期刊文献+

网络弹性技术研究 被引量:4

Research on Network Resilience Technology
下载PDF
导出
摘要 当前网络攻击愈演愈烈且呈现出复杂性、自适应和持续性等特点,期望能够完全抵御各种网络攻击已不再可能。现在的问题是,如何在攻击中仍能保持正常任务的顺利完成,即如何提高网络的弹性。本文详细阐述了网络弹性技术的基本概念、基本原理、技术特征以及关键技术,并结合发展趋势给出了相关建议,可作为下一步开展网络安全防护体系设计的参考依据。 Currently network at acks is intensified and exhibit the characteristics of complexity, adaptive and persistence. It is no longer possible to expect to be able to completely resist al kinds of network at acks . The kernel problem is how to perform the normal task while the at acks have been successful y. Namely, how to improve the network resilience. This paper il istrates the basic concepts of network resilience, the technical principle, technical characteristics, as wel as the key technology.Some reference is given combining the developing trend and the conclusion can be used as the next step design reference to construct the network security protection system.
出处 《信息安全与技术》 2014年第9期36-40,共5页
基金 国家自然科学基金项目(61063042) 中国博士后科学基金项目(201104753) 北京市自然科学基金项目(4132025)
关键词 网络弹性 冗余技术 完整性度量技术 安全隔离技术 network resilience redundant integrity measurement security isolation
  • 相关文献

参考文献1

二级参考文献17

  • 1PARK T, SHIN K G. LISP: A lightweight security pro- tocol for wireless sensor networks [J]. A CM Transac-tions on Embedded Computing Systems (TECS), 2004, 3: 634-660.
  • 2PISTER K, KAHN J, BOSER B. Smart dust [EB/OL]. (2009-06-01). http:Hrobotics.eecs.berkeley.edu/~pister/ SmartDust/.
  • 3KAUAR F, HUSSIAN S, YANG L T, et al. Scalable and efficient key management for heterogeneous sensor net- works [J]. The Journal of Supercomputing, 2008, 45(1): 44-65.
  • 4Lu K, QIAN Y, HU J. A framework for distributed key management schemes in heterogeneous wireless sensor networks [C]// Proceedings of 25th IEEE International Performance, Computing, and Communications Con- ference, IPCCC 2006. [s.1.]: IEEE, 2006: 513-519.
  • 5TRAYNOR P, KUMAR R, CHOI H, et al. Efficient hy- brid security mechanisms for heterogeneous sensor net- works [J]. IEEE Transactions on Mobile Computing, 2007, 6: 663-677.
  • 6LIU D, NING P. Location-based pairwise key estab- lishments for static sensor networks [C]//ACM Work- shop on Security in Ad Hoe and Sensor Networks (SASN '03).[s.1.]: ACM Press, 2003: 72-82.
  • 7Yu Z, GUAN Y. A key pre-distribution scheme using deployment knowledge for wireless sensor net- works [C]// Proceedings of Fourth International Sym- posium on Information Processing in Sensor Networks. Piscataway, N J, USA: IEEE, 2005: 261-268.
  • 8LIU D, NING P. Establishing pairwise keys in dis- tributed sensor networks [C]//Proceedings of lOth ACM Conference on Computer and Communications Security (CCS'03). Washington, DC, USA: ACM Press, 2003: 52-61.
  • 9BLUNDO C, SANTIS A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic confer- ences [C]// Proceedings of Advances in Cryptology- CRYPTO'92, LNCS 740. California, USA: ACM Press, 1993: 471-486.
  • 10CHAN H, GLIGOR V D, PERRIG A, et al. On the distri- bution and revocation of cryptographic keys in sensor networks [J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2: 233-247.

共引文献1

同被引文献24

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部