期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Design and Implementation of Multiple Authentication Schemes on Navigation Messages
1
作者 Liu Chunpeng Dong Wenhao +1 位作者 maode ma Xiao Shuang 《China Communications》 2025年第9期264-288,共25页
Unmanned aerial vehicles(UAVs) are widely used in commercial activities due to their low cost and high efficiency. However, many unscrupulous activities have taken advantage of the open nature of civil navigation mess... Unmanned aerial vehicles(UAVs) are widely used in commercial activities due to their low cost and high efficiency. However, many unscrupulous activities have taken advantage of the open nature of civil navigation messages to implement Global Navigation Satellite System(GNSS) spoofing attacks on UAVs, resulting in major security risks for UAVs. In order to cope with spoofing attacks, a navigation message authentication(NMA) scheme has been proposed to protect navigation messages. However, the mainstream NMA schemes have defects of a single authentication process and large time overhead. Furthermore,these schemes depend on digital certificates to update the key. In the event that the UAV is disconnected from the certificate authority, it will be unable to update the key in an appropriate manner, which will consequently affect subsequent authentication.To solve the above problems, this paper proposes a hybrid authentication scheme based on BeiDou-Ⅲ navigation system(BDS-Ⅲ), which combines Navigation Message Authentication(NMA) and timed efficient stream losstolerant authentication(TESLA) to achieve a triple authentication of signatures, TESLA keys, and message authentication code(MAC). Then, the SM2 signature algorithm is modified to reduce the authentication time overhead. Finally, the stability of the key update process is enhanced by storing the public key in the navigation message and broadcasting it by satellite. Experimental verification shows that the proposed scheme can effectively resist replay attacks and generative spoofing attacks, while guaranteeing the security.The authentication error rate of the proposed scheme can meet the demand of less than 10^(−3) when it is lower than the average carrier-to-noise ratio of 7dBHz. The time between authentications(TBA) is 15.11 seconds.The unpredictable symbol rate(USR) is 16.8% which is a better performance compared with same kind of scheme. 展开更多
关键词 B-CNAV key distribution SM crypto-graphic algorithms TESLA UAV security
在线阅读 下载PDF
Renovated Random Attribute-Based Fennec Fox Optimized Deep Learning Framework in Low-Rate DoS Attack Detection in IoT
2
作者 Prasanalakshmi Balaji Sangita Babu +4 位作者 maode ma Zhaoxi Fang Syarifah Bahiyah Rahayu mariyam Aysha Bivi mahaveerakannan Renganathan 《Computers, Materials & Continua》 2025年第9期5831-5858,共28页
The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptibl... The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptible to security threats.One significant risk to cloud networks is Distributed Denial-of-Service(DoS)attacks,where attackers aim to overcome a target system with excessive data and requests.Among these,low-rate DoS(LR-DoS)attacks present a particular challenge to detection.By sending bursts of attacks at irregular intervals,LR-DoS significantly degrades the targeted system’s Quality of Service(QoS).The low-rate nature of these attacks confuses their detection,as they frequently trigger congestion control mechanisms,leading to significant instability in IoT systems.Therefore,to detect the LR-DoS attack,an innovative deep-learning model has been developed for this research work.The standard dataset is utilized to collect the required data.Further,the deep feature extraction process is executed using the Residual Autoencoder with Sparse Attention(ResAE-SA),which helps derive the significant feature required for detection.Ultimately,the Adaptive Dense Recurrent Neural Network(ADRNN)is implemented to detect LR-DoS effectively.To enhance the detection process,the parameters present in the ADRNN are optimized using the Renovated Random Attribute-based Fennec Fox Optimization(RRA-FFA).The proposed optimization reduces the False Discovery Rate and False Positive Rate,maximizing the Matthews Correlation Coefficient from 23,70.8,76.2,84.28 in Dataset 1 and 70.28,73.8,74.1,82.6 in Dataset 2 on EPC-ADRNN,DPO-ADRNN,GTO-ADRNN,FFA-ADRNN respectively to 95.8 on Dataset 1 and 91.7 on Dataset 2 in proposed model.At batch size 4,the accuracy of the designed RRA-FFA-ADRNN model progressed by 9.2%to GTO-ADRNN,11.6%to EFC-ADRNN,10.9%to DPO-ADRNN,and 4%to FFA-ADRNN for Dataset 1.The accuracy of the proposed RRA-FFA-ADRNN is boosted by 12.9%,9.09%,11.6%,and 10.9%over FFCNN,SVM,RNN,and DRNN,using Dataset 2,showing a better improvement in accuracy with that of the proposed RRA-FFA-ADRNN model with 95.7%using Dataset 1 and 94.1%with Dataset 2,which is better than the existing baseline models. 展开更多
关键词 Detecting low-rate DoS attacks adaptive dense recurrent neural network residual autoencoder with sparse attention renovated random attribute-based fennec fox optimization
在线阅读 下载PDF
Certrust:An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
3
作者 Lei Yan maode ma +3 位作者 Dandan Li Xiaohong Huang Yan ma Kun Xie 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期2137-2162,共26页
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic... The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods. 展开更多
关键词 Trust model CERTIFICATE SDN Crossfire attack bayesian trust system forgetting curve IOT
在线阅读 下载PDF
Migration to Software-Defined Networks:the Customers' View
4
作者 Tingting Yuan Xiaohong Huang +1 位作者 maode ma Pei Zhang 《China Communications》 SCIE CSCD 2017年第10期1-11,共11页
Software Defined Networking(SDN) provides a flexible and convenient way to support fine-grained traffic-engineering(TE). Besides, SDN also provides better Quality of Experience(QoE) for customers. However, the policy ... Software Defined Networking(SDN) provides a flexible and convenient way to support fine-grained traffic-engineering(TE). Besides, SDN also provides better Quality of Experience(QoE) for customers. However, the policy of the evolution from legacy networks to the SDNs overemphasizes the controllability of the network or TE while ignoring the customers' benefit. Standing in the customers' position, we propose an optimization scheme, named as Optimal Migration Schedule based on Customers' Benefit(OMSB), to produce an optimized migration schedule and maximize the benefit of customers. Not only the quality and quantity of paths availed by migration, but also the number of flows from the customers that can use these multi-paths are taken into consideration for the scheduling. We compare the OMSB with other six migration schemes in terms of the benefit of customers. Our results suggest that the sequence of the migration plays a vital role for customers, especially in the early stages of the network migration to the SDN. 展开更多
关键词 network management network migration software-defined networking traffic engineering
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部