期刊文献+
共找到290篇文章
< 1 2 15 >
每页显示 20 50 100
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
1
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching internet protocol security Virtual Private Network Video Conferencing Voice over internet protocol JITTER End to End Delay
下载PDF
A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
2
作者 JIANG Rui 《China Communications》 SCIE CSCD 2010年第4期23-28,共6页
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ... Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively. 展开更多
关键词 Denial of Service security protocol Analysis Formal Theory Strand Space Model internet Key Exchange
下载PDF
IP Security协议分析及VPN建设探讨 被引量:1
3
作者 陈世清 《湖南工程学院学报(自然科学版)》 2002年第4期54-56,59,共4页
VPN是实现在公网上安全传输和私有网络信息的一种技术 .IPSec是新一代互连网安全标准。结合IPSec协议标准 ,研究基于IPSec的VPN技术及实现 ,指出IPSec在VPN安全性方面的重要作用 ,对提高网络的安全性和可靠性 。
关键词 IP security协议 VPN ipsec协议 网络安全 虚拟专用网 隧道技术 网络建设
下载PDF
IPsec的Internet密钥交换
4
作者 袁剑 刘刚 王文海 《西安文理学院学报(自然科学版)》 2006年第4期52-56,共5页
介绍了IPsec的基本组成和一组IKE协议.分析了IKE协议的安全特性,以及IKE的协商过程.其中包括:在主模式中建立ISAKMP SA的过程和在快速模式中利用已建立好的ISAKMP SA完成IPsec SA的协商.通过详细分析主模式中用于完成SA要交换的六个消... 介绍了IPsec的基本组成和一组IKE协议.分析了IKE协议的安全特性,以及IKE的协商过程.其中包括:在主模式中建立ISAKMP SA的过程和在快速模式中利用已建立好的ISAKMP SA完成IPsec SA的协商.通过详细分析主模式中用于完成SA要交换的六个消息的发送步骤、属性、结构来说明安全性的实现. 展开更多
关键词 IPscc IKE 密钥交换
下载PDF
A survey of edge computing-based designs for IoT security 被引量:11
5
作者 Kewei Sha T.Andrew Yang +1 位作者 Wei Wei Sadegh Davari 《Digital Communications and Networks》 SCIE 2020年第2期195-202,共8页
Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physi... Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications.As an extension of the cloud,the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications.Although there are some research efforts in this area,edge-based security designs for IoT applications are still in its infancy.This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs.We first present an edge-centric IoT architecture.Then,we extensively review the edge-based IoT security research efforts in the context of security architecture designs,firewalls,intrusion detection systems,authentication and authorization protocols,and privacy-preserving mechanisms.Finally,we propose our insight into future research directions and open research issues. 展开更多
关键词 Edge computing internet of Things(IoT) security Architecture secure protocols FIREWALL Intrusion detection Authentication AUTHORIZATION Privacy
下载PDF
Internet安全技术——IPSec 被引量:1
6
作者 桂玲 《铁道通信信号》 2000年第6期26-28,共3页
论述了当前 Internet本身存在的安全问题和当今应用的安全技术 ,详细介绍了 IETF的最新安全技术标准
关键词 internet 安全问题 IP安全技术 ipsec协议
下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
7
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
下载PDF
Developing a New Security Framework for Bluetooth Low Energy Devices
8
作者 Qiaoyang Zhang Zhiyao Liang Zhiping Cai 《Computers, Materials & Continua》 SCIE EI 2019年第5期457-471,共15页
Wearable devices are becoming more popular in our daily life.They are usually used to monitor health status,track fitness data,or even do medical tests,etc.Since the wearable devices can obtain a lot of personal data,... Wearable devices are becoming more popular in our daily life.They are usually used to monitor health status,track fitness data,or even do medical tests,etc.Since the wearable devices can obtain a lot of personal data,their security issues are very important.Motivated by the consideration that the current pairing mechanisms of Bluetooth Low Energy(BLE)are commonly impractical or insecure for many BLE based wearable devices nowadays,we design and implement a security framework in order to protect the communication between these devices.The security framework is a supplement to the Bluetooth pairing mechanisms and is compatible with all BLE based wearable devices.The framework is a module between the application layer and the GATT(Generic Attribute Profile)layer in the BLE architecture stack.When the framework starts,a client and a server can automatically and securely establish shared fresh keys following a designed protocol;the services of encrypting and decrypting messages are provided to the applications conveniently by two functions;application data are securely transmitted following another protocol using the generated keys.Prudential principles are followed by the design of the framework for security purposes.It can protect BLE based wearable devices from replay attacks,Man-in-The-Middle attacks,data tampering,and passive eavesdropping.We conduct experiments to show that the framework can be conveniently deployed with practical operational cost of power consumption.The protocols in this framework have been formally verified that the designed security goals are satisfied. 展开更多
关键词 Bluetooth Low Energy security PRIVACY protocol wearable devices internet of Things
下载PDF
基于IPSec技术的中波广播发射台播出系统监控平台设计方案 被引量:2
9
作者 王晓春 《电声技术》 2023年第11期18-20,共3页
作为实现中波广播发射台自动化的主要设备,播出系统的监控平台在稳定数据采集分析、自动音视频处理控制和系统性能监测管理等方面发挥着重要作用,最大限度地降低了安全播出事故发生的概率。文章以中波发射台播出系统监控平台设计方案为... 作为实现中波广播发射台自动化的主要设备,播出系统的监控平台在稳定数据采集分析、自动音视频处理控制和系统性能监测管理等方面发挥着重要作用,最大限度地降低了安全播出事故发生的概率。文章以中波发射台播出系统监控平台设计方案为重点,通过分析研究互联网协议安全(Internet Protocol Security,IPSec)技术原理,从设计思路、技术协议、系统架构、加密算法以及访问验证等方面深入探讨设计方案的可行性,并对方案实现进行详细论证,以期为中波发射台建设提供参考。 展开更多
关键词 中波广播 播出系统 监控平台 互联网协议安全(ipsec)技术
下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
10
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc... Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%. 展开更多
关键词 internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
下载PDF
基于IPSec的安全路由器设计与实现 被引量:6
11
作者 朱蕾 张勇 白英彩 《计算机工程》 CAS CSCD 北大核心 2001年第6期114-115,133,共3页
在介绍IETF制订的IPSec协议簇基础上,以上海交通大学金桥网络中心研制开发的BQ2800/BQ5000系列路由器为例,详细介绍了通过引入IPSec技术构建安全路由器的原理,并给出了协议实现的总体结构,分析了BQ2800/BQ5000路由器的安全特性,以... 在介绍IETF制订的IPSec协议簇基础上,以上海交通大学金桥网络中心研制开发的BQ2800/BQ5000系列路由器为例,详细介绍了通过引入IPSec技术构建安全路由器的原理,并给出了协议实现的总体结构,分析了BQ2800/BQ5000路由器的安全特性,以及安全功能的增加对其性能的影响。 展开更多
关键词 ipsec 安全 路由器 密钥交换 internet 数据完整性
下载PDF
基于PKI的IPSec-VPN网关的设计与实现 被引量:8
12
作者 孟桂娥 熊云凤 杨宇航 《计算机工程》 CAS CSCD 北大核心 2001年第2期102-104,共3页
针对IPSec-VPN网关开发的特点,提出了PKI代理网关的概念,并就一个基于PKI的IPSec-VPN网关开发的实例作了比较详细的描述,给出了实现的框图和几个主要算法。
关键词 公钥基础设施 internet 虚拟专用网 网关 ipsec-
下载PDF
新一代IPSec密钥交换规范IKEv2的研究 被引量:12
13
作者 韩旭东 汤隽 郭玉东 《计算机工程与设计》 CSCD 北大核心 2007年第11期2549-2552,2558,共5页
对IPSec工作组于2005年12月推出的最新版的IKE(internet key exchange)协议标准——IKEv2协议(RFC4306)的协商过程、网络通信、密钥衍生和协议的安全性等关键内容进行了深入的研究,并对IKE协议所存在的缺陷及IKEv2在密钥交换的安全性和... 对IPSec工作组于2005年12月推出的最新版的IKE(internet key exchange)协议标准——IKEv2协议(RFC4306)的协商过程、网络通信、密钥衍生和协议的安全性等关键内容进行了深入的研究,并对IKE协议所存在的缺陷及IKEv2在密钥交换的安全性和高效性上所做出的改进进行了深入的分析研究,为IKEv2的实现奠定了可靠的理论基础。 展开更多
关键词 IP安全协议 密钥交换 协议规范 安全性 通信性能
下载PDF
基于IPSec的VPN在Linux下的实现 被引量:5
14
作者 周立峰 周昕 金志权 《计算机应用研究》 CSCD 北大核心 2002年第5期61-63,共3页
描述了基于IPSec的虚拟专用网实现关键技术,给出了在Linux下的两种典 型实现方案。
关键词 VPN LINUX 虚拟专用网 隧道模式 ipsec协议 防火墙 计算机网络
下载PDF
面向IPsec安全策略的VPN性能评估模型 被引量:9
15
作者 顾文婷 潘雪增 +1 位作者 楼学庆 郑斯琦 《计算机工程与应用》 CSCD 北大核心 2009年第36期78-81,共4页
IPsec安全策略复杂的语义增加了IPsec VPN性能分析的难度,为了解决IPsec VPN性能分析过程中缺乏框架结构而无法保证评估有效性的问题,提出了基于IPsec安全策略的VPN性能评估模型。模型构建了可扩展的虚拟VPN环境,通过维护IPsec安全策略... IPsec安全策略复杂的语义增加了IPsec VPN性能分析的难度,为了解决IPsec VPN性能分析过程中缺乏框架结构而无法保证评估有效性的问题,提出了基于IPsec安全策略的VPN性能评估模型。模型构建了可扩展的虚拟VPN环境,通过维护IPsec安全策略提高VPN性能的可控性,利用多线程并发控制实现数据的并行统计。最后通过实验验证了模型在VPN性能评估中的可靠性和可用性。 展开更多
关键词 ipsec协议 虚拟专用网(VPN) 安全策略 性能评估 并发
下载PDF
基于IPsec的IPv6安全邻居发现协议 被引量:8
16
作者 刘华春 戴庆光 蒋志平 《计算机工程与设计》 CSCD 北大核心 2011年第2期513-516,共4页
为了保证邻居发现协议的安全,通过在邻居发现协议中引入IPSec协议,提出了基于IPSec的安全邻居发现协议模型结构;设计了在邻居组播状态下的密钥交换和管理协议MIKE,并给出了密钥管理的星型结构算法;在AH验证数据中将IP地址与链路层地址绑... 为了保证邻居发现协议的安全,通过在邻居发现协议中引入IPSec协议,提出了基于IPSec的安全邻居发现协议模型结构;设计了在邻居组播状态下的密钥交换和管理协议MIKE,并给出了密钥管理的星型结构算法;在AH验证数据中将IP地址与链路层地址绑定,有效的防御IP地址的伪造。该方案与现行的安全邻居发现算法的比较结果表明,该安全模型能够有效地保证邻居发现的安全,并能与IPv6协议无缝连接,进一步提高下一代互联网的安全。 展开更多
关键词 邻居发现协议 ipsec 密钥管理 安全邻居发现 认证头协议AH
下载PDF
IPSec协议中加密算法使用研究 被引量:4
17
作者 周权 肖德琴 +1 位作者 林丕源 裴定一 《计算机工程与应用》 CSCD 北大核心 2003年第15期143-145,共3页
该文在分析IPSec协议簇中数据封装安全协议使用的加密算法——DES、3DES和AES的基础上,探讨了在建立基于IPSes协议的虚拟专用网时,使用加密算法应考虑的系列问题,并提出了一些实用的建议和注意事项。
关键词 网络安全 ipsec协议 加密算法
下载PDF
基于PEP-IPSec实现卫星IP网的网络安全 被引量:8
18
作者 黄飞 许辉 吴诗其 《计算机应用研究》 CSCD 北大核心 2007年第8期132-136,共5页
进一步发展Internet业务需要增大带宽并且要有移动性,因此IP网与卫星网结合成了热门话题。卫星通信中,其天然的广播特性以及全球无所不在的覆盖能力和IP网本身固有的很多安全隐患,使其安全问题尤显突出,在卫星IP网的性能增强型网关PEP... 进一步发展Internet业务需要增大带宽并且要有移动性,因此IP网与卫星网结合成了热门话题。卫星通信中,其天然的广播特性以及全球无所不在的覆盖能力和IP网本身固有的很多安全隐患,使其安全问题尤显突出,在卫星IP网的性能增强型网关PEP中应用IPSec,从而构成PEP-IPSec,这样一方面提高了TCP/IP在卫星IP网上的性能;另一方面也极大地增强了卫星IP网的网络安全。 展开更多
关键词 卫星IP网 TCP/IP协议 网络安全 PEP-ipsec
下载PDF
对称密钥加密算法在IPsec协议中的应用 被引量:18
19
作者 李湘锋 赵有健 全成斌 《电子测量与仪器学报》 CSCD 2014年第1期75-83,共9页
IPsec协议是互联网中最重要的协议之一,也是多年来用以解决网络安全问题的技术,在路由器、防火墙等设备中有着广泛的应用,同时在各种软件系统中也扮演重要角色。通过对IPsec协议中加密算法的讨论,重点分析了对称密钥加密算法在ESP中的应... IPsec协议是互联网中最重要的协议之一,也是多年来用以解决网络安全问题的技术,在路由器、防火墙等设备中有着广泛的应用,同时在各种软件系统中也扮演重要角色。通过对IPsec协议中加密算法的讨论,重点分析了对称密钥加密算法在ESP中的应用,包括DES、3DES、IDEA、AES、SM4等加密算法。分析了各个算法实现的特点、复杂度和安全强度,对比了算法在软硬件平台实现所需资源以及实现速度,为IPsec协议设计应用时提出了建议,能有针对性的使用对称密钥加密算法,合理有效的解决安全方案。 展开更多
关键词 ipsec协议 网络安全 对称密钥加密算法 DES 3DES IDEA AES SMS4 CAMELLIA
下载PDF
IPSec VPN的研究和分析 被引量:16
20
作者 田春岐 王立明 +1 位作者 蔡勉 周凯 《计算机工程与应用》 CSCD 北大核心 2004年第4期163-166,共4页
在扼要介绍虚拟专用网VPN安全机制的基础上,详细研究和分析了VPN系统中的四项主要安全技术;然后,在提出IPSec协议体系结构的同时,重点分析了IPSec协议以及实现问题,最后,指出了用IPSec协议实现VPN的优越性。
关键词 虚拟专用网 因特网安全协议(ipsec) 隧道 认证 访问控制
下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部