期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Vulnerability Testing of HTTP based on Vulnerability-testing Oriented Petri Net(VOPN) 被引量:1
1
作者 Li Weihai Ma Yan Huang Xiaohong 《China Communications》 SCIE CSCD 2009年第4期116-120,共5页
Vulnerability-testing Oriented Petri Net (VOPN), a vulnerability testing model for communication protocol is brought forward first, which is combined Petri Net system with protocol Syntax analysis. Then vulnerabilit... Vulnerability-testing Oriented Petri Net (VOPN), a vulnerability testing model for communication protocol is brought forward first, which is combined Petri Net system with protocol Syntax analysis. Then vulnerability testing of implementation of HTTP protocol based on VOPN is made and the process is analyzed to prove the feasibility of the model. 展开更多
关键词 vulnerability testing testing model HTTP Petri net
下载PDF
A Secure Communication Framework for Drone Swarms in Autonomous Surveillance Operations
2
作者 Ahad Alotaibi Chris Chatwin Phil Birch 《Journal of Computer and Communications》 2024年第11期1-25,共25页
Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robu... Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robust security measures to protect against potential threats and ensure the integrity of operations. This research presents a novel secure architecture for a swarm of drones deployed on surveillance missions. Leveraging a reliable foundation established through Delaunay triangulation for communication among drones, this work introduces advanced security protocols to enhance the protection and integrity of the network. The architecture employs a mesh network topology connecting six drones, each configured for specific surveillance tasks, including perimeter monitoring, area scanning, thermal imaging, traffic observation, communication relay, and incident response. The mesh network design ensures extended coverage, redundancy, load balancing, and self-configuration, significantly improving reliability and resilience. Security validation was conducted using GNS3 and Ettercap, simulating various vulnerability scenarios. Comparative performance analysis between a classic drone network and the proposed secure mesh network demonstrates superior traffic management and robustness against potential attacks. The results underscore the architecture’s suitability for secure and reliable operations in critical surveillance environments. 展开更多
关键词 Drone Swarm Security Mesh Network Architecture Surveillance Missions vulnerability testing GNS3 Simulation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部