In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application o...In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application of 5G private industrial networks,a comparative analysis is used to plan and design a private network security construction scheme.The network security construction model,network organization,and key processes of 5G private industrial networks at the current stage are investigated.In addition,the key direction for the next stage of construction is discussed.展开更多
This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensu...This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensus algorithm(DPCA) is developed. To avoid continuous communication between neighboring agents, a kind of intermittent communication strategy depending on an event-triggered function is established in our DPCA. Based on our algorithm, we carry out the detailed analysis including its convergence, its accuracy, its privacy and the trade-off between the accuracy and the privacy level, respectively. It is found that our algorithm preserves the privacy of initial states of all agents in the whole process of consensus computation. The trade-off motivates us to find the best achievable accuracy of our algorithm under the free parameters and the fixed privacy level. Finally, numerical experiment results testify the validity of our theoretical analysis.展开更多
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d...This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec.展开更多
A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public wh...A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment.展开更多
This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important...This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important channel and platform to solve the problem of college students’employment.The government,society and universities has been actively encouraging college students'network entrepreneurship as the value of college students'network entrepreneurship is significant.This paper analyzes the current situation of college students'network entrepreneurship and the problems faced through the survey data and thus suggests corresponding countermeasures.展开更多
Most of the existing virtual scenarios built for the digital protection of Chinese classical private gardens are too modern in expression style to show the aesthetic significance of their historical period.Considering...Most of the existing virtual scenarios built for the digital protection of Chinese classical private gardens are too modern in expression style to show the aesthetic significance of their historical period.Considering the aesthetic commonality between traditional Chinese landscape paintings and classical private gardens and referring to image style transfer,here,a deep neural network was proposed to transfer the aesthetic style from landscape paintings to the virtual scenario of classical private gardens.The network consisted of two parts:style prediction and style transfer.The style prediction network was used to obtain style representation from style paintings,and the style transfer network was used to transfer style representation to the content scenario.The pre-trained network was then embedded into the scenario rendering pipeline and combined with the screen post-processing method to realise the stylised expression of the virtual scenario.To verify the feasibility of this methodology,a virtual scenario of the Humble Administrator’s Garden was used as the content scenario andfive garden landscape paintings from different time periods and painting styles were selected for the case study.The results demonstrated that this methodology could effectively achieve the aesthetic style transfer of a virtual scenario.展开更多
Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In thi...Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In this paper an appropriate method is proposed in order to provide an accelerated secure E2E connection. We show an efficient secure three-party protocol, based on public key infrastructure (PKI), which provides security against spiteful adversaries. Our construction is based on applying asymmetric cryptography techniques to the original IKE protocol. Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitute a flaw. Proofing security properties is essential for the development of secure protocol. We give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. Based on the results of this preliminary analysis, we have implemented a prototype of our security protocol and evaluated its performance and checked safety properties of security protocol, and the results show that the protocol is robust and safe against major security threats.展开更多
One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed ob...One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed object oriented) method for HDOS (Hierarchy Distributed Object System), PNNI systems and IP(Internet Protocol) networks. Based on the specifications from ATM forum, and the creative ideas from Distributed System realization, this paper studies and analyzes the private ATM network environment. The OIL algorithm and the DOO method are both for PNNI routing protocol. Through the PNNI simulation, the availability and robustness are proved for the above two improvements.展开更多
One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed ob...One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed object-oriented) method for HDOS (Hierarchy Distributed-Object System), PNNI systems and IP(Internet Protocol) networks. Based on the specifications from ATM forum, and the creative ideas from Distributed System realization, this paper studies and analyzes the private ATM network environment. The OIL algorithm and the DOO method are both for PNNI routing protocol. Through the PNNI simulation, the availability and robustness are proved for the above two improvements.展开更多
Based on extensive interviews in China and in Africa over 2 years, the present paper investigates Chinese private direct investment in Africa. Drawing on the Swedish Uppsala model, we explore two mian issues. First, d...Based on extensive interviews in China and in Africa over 2 years, the present paper investigates Chinese private direct investment in Africa. Drawing on the Swedish Uppsala model, we explore two mian issues. First, do Chinese private enterprises follow the linear mode to invest in Africa? Second, if not, how do they go out and develop their investments, and who helps them overcome the obstacles to investing in Africa? We find that very few Chinese private enterprises follow a linear internationalization process, and most depend on the local overseas Chinese network and other networks to facilitate their entry into the host market. The reason lies in that Chinese private enterprises are still at the early stage of internationalization. Entrepreneurship is one of the most important ownership advantages of Chinese private enterprises investing in Africa.展开更多
Traditional virtual private networks( VPNs) are conditional security. In order to ensure the security and confidentiality of user data transmission,a model of quantum VPN based on Internet protocol security( IPSec...Traditional virtual private networks( VPNs) are conditional security. In order to ensure the security and confidentiality of user data transmission,a model of quantum VPN based on Internet protocol security( IPSec)protocol is proposed. By using quantum keys for key distribution and entangled particles for identity authentication in the network,a secure quantum VPN is relized. The important parameters affecting the performance of the VPN was analyzed. The quantitative relationship between the security key generation rate,the quantum bit error rate( QBER) and the transmission distance was obtained. The factors that affect the system throughput were also analyzed and simulated. Finally,the influence of the quantum noise channel on the entanglement swapping was analyzed. Theoretical analysis and simulation results show that,under a limited number of decoy states,with the transmission distance increased from 0 to 112. 5 km,the secure key generation rate was reduced from 5. 63 × 10^-3 to 1. 22 × 10^-5. When the number of decoy states is fixed,the QBER increases dramatically with the increase of the transmission distance,and the maximum reaches 0. 393. Analysis shows that various factors in communication have a significant impact on system throughput. The generation rate of the effective entanglement photon pairs have decisive effect on the system throughput. Therefore,in the process of quantum VPN communication,various parameters of the system should be properly adjusted to communicate within a safe transmission distance,which can effectively improve the reliability of the quantum communication system.展开更多
文摘In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application of 5G private industrial networks,a comparative analysis is used to plan and design a private network security construction scheme.The network security construction model,network organization,and key processes of 5G private industrial networks at the current stage are investigated.In addition,the key direction for the next stage of construction is discussed.
基金supported in part by the National Key Research and Development Program of China (2016YFB0800601)
文摘This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensus algorithm(DPCA) is developed. To avoid continuous communication between neighboring agents, a kind of intermittent communication strategy depending on an event-triggered function is established in our DPCA. Based on our algorithm, we carry out the detailed analysis including its convergence, its accuracy, its privacy and the trade-off between the accuracy and the privacy level, respectively. It is found that our algorithm preserves the privacy of initial states of all agents in the whole process of consensus computation. The trade-off motivates us to find the best achievable accuracy of our algorithm under the free parameters and the fixed privacy level. Finally, numerical experiment results testify the validity of our theoretical analysis.
文摘This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec.
文摘A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment.
基金Guangzhou Huashang College 2022 Innovation and Entrepreneurship Education Research Project“Research on the Influencing Factors of College Students’Network Entrepreneurship Intention Based on TPB Model”(Project Number:HS2022CXCY04)。
文摘This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important channel and platform to solve the problem of college students’employment.The government,society and universities has been actively encouraging college students'network entrepreneurship as the value of college students'network entrepreneurship is significant.This paper analyzes the current situation of college students'network entrepreneurship and the problems faced through the survey data and thus suggests corresponding countermeasures.
基金This work was supported by the Key Project of the National Natural Science Foundation of China(NSFC)under Grant 41930104National Key R&D Program of China under Grant 2021 YFE0112300+1 种基金Postgraduate Research&Practice Innovation Program of Jiangsu Province under Grant KYCX21_1336China Scholarship Council under Grant 202206860019.
文摘Most of the existing virtual scenarios built for the digital protection of Chinese classical private gardens are too modern in expression style to show the aesthetic significance of their historical period.Considering the aesthetic commonality between traditional Chinese landscape paintings and classical private gardens and referring to image style transfer,here,a deep neural network was proposed to transfer the aesthetic style from landscape paintings to the virtual scenario of classical private gardens.The network consisted of two parts:style prediction and style transfer.The style prediction network was used to obtain style representation from style paintings,and the style transfer network was used to transfer style representation to the content scenario.The pre-trained network was then embedded into the scenario rendering pipeline and combined with the screen post-processing method to realise the stylised expression of the virtual scenario.To verify the feasibility of this methodology,a virtual scenario of the Humble Administrator’s Garden was used as the content scenario andfive garden landscape paintings from different time periods and painting styles were selected for the case study.The results demonstrated that this methodology could effectively achieve the aesthetic style transfer of a virtual scenario.
文摘Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In this paper an appropriate method is proposed in order to provide an accelerated secure E2E connection. We show an efficient secure three-party protocol, based on public key infrastructure (PKI), which provides security against spiteful adversaries. Our construction is based on applying asymmetric cryptography techniques to the original IKE protocol. Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitute a flaw. Proofing security properties is essential for the development of secure protocol. We give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. Based on the results of this preliminary analysis, we have implemented a prototype of our security protocol and evaluated its performance and checked safety properties of security protocol, and the results show that the protocol is robust and safe against major security threats.
基金National‘86 3’ High Technolgy Plan!(86 3-317-0 1-0 1-0 1-99)
文摘One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed object oriented) method for HDOS (Hierarchy Distributed Object System), PNNI systems and IP(Internet Protocol) networks. Based on the specifications from ATM forum, and the creative ideas from Distributed System realization, this paper studies and analyzes the private ATM network environment. The OIL algorithm and the DOO method are both for PNNI routing protocol. Through the PNNI simulation, the availability and robustness are proved for the above two improvements.
文摘One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed object-oriented) method for HDOS (Hierarchy Distributed-Object System), PNNI systems and IP(Internet Protocol) networks. Based on the specifications from ATM forum, and the creative ideas from Distributed System realization, this paper studies and analyzes the private ATM network environment. The OIL algorithm and the DOO method are both for PNNI routing protocol. Through the PNNI simulation, the availability and robustness are proved for the above two improvements.
文摘Based on extensive interviews in China and in Africa over 2 years, the present paper investigates Chinese private direct investment in Africa. Drawing on the Swedish Uppsala model, we explore two mian issues. First, do Chinese private enterprises follow the linear mode to invest in Africa? Second, if not, how do they go out and develop their investments, and who helps them overcome the obstacles to investing in Africa? We find that very few Chinese private enterprises follow a linear internationalization process, and most depend on the local overseas Chinese network and other networks to facilitate their entry into the host market. The reason lies in that Chinese private enterprises are still at the early stage of internationalization. Entrepreneurship is one of the most important ownership advantages of Chinese private enterprises investing in Africa.
基金supported by the National Natural Science Foundation of China(61172071)the International Scientific and Technological Cooperation and Exchange Program in Shaanxi Province,China(2015KW-013)the Scientific Research Program Funded by Shaanxi Provincial Education Department,China(16JK1711)
文摘Traditional virtual private networks( VPNs) are conditional security. In order to ensure the security and confidentiality of user data transmission,a model of quantum VPN based on Internet protocol security( IPSec)protocol is proposed. By using quantum keys for key distribution and entangled particles for identity authentication in the network,a secure quantum VPN is relized. The important parameters affecting the performance of the VPN was analyzed. The quantitative relationship between the security key generation rate,the quantum bit error rate( QBER) and the transmission distance was obtained. The factors that affect the system throughput were also analyzed and simulated. Finally,the influence of the quantum noise channel on the entanglement swapping was analyzed. Theoretical analysis and simulation results show that,under a limited number of decoy states,with the transmission distance increased from 0 to 112. 5 km,the secure key generation rate was reduced from 5. 63 × 10^-3 to 1. 22 × 10^-5. When the number of decoy states is fixed,the QBER increases dramatically with the increase of the transmission distance,and the maximum reaches 0. 393. Analysis shows that various factors in communication have a significant impact on system throughput. The generation rate of the effective entanglement photon pairs have decisive effect on the system throughput. Therefore,in the process of quantum VPN communication,various parameters of the system should be properly adjusted to communicate within a safe transmission distance,which can effectively improve the reliability of the quantum communication system.