The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational pur...The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational purposes and information household appliance networking are also on the horizon. In other words, IPv6 means new revenue resources for telecom carriers.展开更多
IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet a...IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition.展开更多
The purpose of this case study paper was to identify factors that Internet Protocol stakeholders consider as standing in the way of the transition to bigger, more secure and faster internet with virtually unlimited In...The purpose of this case study paper was to identify factors that Internet Protocol stakeholders consider as standing in the way of the transition to bigger, more secure and faster internet with virtually unlimited Internet Protocol address in Cameroon and was completed in two phases. Descriptive method was followed and two study instruments were designed and implemented, namely focus group interviews and questionnaire interviews. Both instruments were validated and implemented on a sample of (6) experts for the interviews and (115) for the questionnaire. The focus group data were analyzed using a thematic analysis technique, leading to the identification of six themes including lack of policies and incentives to promote IPv6 deployment at government level, many organizations are seeing IPv6 as an issue that will only affect them in the distant future and not looking at IPv6 technology as an innovation generation opportunity. Decisions on these issues need to change if IPv6 current status in Cameroon is to change. The findings were then validated in the final phase. This involved the deployment of a survey questionnaire to collect opinions of 115 IPv6 actors working in both public and private institutions in Cameroon. The results revealed that IPv6 was not sufficiently attended to by organizations in Cameroon. The study results may be of practical use for Government IT decision makers. A further and more comprehensive research into the topic is recommended.展开更多
Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 netwo...Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks' management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes. While each management node can perform management tasks autonomously and independently, it can finish more sophisticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies, especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed.展开更多
In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control...In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control, traceability and improving the trustworthiness of the Internet. This paper designed a scalable Network Identity(NID) scheme for the Internet users, proposed NIDTGA(Network Identity and Time Generated Address), an IPv6 address generation algorithm embedded NID and time information, then designed and implemented an IPv6 address generation and traceback system based on NIDTGA. The design of NIDTGA, which reflects the length, time and owner attributes of the IP address, can be a good support to ADN(Address Driven Network). At the same time, by embedding the key elements of user identity and time in the IPv6 address,and by taking into account both the traceability and privacy, NIDTGA can provide a technical basis for the establishment of the network trust mechanism, and achieve the traceability of security event.展开更多
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but...Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.展开更多
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(...The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.展开更多
Internet of Everything(IoE)has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet,and it can be widely applied in the fields of indust...Internet of Everything(IoE)has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet,and it can be widely applied in the fields of industry,transportation,commerce,and education.Recently,the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm.However,the IoE has three open issues in the 6G-enabled cybertwin architecture,i.e.,data authenticity,data storage and node reliability.To address these issues,we propose a blockchain-based decentralized reputation management system(BC-DRMS)for IoE in 6G-enabled Cybertwin architecture.In the proposed BC-DRMS,the traffic data collected from end nodes is stored on the blockchain and the decentralized file system,i.e.,InterPlanetary File System(IPFS),to resist data tampering,and then the data is further processed by the edge clouds and core clouds to provide services to users.Also,a multi-level reputation evaluation scheme is designed to compute the reputation scores of IoE nodes to prevent malicious node attacks.The experiment results and analysis demonstrate that,compared to the traditional centralized reputation management systems(CRMS),the proposed BC-DRMS cannot only address the issues of data authenticity and storage,but also provides high reliability for IoE in 6G-enabled cybertwin architecture.展开更多
Location management is the most important function in mobility management technology. The hierarchical structure of the proposed hierarchical network-layer mobility management (HNMM) can reduce the signaling cost. T...Location management is the most important function in mobility management technology. The hierarchical structure of the proposed hierarchical network-layer mobility management (HNMM) can reduce the signaling cost. The selforganizing topology scheme can enhance the robustness and quality of the mobility management. The information of location of the mobile node is stored in the distributed database, which makes the storage of the location information more reliable and robust, and more flexible strategies can be used. The numeric results show that HNMM can provide better performance than the general structure of mobile IPv6, when the mobile nodes move frequently and when there is high traffic throughput.展开更多
With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also...With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.展开更多
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin...With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.展开更多
The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user no...The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user nodes. Mobility management in 4G networks is an issue that exists. The handover protocols for mobility management in 4G networks that currently exist, do not consider wireless signal degradation during handover operations. This paper introduces the Noise Resilient Reduced Registration Time Care of Mobile IP(NR RRTC:MIP) protocol for handover management. A handover decision algorithm based on the signal strength measured by the user nodes is considered in the NR RRTC: MIP protocol. A simulation study is discussed in the paper to evaluate the performance of the NR RRTC: MIP protocol. The results obtained from the simulation study prove that the NR RRTC: MIP protocol effectively reduces handover latencies and improves network performance.展开更多
Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches ...Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches and clean-slate approaches.The representative evolutionary solution is IPv6,while representative clean-slate approaches are NDN(Named Data Networking),MobilityFirst,NEBULA,XIA(Expressive Internet Architecture),and SDN(Software-Defined Networking).A comprehensive survey of these approaches are presented.Additionally,a novel network architecture that we recently proposed:ADN(Address-Driven Networking)is described,which intends to address the challenges faced by today’s Internet via the flexible and innovative utilization of IP addresses.展开更多
文摘The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational purposes and information household appliance networking are also on the horizon. In other words, IPv6 means new revenue resources for telecom carriers.
文摘IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition.
文摘The purpose of this case study paper was to identify factors that Internet Protocol stakeholders consider as standing in the way of the transition to bigger, more secure and faster internet with virtually unlimited Internet Protocol address in Cameroon and was completed in two phases. Descriptive method was followed and two study instruments were designed and implemented, namely focus group interviews and questionnaire interviews. Both instruments were validated and implemented on a sample of (6) experts for the interviews and (115) for the questionnaire. The focus group data were analyzed using a thematic analysis technique, leading to the identification of six themes including lack of policies and incentives to promote IPv6 deployment at government level, many organizations are seeing IPv6 as an issue that will only affect them in the distant future and not looking at IPv6 technology as an innovation generation opportunity. Decisions on these issues need to change if IPv6 current status in Cameroon is to change. The findings were then validated in the final phase. This involved the deployment of a survey questionnaire to collect opinions of 115 IPv6 actors working in both public and private institutions in Cameroon. The results revealed that IPv6 was not sufficiently attended to by organizations in Cameroon. The study results may be of practical use for Government IT decision makers. A further and more comprehensive research into the topic is recommended.
基金supported by the National High-Tech Research and Development 863 Program of China under Grant Nos.2007AA01Z2A2,2008AA01A303,2009AA01Z205the National Basic Research 973 Program of China under Grant No.2003CB314806the National Science and Technology Supporting Plan of China under Grant No.2008BAH37B05
文摘Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks' management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes. While each management node can perform management tasks autonomously and independently, it can finish more sophisticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies, especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed.
基金supported by National Natural Science Foundation of China(Grant No.NSFC61402257)National Basic Research Program of China(973 Program)(Grant Nos.2009CB320500+1 种基金2009CB320501)Tsinghua University Self-determined Project(No.2014z21051)
文摘In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control, traceability and improving the trustworthiness of the Internet. This paper designed a scalable Network Identity(NID) scheme for the Internet users, proposed NIDTGA(Network Identity and Time Generated Address), an IPv6 address generation algorithm embedded NID and time information, then designed and implemented an IPv6 address generation and traceback system based on NIDTGA. The design of NIDTGA, which reflects the length, time and owner attributes of the IP address, can be a good support to ADN(Address Driven Network). At the same time, by embedding the key elements of user identity and time in the IPv6 address,and by taking into account both the traceability and privacy, NIDTGA can provide a technical basis for the establishment of the network trust mechanism, and achieve the traceability of security event.
文摘Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.
基金funded by the Deanship of Scientific Research at Najran University for this research through a Grant(NU/RG/SERC/12/50)under the Research Groups at Najran University,Saudi Arabia.
文摘The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.
基金This work was supported in part by the National Natural Science Foundation of China under Grants 61972205,U1836208,U1836110in part by the National Key R&D Program of China under Grant 2018YFB1003205+2 种基金in part by MOST under Contract 108-2221-E-259-009-MY2 throSugh Pervasive Artificial Intelligence Research(PAIR)Labs(Taiwan)in part by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundin part by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)Fund(China).
文摘Internet of Everything(IoE)has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet,and it can be widely applied in the fields of industry,transportation,commerce,and education.Recently,the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm.However,the IoE has three open issues in the 6G-enabled cybertwin architecture,i.e.,data authenticity,data storage and node reliability.To address these issues,we propose a blockchain-based decentralized reputation management system(BC-DRMS)for IoE in 6G-enabled Cybertwin architecture.In the proposed BC-DRMS,the traffic data collected from end nodes is stored on the blockchain and the decentralized file system,i.e.,InterPlanetary File System(IPFS),to resist data tampering,and then the data is further processed by the edge clouds and core clouds to provide services to users.Also,a multi-level reputation evaluation scheme is designed to compute the reputation scores of IoE nodes to prevent malicious node attacks.The experiment results and analysis demonstrate that,compared to the traditional centralized reputation management systems(CRMS),the proposed BC-DRMS cannot only address the issues of data authenticity and storage,but also provides high reliability for IoE in 6G-enabled cybertwin architecture.
基金This study was supported by National Natural Science Foundation of China (grant No. 60572119).
文摘Location management is the most important function in mobility management technology. The hierarchical structure of the proposed hierarchical network-layer mobility management (HNMM) can reduce the signaling cost. The selforganizing topology scheme can enhance the robustness and quality of the mobility management. The information of location of the mobile node is stored in the distributed database, which makes the storage of the location information more reliable and robust, and more flexible strategies can be used. The numeric results show that HNMM can provide better performance than the general structure of mobile IPv6, when the mobile nodes move frequently and when there is high traffic throughput.
基金supportedin part by Sub-project "Mobile Internet Architecture and Key Technology Research" of National Core Electronic Devices,High-end Generic Chips and Basic Software (CHBS) Project "Development Strategy and Planning ofMobile Internet System Hardware and Software Technology and Service" under Grant No.2012ZX01039003Sub-project "IPv6 Application and Demonstration of Mobile Internet inCampus Environment" of National Sci-Tech Major Special Item Project "IPv6 Applicationand Demonstration of Mobile Internet" under Grant No. 2012ZX03002015-003A New Network Architecture:Address Driven Network Architecture and Technology Research and Development under Grant No. CNGI-12-03-001
文摘With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.
基金This work was supported in part by the National Key R&D Program of China under Grant 2020YFA0711301in part by the National Natural Science Foundation of China under Grant 61922049,and Grant 61941104in part by the Tsinghua University-China Mobile Communications Group Company Ltd.,Joint Institute.
文摘With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.
基金the Special Research Fund for the Doctoral Program of Higher Education(No.20050248037)the National Natural Science Foundation of China(No.50779033)
文摘The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user nodes. Mobility management in 4G networks is an issue that exists. The handover protocols for mobility management in 4G networks that currently exist, do not consider wireless signal degradation during handover operations. This paper introduces the Noise Resilient Reduced Registration Time Care of Mobile IP(NR RRTC:MIP) protocol for handover management. A handover decision algorithm based on the signal strength measured by the user nodes is considered in the NR RRTC: MIP protocol. A simulation study is discussed in the paper to evaluate the performance of the NR RRTC: MIP protocol. The results obtained from the simulation study prove that the NR RRTC: MIP protocol effectively reduces handover latencies and improves network performance.
基金supported by The National Basic Research Program of China(973 program)(2014CB347800)The National Natural Science Foundation of China(No.61522205,No.61432002,No.61133006)+1 种基金The National High Techndogy Research Development Program of China(863 program)(No.2013AA013303,No.2015AA01A705,No.2015AA016102)ZTE communications and Tsinghua University Initiative Scientific Research Program.
文摘Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches and clean-slate approaches.The representative evolutionary solution is IPv6,while representative clean-slate approaches are NDN(Named Data Networking),MobilityFirst,NEBULA,XIA(Expressive Internet Architecture),and SDN(Software-Defined Networking).A comprehensive survey of these approaches are presented.Additionally,a novel network architecture that we recently proposed:ADN(Address-Driven Networking)is described,which intends to address the challenges faced by today’s Internet via the flexible and innovative utilization of IP addresses.