Showing 1 - 20 results of 97 for search 'Secure Network Programming', query time: 0.09s Refine Results
  1. 1

    Provably secure biometric and PUF-based authentication for roaming service in global mobility network by E. Haodudin Nurkifli

    Published 2025-02-01
    “…In addition, the Programming Model Analysis (Scyther tool) confirmed that the proposed protocol meets security features and can withstand known attacks. …”
    Get full text
    Article
  2. 2
  3. 3

    Research on software-defined network and the security defense technology by Tao WANG, Hong-chang CHEN, Guo-zhen CHENG

    Published 2017-11-01
    “…Software-defined network (SDN) separated the traditional control plane from the data plane,formed a centralized controller,opened up the network programming interface,simplified network management,promoted network innovation and optimized network operation.However,SDN's “three-layer two-interface” architecture increased the network attack surface,resulting in many new security issues.The development,characteristics and working principle of SDN were first introduced,and the existing security problems from the application layer,the northbound interface,the control plane,the southbound interface,the data plane were summarized respectively.Secondly,the latest research progress and existing solutions were discussed.Finally,SDN current and future security challenges were summarized,and the future SDN security development direction was looked forward to.…”
    Get full text
    Article
  4. 4

    Equipment network management security of electrical power PTN by Yun LIU, Guojun LIU, Jianwei REN, Jian LI

    Published 2015-12-01
    “…In order to solve the problem that the power PTN equipment management system vulnerable to be attacked and vulnerability,the risk factors of electric power PTN equipment network management system were proposed based on the architecture of PTN equipment network management system.From the factors of economic,security and maintenance efficiency,the network deployment of equipment network management system based on MPLS-VPN power data communication network was proposed.The out-band and in-band DCN security deployment plan of province-level,city-level and country-level was put forward.Finally,the boundary security program was proposed for the interaction between the PTN equipment network management system and other systems.…”
    Get full text
    Article
  5. 5

    Coding-aware secure routing for multi-hop wireless networks by Xian GUO, Tao FENG, Zhan-ting YUAN

    Published 2012-06-01
    “…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
    Get full text
    Article
  6. 6
  7. 7

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  8. 8

    Identifying and Ranking Security Indicators in Online Social Networks with an MADM Technique by Hamed Fathi, Alireza Amini

    Published 2022-11-01
    “…For this purpose, a questionnaire with 24 items was distributed, and 262 samples were collected and analyzed.Findings: The results show that security indicators in online social networks in order of priority are implementing authentication and licensing mechanisms, using up-to-date software and avoiding suspicious programs, restricting personal information dissemination, monitoring to prevent unauthorized processing of information, compliance with standards the country's IT infrastructure, and the installing an intruder detection system. …”
    Get full text
    Article
  9. 9
  10. 10

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…This study introduces the working principle of the network security monitoring system, analyzes the key technologies involved in the system development process and network programming technology, gives the overall architecture of the system, and designs the processing flow of the monitoring function. …”
    Get full text
    Article
  11. 11

    Research on energy-efficient physical-layer secure transmission mechanism in decode-and-forward cooperative networks by Dong WANG, Yong-cheng LI, Bo BAI, Man-xi WANG

    Published 2017-01-01
    “…The maximization problem of secure energy efficiency (EE) in decode-and-forward relay networks was investigated considering the power and energy constraints in physical-layer secure transmission.An iterative algorithm for power allocation was proposed based on fractional programming and DC (difference of convex functions) programming.This algorithm jointly allocated power for source and relay nodes to achieve energy-efficient secure transmission,subject to the peak power constraint of each node and the minimum secrecy rate requirement of the system.Simulation results demonstrate that the propose algorithm can improve the secure EE significantly compared with the conventional secrecy rate maximization strategy.…”
    Get full text
    Article
  12. 12

    Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network by Yuehui CHEN, Miao HUANG

    Published 2016-05-01
    “…In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed.With elliptic curve cryptography and hash functions,random numbers were used to replace public key encryption and time stamp.Firstly,before using the roaming services of a foreign agent(FA),hash function was calculated.A host agent(HA)was used by mobile user to register.Then,authentication and session key were set up with elliptic curve encryption.If HA is always in FA,MU can update the session key with FA.Finally,through a common channel,MU could utilize HA to change their passwords.The analysis of the performance and safety shows that,compared with other similar programs,the proposed scheme has significantly improved efficiency and safety.And the virtual computing time is only 2.000 85 seconds,which sharply reduces the cost of computing.…”
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication by Bo LU, Yueming LU

    Published 2021-09-01
    “…Facing the demand of multi-domain security control in the integrated network of air and ground, to solve the problem that singleprocess regular matching restricts the performance of interconnected security gateway, the method of high-performance optimization of interconnected security control based on semantic security analysis of process communication was proposed.The interaction model of master-slave processes was described in a parallel programming language in the method.The state transition system semantics were given to accurately express the combined semantics of the master-slave processes.The security of master-slave processes in combinatorial semantics was analyzed, which ensured that the parallel running of processes had no deadlock and starvation, and was equivalent to the original regular matching.Experimental results showed that the proposed method could give full play to the advantages of multi-core hardware and reduced the context switching overhead of the scheduler.In the case of complex regular expressions, the method was an order of magnitude better than single-core running.…”
    Get full text
    Article
  16. 16

    Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN by Zhengyu ZHU, Gengwang HOU, Chongwen HUANG, Gangcan SUN, Wanming HAO, Jing LIANG

    Published 2022-03-01
    “…To meet the requirements of intelligent signal processing and physical layer security, aiming at the shortage of spectrum resources, a resource allocation algorithm for reconfigurable intelligent surface (RIS)-assisted the device to device (D2D) communication was proposed.D2D users communicated by multiplexing the spectrum resources of cellular users.Considering the constraints of D2D transmission rate, base station transmission power and RIS transmission phase shift, the problem of maximizing user security rate was formulated.To solve the nonlinear programming problem, a parallel convolutional neural network (CNN) algorithm was proposed to obtain the optimal resource allocation scheme.Simulation results show that the parallel CNN algorithm can effectively improve the secrecy rate and it is significantly better than other benchmark algorithms.…”
    Get full text
    Article
  17. 17
  18. 18

    Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning by Jiankun Sun, Xiong Luo, Weiping Wang, Yang Gao, Wenbing Zhao

    Published 2023-08-01
    “…In this study, motivated by the symmetric cross entropy with satisfactory noise robustness, the authors propose a robust Malware identification method using temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface function names. …”
    Get full text
    Article
  19. 19

    Defense mechanism of SDN application layer against DDoS attack based on API call management by Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU

    Published 2022-04-01
    “…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
    Get full text
    Article
  20. 20

    The Factor of Food in Biopolitics and National Security by S. A. Kravchenko

    Published 2014-12-01
    “…In a number of countries including Russia there appeared the problems of food security. The adopted national programs to address these challenges in a "world risk society" (U. …”
    Get full text
    Article