In recent years, realising a "clean- state" design for the future Internet has become an important research focus. An architecture com- bining an Information-Centric Network (ICN) and Sottware-Defmed Network (SDN...In recent years, realising a "clean- state" design for the future Internet has become an important research focus. An architecture com- bining an Information-Centric Network (ICN) and Sottware-Defmed Network (SDN) (IC-SDN) has gradually attracted more attention. How- ever, the existing studies regarding IC-SDN still lack support in terms of the "network status awareness" function, resulting in unreasonable resource allocation. In this paper, we propose a new status-aware resource adaptation sche- me, i.e. a status-aware module is embedded into basic elements (Forwarding Node (FN) and Resource adaption Manager (RM)). The FNs collect the network status dynamically for the controller to reallocate network resources accor- ding to the fluctuations in environmental con- ditions. Simulation results show that, compared with the existing IC-SDN mechanism, the pro- posed scheme reduced the link bandwidth var- iance by 56% and the content delivery latency by 40%. The proof-of-concept implementation demonstrates the feasibility of our proposed sc- heme for small-scale deployment.展开更多
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200...In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two.展开更多
基金supported in part by the National Basic Research Program of China(973 Program)under Grant No.2013CB329100the National Natural Science Foundation of China under Grants No.61232017,No.61271200the Fundamental Research Funds for the Central Universities under Grant No.2013YJS007
文摘In recent years, realising a "clean- state" design for the future Internet has become an important research focus. An architecture com- bining an Information-Centric Network (ICN) and Sottware-Defmed Network (SDN) (IC-SDN) has gradually attracted more attention. How- ever, the existing studies regarding IC-SDN still lack support in terms of the "network status awareness" function, resulting in unreasonable resource allocation. In this paper, we propose a new status-aware resource adaptation sche- me, i.e. a status-aware module is embedded into basic elements (Forwarding Node (FN) and Resource adaption Manager (RM)). The FNs collect the network status dynamically for the controller to reallocate network resources accor- ding to the fluctuations in environmental con- ditions. Simulation results show that, compared with the existing IC-SDN mechanism, the pro- posed scheme reduced the link bandwidth var- iance by 56% and the content delivery latency by 40%. The proof-of-concept implementation demonstrates the feasibility of our proposed sc- heme for small-scale deployment.
基金supported by the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20060013007)the Natural Science Foundation of Beijing (Grant No. 4092029)the National Natural Science Foundation of China (Grant No. 60873001)
文摘In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two.