智能电表作为新型电力终端,在支持双向通信的基础上面临严峻的数据安全挑战。为解决通信安全问题,提出基于互联网协议第6版(Internet Protocol Version 6,IPv6)协议栈结构的智能电表双向通信安全机制,构建包括数据加密、身份认证、安全...智能电表作为新型电力终端,在支持双向通信的基础上面临严峻的数据安全挑战。为解决通信安全问题,提出基于互联网协议第6版(Internet Protocol Version 6,IPv6)协议栈结构的智能电表双向通信安全机制,构建包括数据加密、身份认证、安全协议设计以及完整性校验在内的多层安全体系。设计过程中引入轻量级加密算法与多因子认证逻辑,匹配智能电表资源受限特征,并实现安全模块在嵌入式环境下的集成部署。实验测试在IPv6仿真平台上完成,验证机制在数据传输安全性与系统性能间达成平衡。研究成果有助于推动智能配电终端的安全通信模型构建。展开更多
随着网络技术的持续演进,为满足日益增长的通信需求,急需对油气自控网络进行升级。基于虚拟交换实例(Virtual Switching Instance,VSI)/虚拟扩展局域网(Virtual eXtensible Local Area Network,VXLAN)隧道通信技术,开展网际互连协议第4...随着网络技术的持续演进,为满足日益增长的通信需求,急需对油气自控网络进行升级。基于虚拟交换实例(Virtual Switching Instance,VSI)/虚拟扩展局域网(Virtual eXtensible Local Area Network,VXLAN)隧道通信技术,开展网际互连协议第4版/网际互连协议第6版(Internet Protocol Version 4/Internet Protocol Version 6,IPv6)双栈部署与效能评估相关研究。通过确立双栈架构的设计原则与目标,构建分层网络架构,实现VSI/VXLAN隧道与IPv4/IPv6双栈架构的深度融合,完成核心网络设备与接入层网络的双栈部署,并实施安全域划分。基于多维度效能评估指标体系,采集多测点、多负载条件下的性能数据,量化评估网络的安全防护能力。实验结果表明,该方案可显著提升油气自控网络在协议兼容性、传输效率与安全性方面的综合性能,为其数字化升级提供理论支撑与实践路径。展开更多
当前互联网协议第6版(Internet Protocol Version 6,Ipv6)远程监控网络通信无法实现互联网协议第4版(Internet Protocol Version 4,Ipv4)地址与Ipv6地址的转换,且对网络状态要求较高,导致通信效率不理想。提出Ipv6远程监控网络无状态双...当前互联网协议第6版(Internet Protocol Version 6,Ipv6)远程监控网络通信无法实现互联网协议第4版(Internet Protocol Version 4,Ipv4)地址与Ipv6地址的转换,且对网络状态要求较高,导致通信效率不理想。提出Ipv6远程监控网络无状态双向通信方法。设计Ipv6网络与Ipv4互联网的地址映射规则,在代理服务器协议栈内引入支持Ipv4与Ipv6的双协议,实现同步访问权限。建立不同协议栈与目的机器的连接,采用代理服务器静态映射表完成Ipv4地址与Ipv6地址静态转换,根据代理服务器生成的socket对象,完成Ipv6网络的无状态双向通信。仿真结果表明,所提方法可有效实施双向通信,且与传统方法相比通信速率优势较为显著。展开更多
The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user no...The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user nodes. Mobility management in 4G networks is an issue that exists. The handover protocols for mobility management in 4G networks that currently exist, do not consider wireless signal degradation during handover operations. This paper introduces the Noise Resilient Reduced Registration Time Care of Mobile IP(NR RRTC:MIP) protocol for handover management. A handover decision algorithm based on the signal strength measured by the user nodes is considered in the NR RRTC: MIP protocol. A simulation study is discussed in the paper to evaluate the performance of the NR RRTC: MIP protocol. The results obtained from the simulation study prove that the NR RRTC: MIP protocol effectively reduces handover latencies and improves network performance.展开更多
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(...The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.展开更多
文摘智能电表作为新型电力终端,在支持双向通信的基础上面临严峻的数据安全挑战。为解决通信安全问题,提出基于互联网协议第6版(Internet Protocol Version 6,IPv6)协议栈结构的智能电表双向通信安全机制,构建包括数据加密、身份认证、安全协议设计以及完整性校验在内的多层安全体系。设计过程中引入轻量级加密算法与多因子认证逻辑,匹配智能电表资源受限特征,并实现安全模块在嵌入式环境下的集成部署。实验测试在IPv6仿真平台上完成,验证机制在数据传输安全性与系统性能间达成平衡。研究成果有助于推动智能配电终端的安全通信模型构建。
文摘随着网络技术的持续演进,为满足日益增长的通信需求,急需对油气自控网络进行升级。基于虚拟交换实例(Virtual Switching Instance,VSI)/虚拟扩展局域网(Virtual eXtensible Local Area Network,VXLAN)隧道通信技术,开展网际互连协议第4版/网际互连协议第6版(Internet Protocol Version 4/Internet Protocol Version 6,IPv6)双栈部署与效能评估相关研究。通过确立双栈架构的设计原则与目标,构建分层网络架构,实现VSI/VXLAN隧道与IPv4/IPv6双栈架构的深度融合,完成核心网络设备与接入层网络的双栈部署,并实施安全域划分。基于多维度效能评估指标体系,采集多测点、多负载条件下的性能数据,量化评估网络的安全防护能力。实验结果表明,该方案可显著提升油气自控网络在协议兼容性、传输效率与安全性方面的综合性能,为其数字化升级提供理论支撑与实践路径。
文摘当前互联网协议第6版(Internet Protocol Version 6,Ipv6)远程监控网络通信无法实现互联网协议第4版(Internet Protocol Version 4,Ipv4)地址与Ipv6地址的转换,且对网络状态要求较高,导致通信效率不理想。提出Ipv6远程监控网络无状态双向通信方法。设计Ipv6网络与Ipv4互联网的地址映射规则,在代理服务器协议栈内引入支持Ipv4与Ipv6的双协议,实现同步访问权限。建立不同协议栈与目的机器的连接,采用代理服务器静态映射表完成Ipv4地址与Ipv6地址静态转换,根据代理服务器生成的socket对象,完成Ipv6网络的无状态双向通信。仿真结果表明,所提方法可有效实施双向通信,且与传统方法相比通信速率优势较为显著。
基金the Special Research Fund for the Doctoral Program of Higher Education(No.20050248037)the National Natural Science Foundation of China(No.50779033)
文摘The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user nodes. Mobility management in 4G networks is an issue that exists. The handover protocols for mobility management in 4G networks that currently exist, do not consider wireless signal degradation during handover operations. This paper introduces the Noise Resilient Reduced Registration Time Care of Mobile IP(NR RRTC:MIP) protocol for handover management. A handover decision algorithm based on the signal strength measured by the user nodes is considered in the NR RRTC: MIP protocol. A simulation study is discussed in the paper to evaluate the performance of the NR RRTC: MIP protocol. The results obtained from the simulation study prove that the NR RRTC: MIP protocol effectively reduces handover latencies and improves network performance.
基金funded by the Deanship of Scientific Research at Najran University for this research through a Grant(NU/RG/SERC/12/50)under the Research Groups at Najran University,Saudi Arabia.
文摘The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.