The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The underlying networks (of the Internet) have been reworked to make way for new technologies, some serious inefficiencies and security problems have arisen. As a result, over the past years, fundamentally new network designs have taken shape and are being tested. In ITU Recommendation Y.3001 [1], four objectives are identified in line with the requirements for Future Network; one of them is data...
with the development of information technology, VPN technology has been widely applied in variety of fields. In this paper, two kinds of VPN : IPSec and SSL VPN are studied in detailed, and the scope of application, security, scalability and other aspects are analyzed and compared, advantages and inadequacy are summarized, finally, VPN selection reference standard is proposed.
Cognitive Radio Networks (CRNs) emerge as a possible solution for the lack of spectrum, and make different networks merge. However, security becomes the key problem need to be solved. Cognitive radio networks face not only traditional network security intrusion problems, but also unique security risks. In this paper, we investigate security issues in different classes which including spectrum security...
Identity authentication is one of the key problems to be solved in cognitive radio networks. Current authentication mechanisms for cognitive radio networks are based on PPP Extensible Authentication Protocols. Future cognitive radio network can fusion current wireless standards. However, security requirements of various wireless standards are different which leads to current authentication mechanisms...
Cognitive radio networks provides solutions for heterogeneous networks convergence. However, security requirements of various wireless standards are different which leads to current authentication mechanisms are not suitable for cognitive radio networks. Therefore, a new authentication mechanism for cognitive radio networks is proposed which is based on third-party Certification Authority (CA). In...
Identity authentication is the key point for secure communications in cognitive radio networks (CRN). PPP Extensible Authentication Protocols are widely used in wireless networks recently. Cognitive radio networks are able to merge various wireless network standards whose security certification requirements are different. Therefore, current authentication mechanisms are not suitable for cognitive...
As an advanced train control system, communication-based train control (CBTC) system can improve the utilization of railway network infrastructure and enhance the level of safety and service offered to customers. In this paper, we propose a seamless handoff scheme for CBTC systems based on Stream Control Transmission Protocol (SCTP) and IEEE 802.11p. The focus of our work is in the handoff decision...
Communication-based train control (CBTC) system is an automated control system for railways that ensures the safe operation of rail vehicles using wireless data communications. The train-ground communication system is one of the key subsystem of CBTC. CBTC systems have stringent requirements for wireless communication availability and latency. In this paper, we propose a seamless handoff scheme based...
When simulation aims at evaluating the scalability of new protocols and applications, it is indispensable to work with large scale network topologies. It has important practical significance and benefits for improving the behaviors of network planning and design, system optimized design and project risk reduction. The technique of modeling our safe communication protocol of communication based train...
The 802.11b physical protocols applied in Communication Based Train Control (CBTC) train-ground communication system are simulated in this paper, and the simulation result is used to determine the AP distance. The train speed impact on physical FER is also studied by the simulation result. As a protocol used in a fully mobile outdoor environment, the packet delay and packets loss rate performance...
Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, which bring new research challenges in MAC design. In this paper, we firstly introduce the differences between the conventional multi-channel MAC protocols and the MAC protocols for OSA as well as the requirements for OSA MAC protocols, and then...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.