Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to...Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.展开更多
Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DT...Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DTransfer),and reduction in end-to-end delay(D(E-E)).This paper explores the critical work of deploying SDN in large-scale Data Center Networks(DCNs)to enhance its Quality of Service(QoS)parameters,using logically distributed control configurations.There is a noticeable increase in Delay(E-E)when adopting SDN with a unified(single)control structure in big DCNs to handle Hypertext Transfer Protocol(HTTP)requests causing a reduction in network quality parameters(Bd(max),Th,DTransfer,D(E-E),etc.).This article examines the network performance in terms of quality matrices(bandwidth,throughput,data transfer,etc.),by establishing a large-scale SDN-based virtual network in the Mininet environment.The SDN network is simulated in three stages:(1)An SDN network with unitary controller-POX to manage the data traffic flow of the network without the server load management algorithm.(2)An SDN network with only one controller to manage the data traffic flow of the network with a server load management algorithm.(3)Deployment of SDN in proposed control arrangement(logically distributed controlled framework)with multiple controllers managing data traffic flow under the proposed Intelligent Sensing Server Load Management(ISSLM)algorithm.As a result of this approach,the network quality parameters in large-scale networks are enhanced.展开更多
The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate network...The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory.展开更多
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag...Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.展开更多
This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtu...This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system.展开更多
Objective Analyzing the nonlinear dynamics of the TCP-RED congestion control system is of great importance. This study will help investigate the loss of stability in Internet and design a proper method for controlling...Objective Analyzing the nonlinear dynamics of the TCP-RED congestion control system is of great importance. This study will help investigate the loss of stability in Internet and design a proper method for controlling bifurcation and chaos in such system. Methods Based on bifurcation diagram, the effect of parameter on system performance is discussed. By using the state feedback and parameter variation strategy, a simple real time control method is proposed to modify the existing RED scheme. Results With our control method, the parametric sensitivity of RED mechanism is attenuated. Moreover, a sufficient condition on the robust stability of the system is also derived to adjust the parameters in TCP-RED system. Conclusion The proposed method has the advantages of simple implementation and unnecessary knowledge of the exact system.展开更多
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning a...To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent.展开更多
A novel closed-loop feedback TCP/AQM(Transfer Control Protocol/Active Queue Management) model is proposed in this paper using a discrete-time Markov chain,and a way to calculate the equilibrium distribution of this mo...A novel closed-loop feedback TCP/AQM(Transfer Control Protocol/Active Queue Management) model is proposed in this paper using a discrete-time Markov chain,and a way to calculate the equilibrium distribution of this model is given.In the model,system time is divided into time slots,the bottleneck router queue model and TCP window size model in each slot are analyzed.Finally,by combining adjacent slots,an integrated TCP/AQM analytical model is developed.By this model,the average values of packets dropping ratio and queue length in the router and TCP sending rate can be estimated,hence,this model could be a useful tool for the analysis of AQMs and support the development of new AQM schemes theoretically.The proposed TCP/AQM model is extended to a TCP-UDP(Control User Datagram Protocol)/AQM model,to analyze the TCP/AQM system performance when UDP flows exist.By implementing this model on Matlab,we compare its solutions to NS2 simulated solutions,then the validity of the model to analyze the closed-loop feedback TCP/RED(Random Early Detection) system is verified.展开更多
For improving Transfer Control Protocol (TCP) performance in mobile environment,smooth handover with buffer management has been proposed to realize seamless handovers. However in our simulation, even if smooth handove...For improving Transfer Control Protocol (TCP) performance in mobile environment,smooth handover with buffer management has been proposed to realize seamless handovers. However in our simulation, even if smooth handover in Mobile IPv6 (MIPv6) is implemented, TCP can not always achieve better performance due to packets forwarding burst. Based on the study of buffer management for smooth handover, this paper proposes an enhanced buffer management scheme for smooth handover to improve TCP performance. In this scheme, a packet-pair probing technology is adopted to estimate the available bandwidth of the new path from Previous router (Prtr) to Mobile Node (MN), which will be used by Prtr to control the buffered packets forwarding. The simulation results demonstrate that smooth handover with this scheme can achieve better TCP performance than the original scheme.展开更多
A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg e...A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO.展开更多
To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-...To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-based approach rather than server or client logs. Packet traces surpass others in the amount of information contained. Quantitative analyses show that different categories of web pages have different complexity characteristics. Experimental results show that a news web page usually loads much more elements at more accessing levels from much more web servers within diverse administrative domains over much more concurrent transmission control protocol (TCP) flows. About more than half of education pages each only involve a few logical servers, where most of elements of a web page are fetched only from one or two logical servers. The number of content types for web game traffic after login is usually least. The system can help web page designers to design more efficient web pages, and help researchers or Internet users to know communication details.展开更多
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)
文摘Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.
文摘Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DTransfer),and reduction in end-to-end delay(D(E-E)).This paper explores the critical work of deploying SDN in large-scale Data Center Networks(DCNs)to enhance its Quality of Service(QoS)parameters,using logically distributed control configurations.There is a noticeable increase in Delay(E-E)when adopting SDN with a unified(single)control structure in big DCNs to handle Hypertext Transfer Protocol(HTTP)requests causing a reduction in network quality parameters(Bd(max),Th,DTransfer,D(E-E),etc.).This article examines the network performance in terms of quality matrices(bandwidth,throughput,data transfer,etc.),by establishing a large-scale SDN-based virtual network in the Mininet environment.The SDN network is simulated in three stages:(1)An SDN network with unitary controller-POX to manage the data traffic flow of the network without the server load management algorithm.(2)An SDN network with only one controller to manage the data traffic flow of the network with a server load management algorithm.(3)Deployment of SDN in proposed control arrangement(logically distributed controlled framework)with multiple controllers managing data traffic flow under the proposed Intelligent Sensing Server Load Management(ISSLM)algorithm.As a result of this approach,the network quality parameters in large-scale networks are enhanced.
基金The National Natural Science Foundation of China(No60573133)the National Basic Research Program of China (973Program) (No2003CB314801)
文摘The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory.
基金supported by the 863 project (Grant No. 2014AA01A701) Beijing Natural Science Foundation (Grant No. 4152047)
文摘Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.
文摘This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system.
文摘Objective Analyzing the nonlinear dynamics of the TCP-RED congestion control system is of great importance. This study will help investigate the loss of stability in Internet and design a proper method for controlling bifurcation and chaos in such system. Methods Based on bifurcation diagram, the effect of parameter on system performance is discussed. By using the state feedback and parameter variation strategy, a simple real time control method is proposed to modify the existing RED scheme. Results With our control method, the parametric sensitivity of RED mechanism is attenuated. Moreover, a sufficient condition on the robust stability of the system is also derived to adjust the parameters in TCP-RED system. Conclusion The proposed method has the advantages of simple implementation and unnecessary knowledge of the exact system.
文摘To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent.
基金Supported by the National Natural Science Foundation of China (No.60572093)Specialized Research Fund for the Doctoral Program of Higher Education (20050004016) of China
文摘A novel closed-loop feedback TCP/AQM(Transfer Control Protocol/Active Queue Management) model is proposed in this paper using a discrete-time Markov chain,and a way to calculate the equilibrium distribution of this model is given.In the model,system time is divided into time slots,the bottleneck router queue model and TCP window size model in each slot are analyzed.Finally,by combining adjacent slots,an integrated TCP/AQM analytical model is developed.By this model,the average values of packets dropping ratio and queue length in the router and TCP sending rate can be estimated,hence,this model could be a useful tool for the analysis of AQMs and support the development of new AQM schemes theoretically.The proposed TCP/AQM model is extended to a TCP-UDP(Control User Datagram Protocol)/AQM model,to analyze the TCP/AQM system performance when UDP flows exist.By implementing this model on Matlab,we compare its solutions to NS2 simulated solutions,then the validity of the model to analyze the closed-loop feedback TCP/RED(Random Early Detection) system is verified.
文摘For improving Transfer Control Protocol (TCP) performance in mobile environment,smooth handover with buffer management has been proposed to realize seamless handovers. However in our simulation, even if smooth handover in Mobile IPv6 (MIPv6) is implemented, TCP can not always achieve better performance due to packets forwarding burst. Based on the study of buffer management for smooth handover, this paper proposes an enhanced buffer management scheme for smooth handover to improve TCP performance. In this scheme, a packet-pair probing technology is adopted to estimate the available bandwidth of the new path from Previous router (Prtr) to Mobile Node (MN), which will be used by Prtr to control the buffered packets forwarding. The simulation results demonstrate that smooth handover with this scheme can achieve better TCP performance than the original scheme.
基金supported by Opening Project of State Key Laboratory of Cryptology, Scientific Research and Postgraduate Training Cooperation Project-Scientific Research Base-New Theory of Block Cipher and Obfuscation and their Application Research, and Information Management and Professional Building of Information System
文摘A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO.
基金supported by the Open Research Program of the Key Laboratory of Computer Network and Information Integration(Southeast University),Ministry of Education(K93-9-2014-04B)the National Natural Science Foundation of China(61170322,61572263,61302157)
文摘To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-based approach rather than server or client logs. Packet traces surpass others in the amount of information contained. Quantitative analyses show that different categories of web pages have different complexity characteristics. Experimental results show that a news web page usually loads much more elements at more accessing levels from much more web servers within diverse administrative domains over much more concurrent transmission control protocol (TCP) flows. About more than half of education pages each only involve a few logical servers, where most of elements of a web page are fetched only from one or two logical servers. The number of content types for web game traffic after login is usually least. The system can help web page designers to design more efficient web pages, and help researchers or Internet users to know communication details.