The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(...The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.展开更多
5G环境下的互联网协议第6版(Internet Protocol Version 6,IPv6)网络面临着诸多安全挑战和隐私风险,包括数据窃取、身份盗用及网络攻击等,对用户隐私保护提出了更高的要求。因此,探索适用于IPv6的区域性数据加密技术和隐私保护策略显得...5G环境下的互联网协议第6版(Internet Protocol Version 6,IPv6)网络面临着诸多安全挑战和隐私风险,包括数据窃取、身份盗用及网络攻击等,对用户隐私保护提出了更高的要求。因此,探索适用于IPv6的区域性数据加密技术和隐私保护策略显得尤为重要。文章探讨了5G环境下IPv6网络面临的安全挑战和隐私风险,分析多种区域性数据加密和网络隐私保护策略,为实现更安全、更私密的网络通信环境提供理论依据和实践指南。展开更多
With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also...With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.展开更多
文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈...文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈、隧道技术,探索规划阶段性升级改造IPv6的建设方案,重点讨论IPv4/IPv6双栈校园网技术实现。展开更多
随着互联网用户数量的迅猛增长和物联网设备的普及,全球范围内的网络运营商和服务提供商逐步开始向网际互连协议第6版(Internet Protocol Version 6,IPv6)过渡。在这一背景下,广电网络作为重要的通信基础设施,也面临着向IPv6过渡的迫切...随着互联网用户数量的迅猛增长和物联网设备的普及,全球范围内的网络运营商和服务提供商逐步开始向网际互连协议第6版(Internet Protocol Version 6,IPv6)过渡。在这一背景下,广电网络作为重要的通信基础设施,也面临着向IPv6过渡的迫切需求。基于此,深入分析广电网络向IPv6过渡的技术挑战并提出针对性的解决方案,为未来的广电网络发展提供参考。展开更多
文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为...文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为eNSP模拟器构建双栈网络环境,并进行多项测试验证其可行性。结果表明,双栈技术能有效支持IPv4和IPv6协议共存,为医院网络现代化提供技术保障。同时,研究强调在过渡过程中需考虑的安全挑战和设备升级问题,提出了具体的实施策略和优化建议。展开更多
分析了IPv6(Internet Protocol Version 6)与IPv4(Internet Protocol Version 4)各自的特点以及两者之间的区别和联系,介绍了多播技术、双栈技术、隧道技术、协议转换技术等4种过渡技术,并讨论了各种技术的工作原理。在IPv6与IPv4的互...分析了IPv6(Internet Protocol Version 6)与IPv4(Internet Protocol Version 4)各自的特点以及两者之间的区别和联系,介绍了多播技术、双栈技术、隧道技术、协议转换技术等4种过渡技术,并讨论了各种技术的工作原理。在IPv6与IPv4的互联通信中,尽可能地保留了IPv4,使其在IPv6环境中有效运行,从而保证了数据包的安全性。实例验证结果表明,所提出的转换协议技术实现了2个协议之间的互联通信。展开更多
当前互联网协议第6版(Internet Protocol Version 6,Ipv6)远程监控网络通信无法实现互联网协议第4版(Internet Protocol Version 4,Ipv4)地址与Ipv6地址的转换,且对网络状态要求较高,导致通信效率不理想。提出Ipv6远程监控网络无状态双...当前互联网协议第6版(Internet Protocol Version 6,Ipv6)远程监控网络通信无法实现互联网协议第4版(Internet Protocol Version 4,Ipv4)地址与Ipv6地址的转换,且对网络状态要求较高,导致通信效率不理想。提出Ipv6远程监控网络无状态双向通信方法。设计Ipv6网络与Ipv4互联网的地址映射规则,在代理服务器协议栈内引入支持Ipv4与Ipv6的双协议,实现同步访问权限。建立不同协议栈与目的机器的连接,采用代理服务器静态映射表完成Ipv4地址与Ipv6地址静态转换,根据代理服务器生成的socket对象,完成Ipv6网络的无状态双向通信。仿真结果表明,所提方法可有效实施双向通信,且与传统方法相比通信速率优势较为显著。展开更多
Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 netwo...Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks' management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes. While each management node can perform management tasks autonomously and independently, it can finish more sophisticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies, especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed.展开更多
基金funded by the Deanship of Scientific Research at Najran University for this research through a Grant(NU/RG/SERC/12/50)under the Research Groups at Najran University,Saudi Arabia.
文摘The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.
文摘5G环境下的互联网协议第6版(Internet Protocol Version 6,IPv6)网络面临着诸多安全挑战和隐私风险,包括数据窃取、身份盗用及网络攻击等,对用户隐私保护提出了更高的要求。因此,探索适用于IPv6的区域性数据加密技术和隐私保护策略显得尤为重要。文章探讨了5G环境下IPv6网络面临的安全挑战和隐私风险,分析多种区域性数据加密和网络隐私保护策略,为实现更安全、更私密的网络通信环境提供理论依据和实践指南。
基金supportedin part by Sub-project "Mobile Internet Architecture and Key Technology Research" of National Core Electronic Devices,High-end Generic Chips and Basic Software (CHBS) Project "Development Strategy and Planning ofMobile Internet System Hardware and Software Technology and Service" under Grant No.2012ZX01039003Sub-project "IPv6 Application and Demonstration of Mobile Internet inCampus Environment" of National Sci-Tech Major Special Item Project "IPv6 Applicationand Demonstration of Mobile Internet" under Grant No. 2012ZX03002015-003A New Network Architecture:Address Driven Network Architecture and Technology Research and Development under Grant No. CNGI-12-03-001
文摘With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.
文摘文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈、隧道技术,探索规划阶段性升级改造IPv6的建设方案,重点讨论IPv4/IPv6双栈校园网技术实现。
文摘随着互联网用户数量的迅猛增长和物联网设备的普及,全球范围内的网络运营商和服务提供商逐步开始向网际互连协议第6版(Internet Protocol Version 6,IPv6)过渡。在这一背景下,广电网络作为重要的通信基础设施,也面临着向IPv6过渡的迫切需求。基于此,深入分析广电网络向IPv6过渡的技术挑战并提出针对性的解决方案,为未来的广电网络发展提供参考。
文摘文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为eNSP模拟器构建双栈网络环境,并进行多项测试验证其可行性。结果表明,双栈技术能有效支持IPv4和IPv6协议共存,为医院网络现代化提供技术保障。同时,研究强调在过渡过程中需考虑的安全挑战和设备升级问题,提出了具体的实施策略和优化建议。
文摘分析了IPv6(Internet Protocol Version 6)与IPv4(Internet Protocol Version 4)各自的特点以及两者之间的区别和联系,介绍了多播技术、双栈技术、隧道技术、协议转换技术等4种过渡技术,并讨论了各种技术的工作原理。在IPv6与IPv4的互联通信中,尽可能地保留了IPv4,使其在IPv6环境中有效运行,从而保证了数据包的安全性。实例验证结果表明,所提出的转换协议技术实现了2个协议之间的互联通信。
文摘当前互联网协议第6版(Internet Protocol Version 6,Ipv6)远程监控网络通信无法实现互联网协议第4版(Internet Protocol Version 4,Ipv4)地址与Ipv6地址的转换,且对网络状态要求较高,导致通信效率不理想。提出Ipv6远程监控网络无状态双向通信方法。设计Ipv6网络与Ipv4互联网的地址映射规则,在代理服务器协议栈内引入支持Ipv4与Ipv6的双协议,实现同步访问权限。建立不同协议栈与目的机器的连接,采用代理服务器静态映射表完成Ipv4地址与Ipv6地址静态转换,根据代理服务器生成的socket对象,完成Ipv6网络的无状态双向通信。仿真结果表明,所提方法可有效实施双向通信,且与传统方法相比通信速率优势较为显著。
基金supported by the National High-Tech Research and Development 863 Program of China under Grant Nos.2007AA01Z2A2,2008AA01A303,2009AA01Z205the National Basic Research 973 Program of China under Grant No.2003CB314806the National Science and Technology Supporting Plan of China under Grant No.2008BAH37B05
文摘Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks' management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes. While each management node can perform management tasks autonomously and independently, it can finish more sophisticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies, especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed.