router security defense technologies emerging in recent years could hardly detect and block the new booming threats with unknown signatures such as hardware Trojan, zero-day attacks, etc. We present a novel routerdef...
详细信息
router security defense technologies emerging in recent years could hardly detect and block the new booming threats with unknown signatures such as hardware Trojan, zero-day attacks, etc. We present a novel routerdefense technology, distributedrouter shadow, which builds a closed execution environment to deceive attacks entering into the router, thereby misleading the attackers into regarding it as the real attack target and executing the suspicious code to maximize the chances of detonating the system exploit; thus the original router is prevented from attacking and the suspicious code can be detected. Our experiment and analysis show that the router shadow can defend not only attacks with signature but also some new attacks without signature.
Towards line speed and accurateness on-line content popularity monitoring on Content Centric Networking(CCN) routers, we propose a three-stage scheme based on Bloom filters and hash tables fordifferentiated traffic. ...
详细信息
Towards line speed and accurateness on-line content popularity monitoring on Content Centric Networking(CCN) routers, we propose a three-stage scheme based on Bloom filters and hash tables fordifferentiated traffic. At the first stage, we decide whether to deliver the content to the next stage depending on traffic types. The second stage consisting of Standard Bloom filters(SBF) and Counting Bloom filters(CBF) identifies the popular content. Meanwhile, a scalable sliding time window based monitoring scheme fordifferent traffic types is proposed to implement frequent andreal-time updates by the change of popularities. Hash tables according with sliding window are used to record the popularity at the third stage. Simulation results reveal that this methodreaches a 40 Gbps processing speed at lower error probability with less memory, and it is more sensitive to the change of popularity. Additionally, the architecture which can be implemented in CCN router is flexible and scalable.
A simple design of broadband metamaterial absorber(MA) based on resistive film is numerically presented in this *** unit cell of this absorber is composed of crossedrectangularrings-shapedresistive film,dielectri...
详细信息
A simple design of broadband metamaterial absorber(MA) based on resistive film is numerically presented in this *** unit cell of this absorber is composed of crossedrectangularrings-shapedresistive film,dielectric substrate,and continuous metal *** simulatedresults indicate that the absorber obtains a 12.82-GHz-wide absorption from about 4.75 GHz to 17.57 GHz with absorptivity over 90% at normal *** of surface power loss density is illustrated to understand the intrinsic absorption mechanism of the *** proposed structure can work at wide polarization angles and wide angles of incidence for both transverse electric(TE) and transverse magnetic(TM) ***,the multi-reflection interference theory is involved to analyze and explain the broadband absorption mechanism at both normal and oblique ***,the polarization-insensitive feature is also investigated by using the interference *** is seen that the simulated and calculated absorption rates agree fairly well with each other for the absorber.
In this paper, the allocation of downlink channel resources in the indoor visible light multi cell network is studied. Based on the three color channels of rGB-LEd, a conflict graph model is established, and a downlin...
详细信息
In this paper, the allocation of downlink channel resources in the indoor visible light multi cell network is studied. Based on the three color channels of rGB-LEd, a conflict graph model is established, and a downlink channel allocation algorithm is proposed for visible light multi cell network. First, the global allocation of users’ access to the cell is given out. Then, considering the users’ business needs, a weighted conflict graph model is established, the channel allocation algorithm is proposed based on graph coloring and user traffic fairness. The simulation results show that, compared with the graph-baseddynamic allocation algorithm, the proposed algorithm is to improve the downlink communication fairness of users, and the average throughput of the whole network is improved at the same time.
This paper proposes a method to select multi-antenna signals based on SNr estimation, in order to solve the negative influence of the poor partial quality branch signals in multi-antenna system. The algorithm proposes...
详细信息
This paper proposes a method to select multi-antenna signals based on SNr estimation, in order to solve the negative influence of the poor partial quality branch signals in multi-antenna system. The algorithm proposes antenna selecting programs, based on the SNr estimation, the Cramerrao bound and the combined signal matched filtering, to avoid the branch poor signals and enhance the signal combine quality. Theoretical and simulation results show that the proposed algorithm has a better performance than the traditional method, and the performance of the algorithm is improved with the increase of the number of antennas and the difference of the signal quality.
As critical components in SdN,controllers are prone to suffer from a series of potential attacks which result in system *** prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-...
详细信息
As critical components in SdN,controllers are prone to suffer from a series of potential attacks which result in system *** prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an"associated"*** architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from *** this framework,flow rules distributed to switches are no longerrelying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow *** to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow *** mechanism avoids comparison between rules via bit by bit which is impractical among several *** analysis and simulation results demonstrates the effectiveness,availability andresilience of the proposed methods and their better security gain over general SdN architectures.
Considering the disadvantages of centralized algorithms and limitation of energy in wireless sensor networks (WSN), a distributed auction algorithm is proposed to realize the target tracking sensor management. The met...
详细信息
Considering the disadvantages of centralized algorithms and limitation of energy in wireless sensor networks (WSN), a distributed auction algorithm is proposed to realize the target tracking sensor management. The method introduces the auction theory in economics and adjusts the price of the sensorresources to solve the target-sensor assignment problem. In order to shorten the decision-making time and save the energy consumption, the CSMA mechanism is introduced and the decision-making can be completed with local information and a few interactions. The convergence and effectiveness of the algorithm are proved, and the simulation results show that the algorithm is superior.
In sparse fast Fourier transform algorithm, noise will increase the difficulty in frequency location. As to this problem, probability of detected frequency are analyzed with respect to noise level and bucket in this p...
详细信息
In sparse fast Fourier transform algorithm, noise will increase the difficulty in frequency location. As to this problem, probability of detected frequency are analyzed with respect to noise level and bucket in this paper. Firstly different mean and variance of compressed vector in frequency domain are derived under the hypothesis of whether there is a signal, then these statistical characteristics are used to analyze the impact of signal-to-noise ratio and number of point per bucket on detection probability of frequency. Finally, simulation curves is given under the conditions of different noise and bucket. Simulation shows that frequency of signal with additive white Gaussian noise could be effectively detected when SNr is higher than 10dB and number of point per bucket smaller than 2 12 . And in order to ensure effective detection of frequency, when SNrdecrease, number of point per bucket should be reduced. Through the analysis, this paper provides a theoretical support to enhance the reliability of the algorithm.
In this paper, we propose a novel approach called Wntiifs to infer the topology of CSMA/CA wireless network without the need to cooperate in the network ordecode the network’s messages. The approach divides rF frame...
详细信息
In this paper, we propose a novel approach called Wntiifs to infer the topology of CSMA/CA wireless network without the need to cooperate in the network ordecode the network’s messages. The approach divides rF frames observed into session atoms according to an inter frame space threshold, and ensures that a session atom consists only of frames transmitted by two nodes. Then, it extracts the link in each atom in different observation time window. Finally, it merges the links in different time window to reconstruct the complete network topology. Experimental results demonstrate that, compared with the existing wireless network topology inference algorithms, Wntiifs is of higher topology inference accuracy.
Aiming at the problem of failure recovery in current networks,a fast failure recovery method based on equivalent cooperative routing is ***,the transmission path between the source anddestination nodes is divided int...
详细信息
Aiming at the problem of failure recovery in current networks,a fast failure recovery method based on equivalent cooperative routing is ***,the transmission path between the source anddestination nodes is divided into several non-overlapping path ***,backup paths are deployed for each link in the path segment through segmentedrouting technology,which ensures fast routing recovery after ***,in order to avoiddamaging the QoS of the data stream through the failure recovery process,the transmission is guaranteed by the intersegment QoS *** experimental results show that the proposed method has a low failure recovery delay under a relatively small flow table cost.
暂无评论