期刊文献+
共找到1,579篇文章
< 1 2 79 >
每页显示 20 50 100
LSAP-IoHT:Lightweight Secure Authentication Protocol for the Internet of Healthcare Things
1
作者 Marwa Ahmim Nour Ouafi +3 位作者 Insaf Ullah Ahmed Ahmim Djalel Chefrour Reham Almukhlifi 《Computers, Materials & Continua》 2025年第12期5093-5116,共24页
The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’healt... The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’health conditions.However,the security of sensitive data exchanged within IoHT remains a major concern,as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities.Potential threats include unauthorized access,device compromise,data breaches,and data alteration,all of which may compromise the confidentiality and integrity of patient information.In this paper,we provide an in-depth security analysis of LAP-IoHT,an authentication scheme designed to ensure secure communication in Internet of Healthcare Things environments.This analysis reveals several vulnerabilities in the LAP-IoHT protocol,namely its inability to resist various attacks,including user impersonation and privileged insider threats.To address these issues,we introduce LSAP-IoHT,a secure and lightweight authentication protocol for the Internet of Healthcare Things(IoHT).This protocol leverages Elliptic Curve Cryptography(ECC),Physical Unclonable Functions(PUFs),and Three-Factor Authentication(3FA).Its security is validated through both informal analysis and formal verification using the Scyther tool and the Real-Or-Random(ROR)model.The results demonstrate strong resistance against man-in-the-middle(MITM)attacks,replay attacks,identity spoofing,stolen smart device attacks,and insider threats,while maintaining low computational and communication costs. 展开更多
关键词 internet of healthcare things(IoHT) authentication protocol CRYPTANALYSIS ATTACKS
在线阅读 下载PDF
MADCR:Mobility Aware Dynamic Clustering-Based Routing Protocol in Internet of Vehicles 被引量:9
2
作者 Sankar Sennan Somula Ramasubbareddy +3 位作者 Sathiyabhama Balasubramaniyam Anand Nayyar Chaker Abdelaziz Kerrache Muhammad Bilal 《China Communications》 SCIE CSCD 2021年第7期69-85,共17页
Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly d... Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly dynamic.Clustering is one of the promising solutions to maintain the route stability in the dynamic network.However,existing algorithms consume a considerable amount of time in the cluster head(CH)selection process.Thus,this study proposes a mobility aware dynamic clustering-based routing(MADCR)protocol in IoV to maximize the lifespan of networks and reduce the end-to-end delay of vehicles.The MADCR protocol consists of cluster formation and CH selection processes.A cluster is formed on the basis of Euclidean distance.The CH is then chosen using the mayfly optimization algorithm(MOA).The CH subsequently receives vehicle data and forwards such data to the Road Side Unit(RSU).The performance of the MADCR protocol is compared with that ofAnt Colony Optimization(ACO),Comprehensive Learning Particle Swarm Optimization(CLPSO),and Clustering Algorithm for Internet of Vehicles based on Dragonfly Optimizer(CAVDO).The proposed MADCR protocol decreases the end-toend delay by 5–80 ms and increases the packet delivery ratio by 5%–15%. 展开更多
关键词 clustering protocol internet of things internet of vehicles optimization algorithm Mayfly algorithm
在线阅读 下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:3
3
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching internet protocol Security Virtual Private Network Video Conferencing Voice over internet protocol JITTER End to End Delay
在线阅读 下载PDF
Implementation of Machine-to-Machine Solutions Using MQTT Protocol in Internet of Things (IoT) Environment to Improve Automation Process for Electrical Distribution Substations in Colombia 被引量:2
4
作者 Hermes Eslava Luis Alejandro Rojas Ramón Pereira 《Journal of Power and Energy Engineering》 2015年第4期92-96,共5页
In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost e... In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost electrical fault location, which contributes to improving quality of service, particularly by shortening interruption time spans in mid-voltage grids. The implementation makes use of MQTT protocol with an intensive use of Internet of things (IoT) environment which guarantees the following properties within the automation process: Advanced reports and statistics, remote command execution on one or more units (groups of units), detailed monitoring of remote units and custom alarm mechanism and firmware upgrade on one or more units (groups of units). This kind of implementation is the first one in Colombia and it is able to automatically recover from an N-1 fault. 展开更多
关键词 MACHINE to MACHINE Quality of Service Distribution Grids MQTT protocol internet of THINGS (IoT) ENVIRONMENT ELECTRICAL Energy
在线阅读 下载PDF
A survey on communication protocols and performance evaluations for Internet of Things 被引量:2
5
作者 Cüneyt Bayılmış MAli Ebleme +2 位作者 ÜnalÇavuşoğlu Kerem Küçük Abdullah Sevin 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1094-1104,共11页
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, I... The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT. 展开更多
关键词 internet of Things IoT application layer protocols IoT communicati on pr otocols Performance evaluation
在线阅读 下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
6
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
在线阅读 下载PDF
Testing and Analysis of VoIPv6 (Voice over Internet Protocol V6) Performance Using FreeBSD
7
作者 Asaad A. Abusin M. D. Jahangir Alam Junaidi Abdullah 《International Journal of Communications, Network and System Sciences》 2012年第5期298-302,共5页
This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current... This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current internet in order for it to cope with IPv6 traffic transmission requirements in general and specifically voice traffic, which is being attracting the efforts of research, bodes currently. These tests were conducted in the application level without looking into the network level of the network. VoIPv6 performance tests were conducted in the current tunneled and native IPv6 aiming for better end-to-end VoIPv6 performance. The results obtained in this study were shown in deferent codec's for different bit rates in Kilo bits per second, which act as an indicator for the better performance of G.711 compared with the rest of the tested codes. 展开更多
关键词 VoIPv6 (Voice over internet protocol V6) PERFORMANCE VOICE over internet protocol V6 PERFORMANCE TESTING VOICE over internet protocol V6 PERFORMANCE Analysis VoIPv6 Quality TESTING in the Application Level
在线阅读 下载PDF
LOA-RPL:Novel Energy-Efficient Routing Protocol for the Internet of Things Using Lion Optimization Algorithm to Maximize Network Lifetime
8
作者 Sankar Sennan Somula Ramasubbareddy +2 位作者 Anand Nayyar Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2021年第10期351-371,共21页
Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a c... Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a clustering protocol,the selection of a cluster head(CH)plays a key role in prolonging the lifetime of a network.However,most cluster-based protocols,including routing protocols for low-power and lossy networks(RPLs),have used fuzzy logic and probabilistic approaches to select the CH node.Consequently,early battery depletion is produced near the sink.To overcome this issue,a lion optimization algorithm(LOA)for selecting CH in RPL is proposed in this study.LOA-RPL comprises three processes:cluster formation,CH selection,and route establishment.A cluster is formed using the Euclidean distance.CH selection is performed using LOA.Route establishment is implemented using residual energy information.An extensive simulation is conducted in the network simulator ns-3 on various parameters,such as network lifetime,power consumption,packet delivery ratio(PDR),and throughput.The performance of LOA-RPL is also compared with those of RPL,fuzzy rule-based energyefficient clustering and immune-inspired routing(FEEC-IIR),and the routing scheme for IoT that uses shuffled frog-leaping optimization algorithm(RISARPL).The performance evaluation metrics used in this study are network lifetime,power consumption,PDR,and throughput.The proposed LOARPL increases network lifetime by 20%and PDR by 5%–10%compared with RPL,FEEC-IIR,and RISA-RPL.LOA-RPL is also highly energy-efficient compared with other similar routing protocols. 展开更多
关键词 internet of things cluster head clustering protocol optimization algorithm lion optimization algorithm network lifetime routing protocol wireless sensor networks energy consumption low-power and lossy networks
在线阅读 下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
9
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 internet control message protocol support vector machine covert tunnel network analysis
在线阅读 下载PDF
Internet Print Protocol——Internet也可共享打印机
10
作者 谢静 《在线》 2004年第3期49-51,共3页
在公司的局域网环境下办公,基于“网上邻居”的打印机共享解决方案应该每一个朋友都接触过。可是这种打印机的共享只能在“局域网”中实现,如果你想共享在Internet上的打印机,难道还必须通过VPN设备连接到公司网络再进行打印?答案是... 在公司的局域网环境下办公,基于“网上邻居”的打印机共享解决方案应该每一个朋友都接触过。可是这种打印机的共享只能在“局域网”中实现,如果你想共享在Internet上的打印机,难道还必须通过VPN设备连接到公司网络再进行打印?答案是否定的。 展开更多
关键词 internet PRINT protocol internet打印服务器 远程管理 客户端配置 服务器配置 IPP共享打印
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
11
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection internet of Things energyefficient communication protocols
在线阅读 下载PDF
基于嵌入式Internet的工业控制 被引量:45
12
作者 陶波 丁汉 熊有伦 《测控技术》 CSCD 2001年第8期5-9,共5页
嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本... 嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本文综述了现场总线控制网络、以太网和现场总线混合控制网络 ,提出了基于嵌入式Internet的控制网络模型 ,并从开放性、互连性、分散性的角度探讨了控制网络与Internet集成的发展趋势 。 展开更多
关键词 工业控制 嵌入式internet 远程监控 现场总线 传感器
在线阅读 下载PDF
一种Internet的网络用户行为分析方法的研究 被引量:22
13
作者 马力 焦李成 董富强 《微电子学与计算机》 CSCD 北大核心 2005年第7期124-126,共3页
文章在系统研究Internet的用户行为特征的基础上,从监测和分析的角度,给出了因特网用户行为的一种分类方式及表示方式。讨论了正常行为聚类研究的常用方法和异常行为的监测方法,设计了分布式的网络用户行为分析模型的体系结构,为网络用... 文章在系统研究Internet的用户行为特征的基础上,从监测和分析的角度,给出了因特网用户行为的一种分类方式及表示方式。讨论了正常行为聚类研究的常用方法和异常行为的监测方法,设计了分布式的网络用户行为分析模型的体系结构,为网络用户行为的自动发现提出了一种有效的解决途径。 展开更多
关键词 网络用户行为 行为分析模型 聚类 IP地址 WEB
在线阅读 下载PDF
Embedded Internet环境下TCP/IP协议簇的约简 被引量:6
14
作者 韩光洁 赵海 +2 位作者 王金东 林涛 王济勇 《小型微型计算机系统》 CSCD 北大核心 2004年第9期1602-1606,共5页
基于 Em bedded Internet技术下 ,为了实现非 Internet设备信息的共享和访问 ,作者对 TCP/ IP协议簇进行系统的研究 ,提出在设备中嵌入 thin TCP/ IP协议栈并使其能够实现与网络的透明互联 .对 TCP/ IP协议簇进行尽最大可能的约简而不... 基于 Em bedded Internet技术下 ,为了实现非 Internet设备信息的共享和访问 ,作者对 TCP/ IP协议簇进行系统的研究 ,提出在设备中嵌入 thin TCP/ IP协议栈并使其能够实现与网络的透明互联 .对 TCP/ IP协议簇进行尽最大可能的约简而不使其失去标准和相应的机制 ,从而可以利用 TCP/ IP协议在设备与 Internet之间建立通讯联系 ,真正把设备纳入到网络的管理范围 ,实现设备的网络化和智能化管理 .设备中嵌入 TCP/ 展开更多
关键词 EMBEDDED internet TCP/IP协议栈 嵌入式 约简
在线阅读 下载PDF
Internet综合服务模型和分类服务模型 被引量:4
15
作者 张占军 韩承德 杨学良 《计算机工程与应用》 CSCD 北大核心 2001年第4期21-22,111,共3页
文章介绍了未来Internet中存在的两种服务模型,综合服务(Int-Serv)和分类服务(Diff—Serv),并对它们进行了评价。
关键词 internet 综合服务 分类服务 多媒体 路由器
在线阅读 下载PDF
基于Internet/Intranet的电网继电保护及故障信息管理系统 被引量:55
16
作者 袁宇波 丁俊健 +3 位作者 陆于平 唐国庆 郭家银 浦南祯 《电力系统自动化》 EI CSCD 北大核心 2001年第17期39-42,共4页
为提高电网事故分析的水平及继电保护和故障录波器等设备的管理水平 ,提出了基于Internet/Intranet的电网继电保护及故障信息管理系统。该方案采用标准的保护通信协议及基于消息队列的传输平台 ,采用 Web的发布形式。最后对继电保护信... 为提高电网事故分析的水平及继电保护和故障录波器等设备的管理水平 ,提出了基于Internet/Intranet的电网继电保护及故障信息管理系统。该方案采用标准的保护通信协议及基于消息队列的传输平台 ,采用 Web的发布形式。最后对继电保护信息系统中的常规应用和高级应用如定值核对。 展开更多
关键词 继电保护 故障录波 internet 管理信息系统 INTRANET 电网 电力系统
在线阅读 下载PDF
基于Internet的VPN技术 被引量:10
17
作者 束坤 吴国新 《计算机应用》 CSCD 1999年第11期28-31,共4页
VPN 的组网方式为企业提供了一种低成本的网络基础设施,并增加了企业网络功能,扩大了其专用网的范围。本文首先介绍了VPN 的原理,然后介绍了几种基于Internet 组建VPN 的技术。最后探讨了VPN 的QoS
关键词 VPN internet 路由器 QOS
在线阅读 下载PDF
WInternet:从物网到物联网 被引量:33
18
作者 武建佳 赵伟 《计算机研究与发展》 EI CSCD 北大核心 2013年第6期1127-1134,共8页
近年来,物联网的发展受到了高度重视,学术界、工业界及政府对物联网的发展给予极大关注.物联网被认为是可以将数以亿计的物理对象连接起来,通过信息技术进行监测、分析和控制的网络,在延伸人类的感知控制能力方面潜力巨大.大量物联网研... 近年来,物联网的发展受到了高度重视,学术界、工业界及政府对物联网的发展给予极大关注.物联网被认为是可以将数以亿计的物理对象连接起来,通过信息技术进行监测、分析和控制的网络,在延伸人类的感知控制能力方面潜力巨大.大量物联网研究工作已经开展,许多物联网示范系统也被开发,并取得了显著应用效果.但同时,物联网当前的发展也面临着一些根本性的问题:物联网有什么特殊需求必须满足?当前物联网技术处于什么阶段?物联网的发展方向在哪里?这些问题值得探讨.本文回顾了互联网发展的历程,并根据互联网发展经验,分析物联网的现状,提出物联网当前处于"物-机"相连的局部小规模物网阶段,其发展方向应是相连众多小规模"物网"的开放大网——"物联网".基于这一思路,提出称之为WInternet的物联网设计,并介绍了其总体架构、工作模式和协议体系,同时也探讨了若干其他值得进一步研究的问题. 展开更多
关键词 物联网 Winternet 管道协议 网件计算
在线阅读 下载PDF
通用可组合安全的Internet密钥交换协议 被引量:3
19
作者 彭清泉 裴庆祺 +1 位作者 杨超 马建峰 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第4期714-720,共7页
通过对新一代Internet密钥交换协议(IKEv2)进行分析,指出了其初始交换过程中存在发起者身份暴露和认证失败问题.而在无线接入网络环境下,对发起者身份等敏感信息进行主动保护是十分必要的.提出了一种适用于无线网络环境下的Internet密... 通过对新一代Internet密钥交换协议(IKEv2)进行分析,指出了其初始交换过程中存在发起者身份暴露和认证失败问题.而在无线接入网络环境下,对发起者身份等敏感信息进行主动保护是十分必要的.提出了一种适用于无线网络环境下的Internet密钥交换协议,该协议让响应者显式地证明自己的真实身份,实现了对发起者主动身份保护.并通过重新构造认证载荷,有效防止了认证失败问题.在通用可组合安全模型下,证明了该协议达到了通用可组合安全.性能分析和仿真实验表明,该协议具有较少的计算量和通信量. 展开更多
关键词 internet协议安全 密钥交换 internet密钥交换协议 可证安全 通用可组合
在线阅读 下载PDF
嵌入式Internet中的协议选择 被引量:20
20
作者 王勇 陈抗生 《电信科学》 北大核心 2002年第4期15-17,共3页
如何实现TCP/IP协议是嵌入式Internet的关键技术之一 ,但TCP/IP协议族中的协议数量庞大 ,系统很难完全实现 ,合理地选择TCP/IP协议的子集进行实现对于嵌入式系统更具意义 ,基于这种思想 ,本文详细论述了协议子集的选择过程 。
关键词 嵌入式internet 通信协议 TCP/IP协议 计算机网络
在线阅读 下载PDF
上一页 1 2 79 下一页 到第
使用帮助 返回顶部