Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Datab...Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. In this article, we propose a G.8032 ERP scheme that uses FDB flush based on area to resolve this issue and investigate how the proposed scheme deals with the traffic flooding problem. The theoretical analysis and simulation show that the proposed scheme can effectively improve the performance of the Ethernet ring by decreasing the unnecessary FDB flush in comparison with the existing approaches.展开更多
Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular a...Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET.展开更多
Currently,multicast survivability in optical network obtains more attention.This paper focuses on the field of multicast grooming shared protection in green optical network and designs a novel auxiliary graph and a sh...Currently,multicast survivability in optical network obtains more attention.This paper focuses on the field of multicast grooming shared protection in green optical network and designs a novel auxiliary graph and a shared matrix to address the survivable multicast resource consumption.This paper also proposes a new heuristic called Green Multicast Grooming algorithm based on spanning path Cross-Shared protection(GMGCSP),in which network reliability,energy efficiency and resource utilization are jointly considered.Simulation results testify that,compared to other algorithms,the proposed GMG-CSP not only has lower blocking probability and higher bandwidth utilization ratio,but also saves more energy.展开更多
基金supported partially by National Science and Technology Major Project of the Ministry of Science and Technology of China under Grant No.2011ZX03005-004-03 a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions-Information and Communication Engineering,Natural Science Foundation of the Higher Education Institutions of Jiangsu Province,China under Grant No.10KJA510037+1 种基金 Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education under Grant No.NYKL201108 Natural Science Foundation of Nanjing University of Posts and Telecommunications under Grant No.NY209002
文摘Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. In this article, we propose a G.8032 ERP scheme that uses FDB flush based on area to resolve this issue and investigate how the proposed scheme deals with the traffic flooding problem. The theoretical analysis and simulation show that the proposed scheme can effectively improve the performance of the Ethernet ring by decreasing the unnecessary FDB flush in comparison with the existing approaches.
基金the National Natural Science Foundation of China,by the Natural Science Foundation of Anhui Province,by the Specialized Research Fund for the Doctoral Program of Higher Education of China,the Fundamental Research Funds for the Central Universities
文摘Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET.
基金supported in part by the National Natural Science Foundation of China (61172051,61302070,61302071,61302072) the Specialized Research Fund for the Doctoral Program of Higher Education(20110042110023) the Fundamental Research Funds for the Central Universities(N110204001, N120804002,N110604008)
文摘Currently,multicast survivability in optical network obtains more attention.This paper focuses on the field of multicast grooming shared protection in green optical network and designs a novel auxiliary graph and a shared matrix to address the survivable multicast resource consumption.This paper also proposes a new heuristic called Green Multicast Grooming algorithm based on spanning path Cross-Shared protection(GMGCSP),in which network reliability,energy efficiency and resource utilization are jointly considered.Simulation results testify that,compared to other algorithms,the proposed GMG-CSP not only has lower blocking probability and higher bandwidth utilization ratio,but also saves more energy.