期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
面向航空节点的IP/LEO卫星网络移动性管理方法(英文)
1
作者 郭欣 张军 +1 位作者 张涛 丁演文 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2008年第3期252-260,共9页
Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented m... Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented mobility management method for IP/low earth orbit (LEO) satellite networks. By introducing the concept of ground station real-time coverage area, the proposed method uses ground-station-based IP addressing method and cell paging scheme to decrease the frequency of IP binding update requests as well as the paging cost. In comparison with the paging mobile IP (P-MIP) method and the handover-independent IP mobility management method, as is verified by the mathematical analysis and simulation, the proposed method could decrease the management cost. It also possesses better ability to support the aviation nodes because it is subjected to fewer influences from increased node speeds and newly coming connection rates. 展开更多
关键词 mobility management ip address binding update ground station management aviation node ip/LEO satellite networks
下载PDF
Linux Kali for Social Media User Location:A Target-Oriented Social Media Software Vulnerability Detection
2
作者 Adnan Alam Khan Qamar-ul-Arfeen 《Journal of Cyber Security》 2021年第4期201-205,共5页
Technology is expanding like a mushroom,there are various benefits of technology,in contrary users are facing serious losses by this technology.Furthermore,people lost their lives,their loved ones,brain-related diseas... Technology is expanding like a mushroom,there are various benefits of technology,in contrary users are facing serious losses by this technology.Furthermore,people lost their lives,their loved ones,brain-related diseases,etc.The industry is eager to get one technology that can secure their finance-related matters,personal videos or pictures,precious contact numbers,and their current location.Things are going worst because every software has some sort of legacy,deficiency,and shortcomings through which exploiters gain access to any software.There are various ways to get illegitimate access but on the top is Linux Kali with QRLjacker by user grabber command.This study recapitulates the impacts of the said technology and related avoidance.Detail contemplation depicts social media users like WhatsApp users can take a long sigh of relief when they will adopt the recommended methods.The problem is breaching of legitimate social media real-time location by an illegitimate user through Linux Kali,for this reason,end-user has no knowledge to spoof their IP to protect their real-time location.This paper will address the solution to the said problem. 展开更多
关键词 Cyber security defensive tools Linux Kali WhatsApp ip address Artificial Intelligence social media security
下载PDF
Building a next generation Internet with source address validation architecture 被引量:8
3
作者 WU JianPing1,3,REN Gang1,3 & LI Xing2,3 1 Department of Computer Science,Tsinghua University,Beijing 100084,China 2 Department of Electronic Engineering,Tsinghua University,Beijing 100084,China 3 Tsinghua National Laboratory for Information Science and Technology(TNList) ,Beijing 100084,China 《Science in China(Series F)》 2008年第11期1681-1691,共11页
The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems.... The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems. Based on the drastically increased IPv6 address space, a "source address validation architecture" (SAVA) is proposed in this paper, which can guarantee that every packet received and forwarded holds an authenticated source IP address. The design goals of the architecture are lightweight, loose coupling, "multi-fence support" and incremental deployment. This paper discusses the design and implementation for the architecture, including inter-AS, intra-AS and local subnet. The performance and scalability of SAVA are described. This architecture is deployed into the CNGI-CERNET2 infrastructure a large-scale native IPv6 backbone network of the China Next Generation Internet project. We believe that the SAVA will help the transition to a new, more secure and dependable Internet. 展开更多
关键词 ip source address validation network architecture network security
原文传递
The road towards future Internet
4
作者 WU Jianping LIU Lili LI Dan 《Journal of Communications and Information Networks》 2016年第1期86-97,共12页
Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches ... Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches and clean-slate approaches.The representative evolutionary solution is IPv6,while representative clean-slate approaches are NDN(Named Data Networking),MobilityFirst,NEBULA,XIA(Expressive Internet Architecture),and SDN(Software-Defined Networking).A comprehensive survey of these approaches are presented.Additionally,a novel network architecture that we recently proposed:ADN(Address-Driven Networking)is described,which intends to address the challenges faced by today’s Internet via the flexible and innovative utilization of IP addresses. 展开更多
关键词 future internet architecture address-driven network ipV6 ROUTING FORWARDING ip address
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部