The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, 802.11ah with restricted access window for collision attenuation has been proposed for Internet of Things (IoT) applications. Random grouping of nodes in different access window is utilized to reduce the hidden node collision probability. However, when the coverage area of the sink node is large, the occurrence probability of hidden node problem is still high and severely impacts the system...
OpenFlow has been applied to a variety of demands of the transmission quality of the Internet business and it is still growing on its way. To test this protocol with its evolution consideration, we analyzed the working process of OpenFlow protocol and constructed the CPN model through phasing firstly and then role division for version 1.0. In addition, the selection of tokens and their given values...
To offer flexible and programmable forwarding plane, we propose a solution from the perspective of system architecture. An extensible forwarding element architecture (EFEA) based on SDN is proposed, in which the core part is three layer forwarding element architecture (TLFEA). It also includes FE OS image service in SDN controller, FE OS image management system, FE OS development system. In order...
SPDY protocol is a new application-layer communication protocol which was proposed by Google in order to overcome the defects of HTTP. On the basis of HTTP protocol, SPDY offered four improvements to shorten the page loading time such as multiplexed requests, prioritized requests, server pushed streams and compressed headers. However, there is no much test work of the SPDY especially treating it as...
In view of the wireless sensor network routing LEACH protocol ignored the election of cluster head nodes energy, node density and relative information of base station location, proposes a improved clustering routing algorithm based on energy, density and location information of Sink. Introduces the residual energy and density factors in the threshold formula, makes the cluster heads for the entire...
OpenFlow is a new protocol which enables researchers to run experimental protocols in a network without changing the network topology. In the paper, we analyze and test OpenFlow based on a formal method, such as CPN (colored Petri net). To avoid state exploration, we mainly focus on testing the interaction property of OpenFlow. According to the latest OpenFlow specification, we construct its hierarchy...
Software evolution is the process to meet the market requirements. The software after evolution has many new features worth of research. In this paper, we analyze the evolution of Linux, Windows, and Minix in detail, and analyzes from OSPF-v2 to OSPFv3 by RFC. The kernel call and system call of Minix3 and OSPF protocol are modeled with Colored Petri Net (CPN) Tools. Fork, as an example of system call,...
This paper proposes the protocol of Quantum Secure Direct Communization (QSDC) based on the secret initial Bell states which are shared by two legitimate communicators. Then, we analyze the security of the protocol against the intercept-and-resend attack and individual attack. It is unnecessary for the scheme to make odd particles especially which is used for detection of eavesdropping. Instead, it...
The protocol identify of space unknown protocol data can use the method of SVM, but before the identify must have a large number of study data for the process of training. This paper proposes a new space transfer data classification algorithm PCC which can class the unknown protocol space data as different sorts. The PCC arithmetic include three processes of relationship of different layer protocol,...
Data holders need to share the alerts data that they detected for correlation and analysis purpose. In such cases, privacy issues turn out to be a major concern. This paper proposes a model to correlate and analyze intrusion alerts with privacy-preserving capability. The raw intrusion alerts are protected by improved k-anonymity method, which preserves the alert regulation inside disturbed data records...
Formal specification and analysis of security protocol is a research hotspot in network security at present. This paper models authentication service exchange of Public-Key Kerberos Protocol and an attack against this protocol with Petri nets. The Maria Tool automates analysis and verification of the model and finds that PKINIT-26 protocol has a security flaw. So we improve the model according to...
This article introduced the principle of PPP, then carried the detailed analysis to the protocol's security mechanism, with the concrete analysis of the traditional PAP and CHAP existing in the PPP, the PPP network expose some shortage of security which is easily cracked, on this basis, finally, reached the improved security algorithm, which can enhance the security of PPP network obviously.
Radio Frequency Identification (RFID) has many perfect features such as completely non-contact, high recognition rate, bulk-storage memory, securely access and easily be integrated with existing management information system, etc. It has widely been applied in many fields especially in logistics and product quality tracking systems. The research on the application of RFID in agricultural seed quality...
Aiming at the shortage of existing DDoS attacks defense system, this paper puts forward an effective approach against DDoS attacks based on the three-way handshake process, and the key point lies in discarding the aggressive first handshake requests which consume a lot of system resources; thus it ensures that the new normal network request can be dealt with. An efficient defense system against DDoS...
In this paper, a novel anti-collision algorithm based on cyclic redundancy check is proposed to improve the performance of the RFID system. Compared with the previous algorithm, two new techniques can be found in our algorithm. First, noting transmitting the RN16 in the process of reading costs too much time in ISO18000-6C protocol, we use 16-bit cyclic redundancy check (CRC16) to take the place of...
Test system plays more and more important part during testing process. In this paper, the architecture of a distributed conformance test system is designed. The main function of each part is introduced. The core part of this test system, called IMU-TNGIP, is designed and implemented from editor to executor in many details. It includes at least three parts, expression of test suite, execution of test...
Flat P2P communities have no authorities or supervisors to act as the root of trust, therefore trust is difficult to establish between stranger peers. A personalized P2P trust management framework is proposed in this paper, to help good peers build up trust between each other and avoid malicious peers. This framework differs from others in that it totally abandons the attempt to achieve a global view,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.