Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite netwo...Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite network architecture including Geostationary Earth Orbit (GEO), Highly Elliptical Orbit (HEO), and Low Earth Orbit (LEO) satellite layers, which provides the near-global coverage with 24 hour uninterrupted over the areas varying from 75° S to 90° N. On the basis of the hierarchical architecture, we propose a QoS-guaranteed secure multicast routing protocol (QGSMRP) for satellite IP networks using the logical location concept to isolate the mobility of LEO and HEO satellites. In QGSMRP, we employ the asymmetric cryptography to secure the control messages via the pairwise key pre-distribution, and present a least cost tree (LCT) strategy to construct the multicast tree under the condition that the QoS constraints are guaranteed, aiming to minimize the tree cost. Simulation results show that the performance benefits of the proposed QGSMRP in terms of the end-to-end tree delay, the tree cost, and the failure ratio of multicasting connections by comparison with the conventional shortest path tree (SPT) strategy.展开更多
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe...Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.展开更多
The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advance...The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advancement of mobile networks,cloud computing,and Internet of Things,communication-computing integration and cloud-network integration have been important technical routes.As a result,the main application requirements of wireless networks have changed from data transmission to cloud-based information services.Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era,and secure semantic communication has become an important model.To address this issue,we propose a cloud-network-end collaborative security architecture.Firstly,we clarify security mechanisms for end system security,network connection security,and cloud services security,respectively.Next,based on the above three aspects,we elaborate on the connotation of cloud-network-end collaborative security.By giving example applications,including heterogeneous network secure convergence framework,unmanned system collaborative operations security framework,and space-air-ground integrated network security framework,we demonstrate the universality of the proposed architecture.Finally,we review the current research on end system security,network connection security,and cloud services security,respectively.展开更多
A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-...A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-atic analysis of the structure and function of home control subnet based on the general model of home net-work. The paper has also analyzed two types of major equipment, namely sub-gateways and terminal equip-ment. The major networking technology used in home control subnet is summarized and concluded. In com-bination with relationship among home control subnet, home network, as well as the outside main network, the paper has systematically studied various safety problems related to home control gateways and the possi-ble solutions to those problems have been made.展开更多
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba...One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization ...In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security.展开更多
The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many suppo...The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations.展开更多
Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robu...Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robust security measures to protect against potential threats and ensure the integrity of operations. This research presents a novel secure architecture for a swarm of drones deployed on surveillance missions. Leveraging a reliable foundation established through Delaunay triangulation for communication among drones, this work introduces advanced security protocols to enhance the protection and integrity of the network. The architecture employs a mesh network topology connecting six drones, each configured for specific surveillance tasks, including perimeter monitoring, area scanning, thermal imaging, traffic observation, communication relay, and incident response. The mesh network design ensures extended coverage, redundancy, load balancing, and self-configuration, significantly improving reliability and resilience. Security validation was conducted using GNS3 and Ettercap, simulating various vulnerability scenarios. Comparative performance analysis between a classic drone network and the proposed secure mesh network demonstrates superior traffic management and robustness against potential attacks. The results underscore the architecture’s suitability for secure and reliable operations in critical surveillance environments.展开更多
文摘Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite network architecture including Geostationary Earth Orbit (GEO), Highly Elliptical Orbit (HEO), and Low Earth Orbit (LEO) satellite layers, which provides the near-global coverage with 24 hour uninterrupted over the areas varying from 75° S to 90° N. On the basis of the hierarchical architecture, we propose a QoS-guaranteed secure multicast routing protocol (QGSMRP) for satellite IP networks using the logical location concept to isolate the mobility of LEO and HEO satellites. In QGSMRP, we employ the asymmetric cryptography to secure the control messages via the pairwise key pre-distribution, and present a least cost tree (LCT) strategy to construct the multicast tree under the condition that the QoS constraints are guaranteed, aiming to minimize the tree cost. Simulation results show that the performance benefits of the proposed QGSMRP in terms of the end-to-end tree delay, the tree cost, and the failure ratio of multicasting connections by comparison with the conventional shortest path tree (SPT) strategy.
文摘Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.
基金supported by the National Key Research and Development Program of China(No.2021YFB3101100)National Natural Science Foundation of China(Nos.62232013,92267204,and 62202364)Fellowship of China National Postdoctoral Program for Innovation Talents(No.BX20230279).
文摘The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advancement of mobile networks,cloud computing,and Internet of Things,communication-computing integration and cloud-network integration have been important technical routes.As a result,the main application requirements of wireless networks have changed from data transmission to cloud-based information services.Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era,and secure semantic communication has become an important model.To address this issue,we propose a cloud-network-end collaborative security architecture.Firstly,we clarify security mechanisms for end system security,network connection security,and cloud services security,respectively.Next,based on the above three aspects,we elaborate on the connotation of cloud-network-end collaborative security.By giving example applications,including heterogeneous network secure convergence framework,unmanned system collaborative operations security framework,and space-air-ground integrated network security framework,we demonstrate the universality of the proposed architecture.Finally,we review the current research on end system security,network connection security,and cloud services security,respectively.
文摘A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-atic analysis of the structure and function of home control subnet based on the general model of home net-work. The paper has also analyzed two types of major equipment, namely sub-gateways and terminal equip-ment. The major networking technology used in home control subnet is summarized and concluded. In com-bination with relationship among home control subnet, home network, as well as the outside main network, the paper has systematically studied various safety problems related to home control gateways and the possi-ble solutions to those problems have been made.
文摘One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金supported in part by the National Science Foundation(NSF)of the USA(2146497,2416872,2315596 and 2244219).
文摘In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security.
文摘The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations.
文摘Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robust security measures to protect against potential threats and ensure the integrity of operations. This research presents a novel secure architecture for a swarm of drones deployed on surveillance missions. Leveraging a reliable foundation established through Delaunay triangulation for communication among drones, this work introduces advanced security protocols to enhance the protection and integrity of the network. The architecture employs a mesh network topology connecting six drones, each configured for specific surveillance tasks, including perimeter monitoring, area scanning, thermal imaging, traffic observation, communication relay, and incident response. The mesh network design ensures extended coverage, redundancy, load balancing, and self-configuration, significantly improving reliability and resilience. Security validation was conducted using GNS3 and Ettercap, simulating various vulnerability scenarios. Comparative performance analysis between a classic drone network and the proposed secure mesh network demonstrates superior traffic management and robustness against potential attacks. The results underscore the architecture’s suitability for secure and reliable operations in critical surveillance environments.