期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
1
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 Internet of Things IPv6 over low power wireless personal area networks Routing Protocol for Low-Power and Lossy networks Internet Protocol Version 6 distributed denial of service wireless sensor networks
下载PDF
Radio-Acoustic Integrated Network for Ocean Information Transmission:Framework and Enabling Technologies 被引量:4
2
作者 Fangjiong Chen Zilong Jiang +3 位作者 Fei Ji Hua Yu Quansheng Guan Feng Liu 《China Communications》 SCIE CSCD 2021年第9期62-70,共9页
An important vision of next generation mobile system is to provide global internet access.The Space-Terrestrial Integrated Network(STIN)has been proposed and intensively studied to tackle this challenge.Due to the sev... An important vision of next generation mobile system is to provide global internet access.The Space-Terrestrial Integrated Network(STIN)has been proposed and intensively studied to tackle this challenge.Due to the severe attenuation of radio signals in water,the STIN cannot be directly applied in underwater scenarios.In this paper we envision a framework of integrated radio-acoustic network arming at high-efficient data transmission in underwater scenarios,where acoustic signal is for underwater communication and radio signal is for surface and air communications.Since radio links have much higher data transmission rate and lower delay,in the integrated radio-acoustic network,the acoustic links easily become congested,at the same time the radio links are not fully utilized.We therefore propose that the integrated radio-acoustic network should be properly designed to minimize the hop count of acoustic links,as well as the signaling overhead in the acoustic subnetwork.We then present a novel network framework and the relative technologies to help moving the signaling overhead to the radio subnetwork. 展开更多
关键词 integrated network acoustic communication network protocols ocean engineering
下载PDF
Modeling and Simulation of P-Aloha,CSMA /CA and MACAW Protocols for Underwater Acoustic Channel 被引量:1
3
作者 DAO Van-phuong 左加阔 +3 位作者 赵力 NGUYEN Dang-nam 邹采荣 孙剑 《Journal of Donghua University(English Edition)》 EI CAS 2015年第1期35-40,共6页
Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks ... Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation. 展开更多
关键词 underwater acoustic channel OPNET simulation medium access control(MAC) protocol pure Aloha(P-Aloha) protocol carrier sense multiple access with collision avoidance(CSMA /CA) protocol multiple access collision avoidance for wireless local area network(MACAW) protocol
下载PDF
Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis
4
作者 Joo-Chan Lee Hyun-Pyo Choi +4 位作者 Jang-Hoon Kim Jun-Won Kim Da-Un Jung Ji-Ho Shin Jung-Taek Seo 《Computers, Materials & Continua》 SCIE EI 2020年第10期53-67,共15页
Cyberattacks on the Industrial Control System(ICS)have recently been increasing,made more intelligent by advancing technologies.As such,cybersecurity for such systems is attracting attention.As a core element of contr... Cyberattacks on the Industrial Control System(ICS)have recently been increasing,made more intelligent by advancing technologies.As such,cybersecurity for such systems is attracting attention.As a core element of control devices,the Programmable Logic Controller(PLC)in an ICS carries out on-site control over the ICS.A cyberattack on the PLC will cause damages on the overall ICS,with Stuxnet and Duqu as the most representative cases.Thus,cybersecurity for PLCs is considered essential,and many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of preemptive efforts against attacks.In this study,a vulnerability analysis was conducted on the XGB PLC.Security vulnerabilities were identified by analyzing the network protocols and memory structure of PLCs and were utilized to launch replay attack,memory modulation attack,and FTP/Web service account theft for the verification of the results.Based on the results,the attacks were proven to be able to cause the PLC to malfunction and disable it,and the identified vulnerabilities were defined. 展开更多
关键词 Industrial control system programmable logic controller CYBERSECURITY network protocol VULNERABILITY
下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
5
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems (INCSs),transport performance of different protocols and security breach from Internet side,are investigated. First,for improving the performance of d... Two significant issues in Internet-based networked control systems (INCSs),transport performance of different protocols and security breach from Internet side,are investigated. First,for improving the performance of data transmission,user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second,a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed,in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further,a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed,and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China,Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-freedom robot arm,an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS,which may cause more than 91% network throughput deduction,the new DCSTS protocol may yield results ten times better,being just 5.67%. 展开更多
关键词 Internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
下载PDF
S-MAC Protocol of Wireless Sensor Network
6
作者 Jiang Xue (Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2007年第3期44-47,共4页
Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Ac... Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Access Control (S-MAC) protocol improves energy efficiency and latency in the network. There are mainly two methods to enhance the S-MAC protocol: dynamic adjustment,and sending control and data packets under different transport conditions. For the wireless sensor network,it is not realistic to design one MAC protocol that meets all requirements of every aspect; however,it is possible to design corresponding protocols in accordance with different requirements by flexibly adopting different methods. 展开更多
关键词 MAC S-MAC Protocol of Wireless Sensor network NODE
下载PDF
IoT data analytic algorithms on edge-cloud infrastructure:A review
7
作者 Abel E.Edje M.S.Abd Latiff Weng Howe Chan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1486-1515,共30页
The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massiv... The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massive data stream to edge devices and the cloud for adequate storage and processing.This further leads to the challenges of data outliers,data redundancies,and cloud resource load balancing that would affect the execution and outcome of data streams.This paper presents a review of existing analytics algorithms deployed on IoT-enabled edge cloud infrastructure that resolved the challenges of data outliers,data redundancies,and cloud resource load balancing.The review highlights the problems solved,the results,the weaknesses of the existing algorithms,and the physical and virtual cloud storage servers for resource load balancing.In addition,it discusses the adoption of network protocols that govern the interaction between the three-layer architecture of IoT sensing devices enabled edge cloud and its prevailing challenges.A total of 72 algorithms covering the categories of classification,regression,clustering,deep learning,and optimization have been reviewed.The classification approach has been widely adopted to solve the problem of redundant data,while clustering and optimization approaches are more used for outlier detection and cloud resource allocation. 展开更多
关键词 Internet of things Cloud platform Edge Analytic algorithms Processes network communication protocols
下载PDF
Performance improvement of licklider transmission protocol in complex deep space networks based on parameter optimization
8
作者 Guo YU Zhenxing DONG Yan ZHU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第5期406-420,共15页
A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified sce... A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans. 展开更多
关键词 Complex deep space networks File delivery time model Licklider Transmission Protocol(LTP) network Performance network protocols Parameter optimization Performance improvement
原文传递
A Multi-Interface Remote Monitoring and Control System Architecture Based on Embedded Server 被引量:3
9
作者 He Liu Lei Wang +1 位作者 Sheng-Peng Sun Ya-Dong Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第6期67-76,共10页
This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen ... This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen as the CPU of the embedded server with a linux operation system( OS) environment. The embedded server provides multiple interfaces for supporting various application scenarios. The whole network is based on local area network and adopts the Browser / Server( B / S) model. The monitoring and control node is as a browser endpoint and the remote node with an embedded server is as a server endpoint. Users can easily acquire various sensors information through writing Internet protocol address of remote node on the computer browser. Compared with client / server( C / S) mode,B / S model needs less maintain and can be applicable to large user group. In addition,a simple network management protocol( SNMP) is used for management of devices in Internet protocol( IP) networks. The results of the demonstration experiment show that the proposed system gives good support to manage the network from different user terminals and allows the users to better interact with the ambient environment. 展开更多
关键词 MULTI-INTERFACE remote monitoring and control embedded server simple network management protocol(SNMP
下载PDF
无线传感网中轻型简单网络管理协议(英文) 被引量:2
10
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
下载PDF
GMPLS: IP-Centric Control Protocols for Optical Networks(Tutorial) 被引量:1
11
作者 Yaohui Jin Weisheng Hu (Shanghai Jiaotong University, Shanghai, 200030 P. R. China) 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期663-664,共2页
Recent advances in optical networking technologies, particularly DWDM and MEMS, promise the transmission and switching of huge bandwidth capacity. The carriers have convinced of that their revenue must be earned from ... Recent advances in optical networking technologies, particularly DWDM and MEMS, promise the transmission and switching of huge bandwidth capacity. The carriers have convinced of that their revenue must be earned from efficient bandwidth management instead of unsophisticated increase in capacity. The distributed control plane can offer more flexibility, reliability and scalability, whose functions include addressing, resource and topology discovery, route computation, provisioning and restoration. Genera... 展开更多
关键词 GMPLS for IP-Centric Control protocols for Optical networks TUTORIAL
原文传递
Internet of Things: Towards a Solid Ecosystem of Interconnected Things
12
作者 Mohamad Chakroun Jinane Sayah +1 位作者 Chadi Kallab Samir Haddad 《Advances in Internet of Things》 2022年第3期35-64,共30页
The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on character... The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on characterizing the many edges and technologies that make up an IoT system, the IoT ecosystem is still seen as too complex to be recognized as a stand-alone environment due to its significant diversity;hence, the objective of this research is to address such a complex environment in a way that highlights its components and distinguishes them both individually and in relation to their broader context. Therefore, the definition of IoT and its emergence were discussed and organized around the timeline of Internet development phases demonstrating that IoT has been a need that has accompanied the presence of the Internet since its early stages, and then its growth and impact were discussed and highlighted with estimates and numbers. On the technical side, each of the following groups, IoT components, protocols, and architectures, was defined, discussed, and grouped in such a way that their intergroup organization, as well as their placement and contribution to the overall ecosystem, was highlighted. This, in addition to the various examples mentioned throughout the discussion, will provide the reader with a better understanding of the Internet of Things and how deeply it has become entwined in our daily lives and routines as a result of its numerous applications. 展开更多
关键词 Internet of Things IoT Components IoT Architectures IoT Economic Impact IoT Growth networking protocols TCP/IP IoT protocols IoT Challenges IoT Attacks
下载PDF
Automatic discovery of stateful variables in network protocol software based on replay analysis
13
作者 Jianxin HUANG Bo YU +1 位作者 Runhao LIU Jinshu SU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第3期403-416,共14页
Network protocol software is usually characterized by complicated functions and a vast state space.In this type of program,a massive number of stateful variables that are used to represent the evolution of the states ... Network protocol software is usually characterized by complicated functions and a vast state space.In this type of program,a massive number of stateful variables that are used to represent the evolution of the states and store some information about the sessions are prone to potentialflaws caused by violations of protocol specification requirements and program logic.Discovering such variables is significant in discovering and exploiting vulnerabilities in protocol software,and still needs massive manual verifications.In this paper,we propose a novel method that could automatically discover the use of stateful variables in network protocol software.The core idea is that a stateful variable features information of the communication entities and the software states,so it will exist in the form of a global or static variable during program execution.Based on recording and replaying a protocol program’s execution,varieties of variables in the life cycle can be tracked with the technique of dynamic instrument.We draw up some rules from multiple dimensions by taking full advantage of the existing vulnerability knowledge to determine whether the data stored in critical memory areas have stateful characteristics.We also implement a prototype system that can discover stateful variables automatically and then perform it on nine programs in Pro FuzzBench and two complex real-world software programs.With the help of available open-source code,the evaluation results show that the average true positive rate(TPR)can reach 82%and the average precision can be approximately up to 96%. 展开更多
关键词 Stateful variables network protocol software Program analysis technology network security
原文传递
ICPFuzzer:proprietary communication protocol fuzzing by using machine learning and feedback strategies 被引量:2
14
作者 Pei-Yi Lin Chia-Wei Tien +1 位作者 Ting-Chun Huang Chin-Wei Tien 《Cybersecurity》 EI CSCD 2021年第1期427-441,共15页
The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards... The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety. 展开更多
关键词 Industrial communication protocol network protocol fuzzing Long short-term memory(LSTM) Industrial control system(ICS)
原文传递
The utilization of algorithms for cloud internet of things application domains:a review
15
作者 Edje E.ABEL Muhammad Shafie Abd LATIFF 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第3期137-163,共27页
Cloud internet of things(IoT)is an emerging technology that is already impelling the daily activities of our lives.However,the enormous resources(data and physical features of things)generated from Cloud-enabled IoT s... Cloud internet of things(IoT)is an emerging technology that is already impelling the daily activities of our lives.However,the enormous resources(data and physical features of things)generated from Cloud-enabled IoT sensing devices are lacking suitable managerial approaches.Existing research surveys on Cloud IoT mainly focused on its fundamentals,definitions and layered architecture as well as security challenges.Going by the current literature,none of the existing researches is yet to provide a detailed analysis on the approaches deployed to manage the heterogeneous and dynamic resource data generated by sensor devices in the cloud-enabled IoT paradigm.Hence,to bridge this gap,the existing algorithms designed to manage resource data on various CloudloT application domains are investigated and analyzed.The emergence of CloudloT,followed by previous related survey articles in this field,which motivated the current study is presented.Furthermore,the utilization of simulation environment,highlighting the programming languages and a brief description of the simulation pack-ages adopted to design and evaluate the performance of the algorithms are examined.The utilization of diverse network communication protocols and gateways to aid resource dissemina-tion in the cloud-enabled IoT network infrastructure are also discussed.The future work as discussed in previous researches,which pave the way for future research directions in this field is also presented,and ends with concluding remarks. 展开更多
关键词 internet of things sensing devices radio frequency identification network communication protocols GATEWAYS cloud platform
原文传递
A novel context-aware RPL algorithm based on a triangle module operator
16
作者 Yanan CAO Hao YUAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第12期1583-1597,共15页
For the use in low-power and lossy networks(LLNs)under complex and harsh communication conditions,the routing protocol for LLNs(RPL)standardized by the Internet Engineering Task Force is specially designed.To improve ... For the use in low-power and lossy networks(LLNs)under complex and harsh communication conditions,the routing protocol for LLNs(RPL)standardized by the Internet Engineering Task Force is specially designed.To improve the performance of LLNs,we propose a novel context-aware RPL algorithm based on a triangle module operator(CAR-TMO).A novel composite context-aware routing metric(CA-RM)is designed,which synchronously evaluates the residual energy index,buffer occupancy ratio of a node,expected transmission count(ETX),delay,and hop count from a candidate parent to the root.CA-RM considers the residual energy index and buffer occupancy ratio of the candidate parent and its preferred parent in a recursive manner to reduce the effect of upstream parents,since farther paths are considered.CA-RM comprehensively uses the sum,mean,and standard deviation values of ETX and delay of links in a path to ensure a better performance.Moreover,in CAR-TMO,the membership function of each routing metric is designed.Then,a comprehensive membership function is constructed based on a triangle module operator,the membership function of each routing metric,and a comprehensive context-aware objective function.A novel mechanism for calculating the node rank and the mechanisms for preferred parent selection are proposed.Finally,theoretical analysis and simulation results show that CAR-TMO outperforms several state-of-the-art RPL algorithms in terms of the packet delivery ratio and energy efficiency. 展开更多
关键词 Triangle module operator Membership function CONTEXT-AWARE Routing protocol for low-power and lossy networks(RPL) Routing metrics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部