期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
新一代低轨卫星网络和地面无线自组织网络融合技术的探讨 被引量:8
1
作者 杨昕 孙智立 +4 位作者 刘华峰 赵康僆 程子敬 苗晔 haitham cruickshank 《中兴通讯技术》 2016年第4期58-63,共6页
展示并验证了一种由新一代低轨卫星网络和地面无线自组织网络组成的星地一体化网络。此星地一体化网络中的低轨卫星网络可以提供大容量、低时延的网络覆盖,其"低轨"的特点又可减小地面终端的尺寸,增强地面网络的移动性。与经... 展示并验证了一种由新一代低轨卫星网络和地面无线自组织网络组成的星地一体化网络。此星地一体化网络中的低轨卫星网络可以提供大容量、低时延的网络覆盖,其"低轨"的特点又可减小地面终端的尺寸,增强地面网络的移动性。与经典的中轨和静止卫星网络相比,此种网络可以提供更高通量、更高移动性的通信支持,大大拓宽通信网络的应用范围。对不同的网络层次结构采用相应的软件仿真工具环境,为今后进一步深入研究卫星网络的体系结构和自组互联网技术起到了抛砖引玉的作用。 展开更多
关键词 低轨卫星 无线自组织网络 一体化通信网络
在线阅读 下载PDF
A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems 被引量:4
2
作者 LEI Ao Chibueze Ogah +2 位作者 Philip Asuquo haitham cruickshank SUN Zhili 《ZTE Communications》 2016年第B06期21-31,共11页
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl... Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works. 展开更多
关键词 leaving probability bloekchain group key management HETEROGENEOUS vehicular communication systems (VCS)
在线阅读 下载PDF
Integrating IPsec within OpenFlow Architecture for Secure Group Communication
3
作者 Vahid Heydari Fami Tafreshi Ebrahim Ghazisaeedi +1 位作者 haitham cruickshank Zhili Sun 《ZTE Communications》 2014年第2期41-49,共9页
Network security protocols such as IPsec have been used for many years to ensure robust end-to-end communication and are important in the context of SDN. Despite the widespread installation of IPsec to date, per-packe... Network security protocols such as IPsec have been used for many years to ensure robust end-to-end communication and are important in the context of SDN. Despite the widespread installation of IPsec to date, per-packet protection offered by the protocol is not very compatible with OpenFlow and tlow-like behavior. OpenFlow architecture cannot aggregate IPsee-ESP flows in transport mode or tunnel mode because layer-3 information is encrypted and therefore unreadable. In this paper, we propose using the Security Parameter Index (SPI) of IPsec within the OpenFlow architecture to identify and direct IPsec flows. This enables IPsec to conform to the packet-based behavior of OpenFlow architecture. In addition, by distinguishing between IPsec flows, the architecture is particularly suited to secure group communication. 展开更多
关键词 IPSEC OpenFlow secure group communication group domain of interpretation (GDOI) flow-based switching
在线阅读 下载PDF
Comparative Evaluation QoS of FTP over LEO and GEO Satellite Networks with Diffserv Architecture
4
作者 Lukman Audah Zhili Sun haitham cruickshank 《通讯和计算机(中英文版)》 2012年第12期1383-1394,共12页
This paper presents studies of the end-to-end QoS of IP over integrated terrestrial and NGSN(next generation satellite network)for file transfer service using FTP.The authors compare between LEO and GEO satellites con... This paper presents studies of the end-to-end QoS of IP over integrated terrestrial and NGSN(next generation satellite network)for file transfer service using FTP.The authors compare between LEO and GEO satellites constellations for the QoS parameters(i.e.,delay,jitter,loss rate and throughput)of file transfer between one server in London and a client in Boston.The authors model the file transfer with multiple connections and file size variation according to exponential and Pareto distributions respectively.The authors create the scenario with error model to simulate transmission loss environment using the NS-2 simulation software.A Diffserv(differentiated services)queue interface is placed in the server side to regulate the traffic flows across the narrow bandwidth of the satellite links.The authors compare the empirical TCP throughput traces with analytical model for validation.The results showed the performance evaluation and presented a good comparison of the QoS parameters involved in the data transfer across LEO and GEO satellites systems. 展开更多
关键词 QOS IP over satellite DIFFSERV FTP application integrated network TCP throughput modeling.
在线阅读 下载PDF
Heuristic Scheduling Algorithms for Allocation of Virtualized Network and Computing Resources
5
作者 Yichao Yang Yanbo Zhou +1 位作者 Zhili Sun haitham cruickshank 《Journal of Software Engineering and Applications》 2013年第1期1-13,共13页
Cloud computing technology facilitates computing-intensive applications by providing virtualized resources which can be dynamically provisioned. However, user’s requests are varied according to different applications... Cloud computing technology facilitates computing-intensive applications by providing virtualized resources which can be dynamically provisioned. However, user’s requests are varied according to different applications’ computation ability needs. These applications can be presented as meta-job of user’s demand. The total processing time of these jobs may need data transmission time over the Internet as well as the completed time of jobs to execute on the virtual machine must be taken into account. In this paper, we presented V-heuristics scheduling algorithm for allocation of virtualized network and computing resources under user’s constraint which applied into a service-oriented resource broker for jobs scheduling. This scheduling algorithm takes into account both data transmission time and computation time that related to virtualized network and virtual machine. The simulation results are compared with three different types of heuristic algorithms under conventional network or virtual network conditions such as MCT, Min-Min and Max-Min. e evaluate these algorithms within a simulated cloud environment via an abilenenetwork topology which is real physical core network topology. These experimental results show that V-heuristic scheduling algorithm achieved significant performance gain for a variety of applications in terms of load balance, Makespan, average resource utilization and total processing time. 展开更多
关键词 Cloud Computing Meta-Job Scheduling HEURISTIC Algorithm Load BALANCE NETWORK VIRTUALIZATION
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部