随着VoIP(Voice over Internet Protocol)的迅速发展,作为VoIP的主流协议的SIP协议成为各大运营商和设备商所关注的热点,出现了许多用SIP协议来通信的软终端。为了可以引入更多的用户对呼叫中心的使用,提出了一种基于SIP协议和CSTA呼叫...随着VoIP(Voice over Internet Protocol)的迅速发展,作为VoIP的主流协议的SIP协议成为各大运营商和设备商所关注的热点,出现了许多用SIP协议来通信的软终端。为了可以引入更多的用户对呼叫中心的使用,提出了一种基于SIP协议和CSTA呼叫模型的实现方法,将SIP协议和CSTA呼叫模型结合起来,用SIP协议来实现终端和服务器的通信并实时对外汇报终端状态的变化,这样就可以实现第三方监控,并通过测试验证了其可行性。展开更多
At the invitation of the Russian Centre for International Scientific and Cultural Cooperation (RCISCC), the CPAFFC and the China Science and Technology Asso-
Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server,a significant parameter called trust was introduced.Trust-based security pla...Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server,a significant parameter called trust was introduced.Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic.In most cloud-based data distribution environments,emphasis is placed on accepting trusted client users’requests,but the cloud servers’integrity is seldom verified.This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue.The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method.In this trust-based access control mechanism framework,trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions,service satisfaction index,and dishonesty level.In addition to this,trust values are assigned to cloud servers based on the metrics:server load,service rejection rate,and service access delay.The role-Based Access control policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level,then another suitable server will be selected.The proposed system is found to outperform other existing systems in a multi-cloud environment.展开更多
Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things(IoT)network.To overcome this challenge,a secure Lightweight On-demand Ad hoc Distancevector...Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things(IoT)network.To overcome this challenge,a secure Lightweight On-demand Ad hoc Distancevector—Next Generation(LOADng)Routing Protocol is proposed in this paper.As the LOADng protocol is the second version of Ad Hoc On-Demand Distance Vector(AODV)protocol,it retains most of the basic functionality and characteristics of AODV.During the route discovery process,the cyclic shift transposition algorithm(CSTA)is used to encrypt the control packets of the LOADng protocol to improve its security.CSTA approach only derives transposition and substitution without product cipher with respect to input data.Besides this,for choosing the best probable path between the source and destination,routing metrics such as link quality Indicator(LQI),hop count(HC)and queue length(QL)are included in the control packets.The data is then securely sent using CSTA using the optimal secure path selected.Experimental Results depict that the proposed secure and optimal LOADng(SO-LOADng)using CSTA encryption obtains better throughput,delivery ratio encryption time and decryption time than the existing state-ofart approaches.展开更多
文摘随着VoIP(Voice over Internet Protocol)的迅速发展,作为VoIP的主流协议的SIP协议成为各大运营商和设备商所关注的热点,出现了许多用SIP协议来通信的软终端。为了可以引入更多的用户对呼叫中心的使用,提出了一种基于SIP协议和CSTA呼叫模型的实现方法,将SIP协议和CSTA呼叫模型结合起来,用SIP协议来实现终端和服务器的通信并实时对外汇报终端状态的变化,这样就可以实现第三方监控,并通过测试验证了其可行性。
文摘At the invitation of the Russian Centre for International Scientific and Cultural Cooperation (RCISCC), the CPAFFC and the China Science and Technology Asso-
文摘Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server,a significant parameter called trust was introduced.Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic.In most cloud-based data distribution environments,emphasis is placed on accepting trusted client users’requests,but the cloud servers’integrity is seldom verified.This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue.The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method.In this trust-based access control mechanism framework,trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions,service satisfaction index,and dishonesty level.In addition to this,trust values are assigned to cloud servers based on the metrics:server load,service rejection rate,and service access delay.The role-Based Access control policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level,then another suitable server will be selected.The proposed system is found to outperform other existing systems in a multi-cloud environment.
文摘Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things(IoT)network.To overcome this challenge,a secure Lightweight On-demand Ad hoc Distancevector—Next Generation(LOADng)Routing Protocol is proposed in this paper.As the LOADng protocol is the second version of Ad Hoc On-Demand Distance Vector(AODV)protocol,it retains most of the basic functionality and characteristics of AODV.During the route discovery process,the cyclic shift transposition algorithm(CSTA)is used to encrypt the control packets of the LOADng protocol to improve its security.CSTA approach only derives transposition and substitution without product cipher with respect to input data.Besides this,for choosing the best probable path between the source and destination,routing metrics such as link quality Indicator(LQI),hop count(HC)and queue length(QL)are included in the control packets.The data is then securely sent using CSTA using the optimal secure path selected.Experimental Results depict that the proposed secure and optimal LOADng(SO-LOADng)using CSTA encryption obtains better throughput,delivery ratio encryption time and decryption time than the existing state-ofart approaches.