2015"},{"journal-title":"IEEE Wireless Communication and Networking Conference WCNC 2013 IEEE","article-title":"A Scalable and Secure VPLS Architecture for Provider Provisioned Networks","year":"2013","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2012.6399037"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.701"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682712"},{"journal-title":"Enhancing security and scalability of virtual private lan services","year":"2016","author":"liyanage","key":"ref1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5201"},{"key":"ref20","article-title":"Per-formance and Security Evaluation of Intra-Vehicular Communication Architecture","author":"liyanage","year":"2016","journal-title":"Proc of IEEE ICC 2016 - Workshop on Convergent Internet of Things (Convergent IoT) Kuala Lumpur Malaysia IEEE"},{"journal-title":"SCADA Supervisory Control and Data Acquisition International Society of Automation","year":"2009","author":"boyer","key":"ref45"},{"key":"ref48","first-page":"1","article-title":"IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges","year":"2004","journal-title":"IEEE Std 802 1D-2004 (Revision of IEEE Std 802 1D-1998)"},{"journal-title":"Zone-based Security Architecture for Intra-Vehicular Wireless Communication","year":"2015","author":"liyanage","key":"ref22"},{"key":"ref47","article-title":"The OMNeT++ Discrete Event Simulation System","author":"varga","year":"2001","journal-title":"Proc European Simulation Multiconference (ESM 01)"},{"key":"ref21","article-title":"Provider Assisted Wi-Fi Offloading Leveraging on SDN","author":"okwuibe","year":"2016","journal-title":"Proc of 22nd European Wireless conference Oulu Finland"},{"journal-title":"Tempered Networks","year":"0","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1201\/b17352-10"},{"key":"ref41","article-title":"Boeing HIP Secure Mobile Architecture","author":"henderson","year":"0","journal-title":"Tech Rep"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1002\/9781118900253","author":"liyanage","year":"2015","journal-title":"Software Defined Mobile Networks (SDMN) Beyond LTE Network Architecture"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1117\/12.573606"},{"journal-title":"Software-Defined and Virtualized Mobile Networks","year":"2016","author":"zhang","key":"ref26"},{"journal-title":"Tofino Security Appliance","year":"0","key":"ref43"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"44","DOI":"10.4018\/978-1-4666-5170-8.ch003","article-title":"IP-Based Virtual Private Network Implementations in Future Cellular Networks","author":"liyanage","year":"2014","journal-title":"Handbook of Research on Progressive Trends in Wireless Communications and Networking"}],"event":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","start":{"date-parts":[[2017,8,21]]},"location":"Helsinki, Finland","end":{"date-parts":[[2017,8,23]]}},"container-title":["2017 IEEE International Conference on Computer and Information Technology (CIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8031003\/8031434\/08031487.pdf?arnumber=8031487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T13:56:33Z","timestamp":1570110993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8031487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/cit.2017.45","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}