期刊文献+
共找到195篇文章
< 1 2 10 >
每页显示 20 50 100
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
1
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching internet protocol security Virtual Private network Video Conferencing Voice over internet protocol JITTER End to End Delay
下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
2
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
下载PDF
Practical Internet Voting Protocol without Strong Physical Assumption
3
作者 MENG Bo ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期177-180,共4页
Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The proposed Internet voting protocol does not apply the strong physical assu... Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The proposed Internet voting protocol does not apply the strong physical assumptions and has the properties of privacy, completeness, soundness, fairness, invariableness, and universal verifiability, receipt-free and coercion-resistant. At the same time it solves some problems in other internet voting protocols and the verification progress of universal verifiability is simple and efficient. 展开更多
关键词 information security voting protocol protocol security
下载PDF
通用可组合安全的Internet密钥交换协议 被引量:3
4
作者 彭清泉 裴庆祺 +1 位作者 杨超 马建峰 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第4期714-720,共7页
通过对新一代Internet密钥交换协议(IKEv2)进行分析,指出了其初始交换过程中存在发起者身份暴露和认证失败问题.而在无线接入网络环境下,对发起者身份等敏感信息进行主动保护是十分必要的.提出了一种适用于无线网络环境下的Internet密... 通过对新一代Internet密钥交换协议(IKEv2)进行分析,指出了其初始交换过程中存在发起者身份暴露和认证失败问题.而在无线接入网络环境下,对发起者身份等敏感信息进行主动保护是十分必要的.提出了一种适用于无线网络环境下的Internet密钥交换协议,该协议让响应者显式地证明自己的真实身份,实现了对发起者主动身份保护.并通过重新构造认证载荷,有效防止了认证失败问题.在通用可组合安全模型下,证明了该协议达到了通用可组合安全.性能分析和仿真实验表明,该协议具有较少的计算量和通信量. 展开更多
关键词 internet协议安全 密钥交换 internet密钥交换协议 可证安全 通用可组合
下载PDF
基于IPv6的Internet存储服务模型
5
作者 吴英 徐敬东 +1 位作者 吴功宜 刘璟 《计算机工程》 CAS CSCD 北大核心 2008年第20期98-100,共3页
针对用户对远程数据存储与异地数据备份的需求增加,提出一种基于IPv6协议的Internet存储服务模型。设计应用层的Internet存储访问协议,结合IPv6协议的安全性特点设计安全存储模型,为下一代互联网提供一种标准、安全的远程存储服务。
关键词 internet存储服务 internet存储访问协议 IPv6安全存储模型
下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:2
6
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 internet of things Wireless sensor network Secure routing protocol Trust management
下载PDF
An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks
7
作者 Muhammad Adil Jehad Ali +6 位作者 Muhammad Sajjad Khan Junsu Kim Ryan Alturki Mohammad Zakarya Mukhtaj Khan Rahim Khan Su Min Kim 《Computers, Materials & Continua》 SCIE EI 2021年第7期447-470,共24页
Internet of Things(IoT)network used for industrial management is vulnerable to different security threats due to its unstructured deployment,and dynamic communication behavior.In literature various mechanisms addresse... Internet of Things(IoT)network used for industrial management is vulnerable to different security threats due to its unstructured deployment,and dynamic communication behavior.In literature various mechanisms addressed the security issue of Industrial IoT networks,but proper maintenance of the performance reliability is among the common challenges.In this paper,we proposed an intelligent mutual authentication scheme leveraging authentication aware node(AAN)and base station(BS)to identify routing attacks in Industrial IoT networks.The AAN and BS uses the communication parameter such as a route request(RREQ),node-ID,received signal strength(RSS),and round-trip time(RTT)information to identify malicious devices and routes in the deployed network.The feasibility of the proposed model is validated in the simulation environment,where OMNeT++was used as a simulation tool.We compare the results of the proposed model with existing field-proven schemes in terms of routing attacks detection,communication cost,latency,computational cost,and throughput.The results show that our proposed scheme surpasses the previous schemes regarding these performance parameters with the attack detection rate of 97.7%. 展开更多
关键词 security industrial internet of Things routing attacks routing protocols base station authentication aware nodes
下载PDF
A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
8
作者 JIANG Rui 《China Communications》 SCIE CSCD 2010年第4期23-28,共6页
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ... Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively. 展开更多
关键词 Denial of Service security protocol Analysis Formal Theory Strand Space Model internet Key Exchange
下载PDF
一种Internet上的匿名电子投票协议的研究与设计 被引量:4
9
作者 曹刚 施荣华 《计算机工程与应用》 CSCD 北大核心 2004年第12期156-157,共2页
文章讨论了一种适合在Internet上进行大范围投票的电子投票协议,这个协议通过传送不可追踪的授权消息允许投票者进行匿名投票。协议保证了以下几点:(1)只有符合条件的投票者可以投票;(2)每个投票者只能投票一次;(3)投票者可以查询他的... 文章讨论了一种适合在Internet上进行大范围投票的电子投票协议,这个协议通过传送不可追踪的授权消息允许投票者进行匿名投票。协议保证了以下几点:(1)只有符合条件的投票者可以投票;(2)每个投票者只能投票一次;(3)投票者可以查询他的投票是否生效;(4)除了投票者本人,任何人都不能根据投票找到投票者;(5)如果某个投票者弃权,任何人都不能以他的名义进行投票。 展开更多
关键词 协议投票 安全 网络 internet
下载PDF
Internet密钥交换协议安全性分析 被引量:7
10
作者 张勇 敖青云 +1 位作者 白英彩 王亚弟 《计算机工程与应用》 CSCD 北大核心 2001年第3期1-3,共3页
RFC 2409(IKE)提供了一组Internet密钥交换协议,目的是在IPSec通信双方之间建立安全联盟和经过认证的密钥材料。文章分析了IKE协议安全特性,以及两个阶段中实现各种安全机制的工作原理。同时,发现了存... RFC 2409(IKE)提供了一组Internet密钥交换协议,目的是在IPSec通信双方之间建立安全联盟和经过认证的密钥材料。文章分析了IKE协议安全特性,以及两个阶段中实现各种安全机制的工作原理。同时,发现了存在的安全缺陷,并给出了修改建议。 展开更多
关键词 internet 密钥交换协议 安全性 通信协议 计算机互联网
下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
11
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc... Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%. 展开更多
关键词 internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
下载PDF
矿山企业Internet/Intranet网站的实施方案 被引量:1
12
作者 李贺松 陈建宏 《矿冶》 EI CAS 2001年第4期76-81,共6页
提出矿山企业Internet/Intranet网站的实施方案。论述了网络操作系统、后台数据库、Web服务器、Web网页开发技术等的选择 ,探讨了通讯协议和接入方式 ,以及网络安全的防火墙技术。
关键词 internet/INTRAnet 通信协议 安全 访问 网页 矿山企业
下载PDF
Internet路由技术及相关协议综述 被引量:1
13
作者 李波 《重庆工学院学报》 2002年第4期47-50,共4页
综述了Internet路由技术及相关协议的研究现状 ,并对RIP、OSPF和BGP协议从网络安全与易实现的角度进行了分析。
关键词 internet 路由技术 路由协议 BGP协议 网络安全
下载PDF
Internet密钥交换协议的安全性分析 被引量:7
14
作者 宋育芳 张宏科 《计算机工程与应用》 CSCD 北大核心 2004年第8期136-139,共4页
Internet密钥交换(IKE)协议是IPSec协议体系中最重要的部分,对于在不安全网络上安全地进行通信具有重要的意义。文章从主模式交换协商过程的分析入手,分析比较了几种验证算法的安全强度,之后从防止中间人的攻击,复杂性,防止DOS攻击等方... Internet密钥交换(IKE)协议是IPSec协议体系中最重要的部分,对于在不安全网络上安全地进行通信具有重要的意义。文章从主模式交换协商过程的分析入手,分析比较了几种验证算法的安全强度,之后从防止中间人的攻击,复杂性,防止DOS攻击等方面指出了IKE协议的缺陷和不足,并提出了相应的改进意见。 展开更多
关键词 IPSEC协议 internet密钥交换协议 安全联盟(SA)
下载PDF
下一代Internet与IPv6
15
作者 周漪清 张红兵 《现代计算机》 2002年第4期40-43,共4页
IPv6是互联网协议第6版的简称,它是由IETF为取代现行互联网协议第4版而设计的下一代网络协议。IPv4随着Internet中计算机的增加开始出现问题,最主要是IPv4的网络地址正日渐短缺。IPv6修正了IPv4中出现的问题,如IPv4中有效网络地址限制... IPv6是互联网协议第6版的简称,它是由IETF为取代现行互联网协议第4版而设计的下一代网络协议。IPv4随着Internet中计算机的增加开始出现问题,最主要是IPv4的网络地址正日渐短缺。IPv6修正了IPv4中出现的问题,如IPv4中有效网络地址限制的问题,还增加并改进了某些应用中的数据封装和认证,IPv6还能提供路由和网络的自动配置。IPv6正日渐取代IPv4。 展开更多
关键词 internet 认证头标 安全参数索引 IPV6协议 通信协议
下载PDF
嵌入式Internet安全问题的分析和研究 被引量:2
16
作者 刘娜 于德海 +1 位作者 李献争 色菲 《科技信息》 2007年第29期111-112,共2页
在嵌入式系统设计领域中,安全已得到了广泛的认识.但是直到现在,这些系统的安全问题也没有得到很好的解决.文章阐述了嵌入式系统接入Internet面临的安全威胁,并对安全措施进行深入细致的分析,并指出了密钥体制的选择利弊性问题。
关键词 嵌入式internet 安全威胁 密码协议
下载PDF
Internet密钥交换(IKE)及其在Linux系统中的实现
17
作者 郑克 黄令恭 《计算机工程》 CAS CSCD 北大核心 2001年第2期105-106,共2页
介绍了Internet密钥交换协议(Internet Key Exchange, IKE)在IPSEC中的地位和作用,分析了IKE协商安全关联(SA)的过程;提出了IKE在Linux系统中的实现方案,着重分析了进程与内核之间进行通信所采用的消息队列的实现方法。
关键词 internet 密钥交换协议 LINUX 操作系统 进程
下载PDF
Internet安全技术——IPSec 被引量:1
18
作者 桂玲 《铁道通信信号》 2000年第6期26-28,共3页
论述了当前 Internet本身存在的安全问题和当今应用的安全技术 ,详细介绍了 IETF的最新安全技术标准
关键词 internet 安全问题 IP安全技术 IPSEC协议
下载PDF
IPsec的Internet密钥交换
19
作者 袁剑 刘刚 王文海 《西安文理学院学报(自然科学版)》 2006年第4期52-56,共5页
介绍了IPsec的基本组成和一组IKE协议.分析了IKE协议的安全特性,以及IKE的协商过程.其中包括:在主模式中建立ISAKMP SA的过程和在快速模式中利用已建立好的ISAKMP SA完成IPsec SA的协商.通过详细分析主模式中用于完成SA要交换的六个消... 介绍了IPsec的基本组成和一组IKE协议.分析了IKE协议的安全特性,以及IKE的协商过程.其中包括:在主模式中建立ISAKMP SA的过程和在快速模式中利用已建立好的ISAKMP SA完成IPsec SA的协商.通过详细分析主模式中用于完成SA要交换的六个消息的发送步骤、属性、结构来说明安全性的实现. 展开更多
关键词 IPscc IKE 密钥交换
下载PDF
A 10 Gbps in-line network security processor based on configurable hetero-multi-cores
20
作者 Yun NIU Li-ji WU +2 位作者 Yang LIU Xiang-min ZHANG Hong-yi CHEN 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2013年第8期642-651,共10页
This paper deals with an in-line network security processor (NSP) design that implements the Intemet Protocol Security (IPSec) protocol processing for the 10 Gbps Ethernet. The 10 Gbps high speed data transfer, th... This paper deals with an in-line network security processor (NSP) design that implements the Intemet Protocol Security (IPSec) protocol processing for the 10 Gbps Ethernet. The 10 Gbps high speed data transfer, the IPSec processing in- cluding the crypto-operation, the database query, and IPSec header processing are integrated in the design. The in-line NSP is implemented using 65 nm CMOS technology and the layout area is 2.5 mm^3 mm with 360 million gates. A configurable crossbar data transfer skeleton implementing an iSLIP scheduling algorithm is proposed, which enables simultaneous data transfer between the heterogeneous multiple cores. There are, in addition, a high speed input/output data buffering mechanism and design of high performance hardware structures for modules, wherein the transfer efficiency and the resource utilization are maximized and the IPSec protocol processing achieves 10 Gbps line speed. A high speed and low power hardware look-up method is proposed, which effectively reduces the area and power dissipation. The post simulation results demonstrate that the design gives a peak throughput for the Authentication Header (AH) transport mode of 10.06 Gbps with the average test packet length of 512 bytes under the clock rate of 250 MHz, and power dissipation less than 1 W is obtained. An FPGA prototype is constructed to verify the function of the design. A test bench is being set up for performance and function verification. 展开更多
关键词 10 Gbps Ethernet network security processor (NSP) internet protocol security (IPSec) CROSSBAR
原文传递
上一页 1 2 10 下一页 到第
使用帮助 返回顶部