期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Aviation-oriented Mobility Management Method in IP/LEO Satellite Networks
1
作者 郭欣 张军 +1 位作者 张涛 丁演文 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2008年第3期252-260,共9页
Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented m... Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented mobility management method for IP/low earth orbit (LEO) satellite networks. By introducing the concept of ground station real-time coverage area, the proposed method uses ground-station-based IP addressing method and cell paging scheme to decrease the frequency of IP binding update requests as well as the paging cost. In comparison with the paging mobile IP (P-MIP) method and the handover-independent IP mobility management method, as is verified by the mathematical analysis and simulation, the proposed method could decrease the management cost. It also possesses better ability to support the aviation nodes because it is subjected to fewer influences from increased node speeds and newly coming connection rates. 展开更多
关键词 mobility management ip address binding update ground station management aviation node ip/LEO satellite networks
下载PDF
Linux Kali for Social Media User Location:A Target-Oriented Social Media Software Vulnerability Detection
2
作者 Adnan Alam Khan Qamar-ul-Arfeen 《Journal of Cyber Security》 2021年第4期201-205,共5页
Technology is expanding like a mushroom,there are various benefits of technology,in contrary users are facing serious losses by this technology.Furthermore,people lost their lives,their loved ones,brain-related diseas... Technology is expanding like a mushroom,there are various benefits of technology,in contrary users are facing serious losses by this technology.Furthermore,people lost their lives,their loved ones,brain-related diseases,etc.The industry is eager to get one technology that can secure their finance-related matters,personal videos or pictures,precious contact numbers,and their current location.Things are going worst because every software has some sort of legacy,deficiency,and shortcomings through which exploiters gain access to any software.There are various ways to get illegitimate access but on the top is Linux Kali with QRLjacker by user grabber command.This study recapitulates the impacts of the said technology and related avoidance.Detail contemplation depicts social media users like WhatsApp users can take a long sigh of relief when they will adopt the recommended methods.The problem is breaching of legitimate social media real-time location by an illegitimate user through Linux Kali,for this reason,end-user has no knowledge to spoof their IP to protect their real-time location.This paper will address the solution to the said problem. 展开更多
关键词 Cyber security defensive tools Linux Kali WhatsApp ip address Artificial Intelligence social media security
下载PDF
Study on the Security Evaluation based on Fault Tree
3
《International English Education Research》 2013年第12期4-6,共3页
Nowadays, there is a huge Intemet in the computer network, and a unified management on hundreds of thousands of computers has become a common phenomenon. Thus, it's not hard to imagine that the computer network is vu... Nowadays, there is a huge Intemet in the computer network, and a unified management on hundreds of thousands of computers has become a common phenomenon. Thus, it's not hard to imagine that the computer network is vulnerable to be threatened in security. In this paper, the problems of the computer network security are discussed. By establishing a reasonable fault tree system, computer security evaluation is completed within a given range, and each computer has its own IP address. In this process, it is necessary to find out a MAC address related to each IP address. A standard form is needed for address management, and then ARP table emerges. The emergence of ARP makes each IP address corresponding to MAC address, and also the communication between computers becomes very convenient. However, the t network security will be affected accordingly. 展开更多
关键词 Computer Network Fault Tree ip Address MAC Address
下载PDF
Building an IPv6 address generation and traceback system with NIDTGA in Address Driven Network 被引量:7
4
作者 LIU Ying REN Gang +3 位作者 WU JianPing ZHANG ShengLin HE Lin JIA YiHao 《Science China Chemistry》 SCIE EI CAS CSCD 2015年第12期10-23,共14页
In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control... In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control, traceability and improving the trustworthiness of the Internet. This paper designed a scalable Network Identity(NID) scheme for the Internet users, proposed NIDTGA(Network Identity and Time Generated Address), an IPv6 address generation algorithm embedded NID and time information, then designed and implemented an IPv6 address generation and traceback system based on NIDTGA. The design of NIDTGA, which reflects the length, time and owner attributes of the IP address, can be a good support to ADN(Address Driven Network). At the same time, by embedding the key elements of user identity and time in the IPv6 address,and by taking into account both the traceability and privacy, NIDTGA can provide a technical basis for the establishment of the network trust mechanism, and achieve the traceability of security event. 展开更多
关键词 network identity ipv6 Address Driven Network ip traceback ip address generation
原文传递
Building a next generation Internet with source address validation architecture 被引量:8
5
作者 WU JianPing1,3,REN Gang1,3 & LI Xing2,3 1 Department of Computer Science,Tsinghua University,Beijing 100084,China 2 Department of Electronic Engineering,Tsinghua University,Beijing 100084,China 3 Tsinghua National Laboratory for Information Science and Technology(TNList) ,Beijing 100084,China 《Science in China(Series F)》 2008年第11期1681-1691,共11页
The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems.... The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems. Based on the drastically increased IPv6 address space, a "source address validation architecture" (SAVA) is proposed in this paper, which can guarantee that every packet received and forwarded holds an authenticated source IP address. The design goals of the architecture are lightweight, loose coupling, "multi-fence support" and incremental deployment. This paper discusses the design and implementation for the architecture, including inter-AS, intra-AS and local subnet. The performance and scalability of SAVA are described. This architecture is deployed into the CNGI-CERNET2 infrastructure a large-scale native IPv6 backbone network of the China Next Generation Internet project. We believe that the SAVA will help the transition to a new, more secure and dependable Internet. 展开更多
关键词 ip source address validation network architecture network security
原文传递
The road towards future Internet
6
作者 WU Jianping LIU Lili LI Dan 《Journal of Communications and Information Networks》 2016年第1期86-97,共12页
Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches ... Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches and clean-slate approaches.The representative evolutionary solution is IPv6,while representative clean-slate approaches are NDN(Named Data Networking),MobilityFirst,NEBULA,XIA(Expressive Internet Architecture),and SDN(Software-Defined Networking).A comprehensive survey of these approaches are presented.Additionally,a novel network architecture that we recently proposed:ADN(Address-Driven Networking)is described,which intends to address the challenges faced by today’s Internet via the flexible and innovative utilization of IP addresses. 展开更多
关键词 future internet architecture address-driven network ipV6 ROUTING FORWARDING ip address
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部