|Table of Contents|

Research and design of network architecture for cyberspace

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2013年06期
Page:
845-849
Research Field:
Publishing date:

Info

Title:
Research and design of network architecture for cyberspace
Author(s):
Zhou WeiZhang HongLi QianmuGuo Ping
School of Computer Science and Engineering,NUST,Nanjing 210094,China
Keywords:
cyberspace networks multi-layer architecture protocol model Cybernodes
PACS:
TN915
DOI:
-
Abstract:
To solve the problem of network architecture design of cyberspace,a cyberspace protocol model supporting multi-layer architecture is studied.Through analyzing the basic architecture of open networks,network synthesis and self-management architecture,the interface and the network level supporting network modular functionality are realized by using the interfaces between different layers of the protocol model.The communication qualities and safeties of all kinds of cybernodes are realized by enhancing the whole-area apperception,reach and control abilities.Comparison results show that the model proposed here simplifies the access service mode between levels,makes the layer functions easy to be updated,and reduces the possible cost of communication.

References:

[1] Anish A,Prabal D,Sandp B,et al.A line in the sand:A wireless sensor network for target detection,classification and tracking[J].Computer Networks:The international Joumal of Distributed Informatique,2004,46(5):605-634.
[2]Luo Liqian,Abdelzaher T F,He Tian,et al.Stankovic:Design and comparison of lightweight group manage-ment strategies in envirosuite[A].DCOSS'05:International Conference on Distributed Computing in Sensor Networks[C].Marina del Rey,CA,USA:Springer,2005:155-172.
[3]Joseph H,Scherrer W,Grund C.A cyberspace command and control model[M].Montgomery,Alabama,USA:Air University Press,2009.
[4]周未,张宏,李千目,等.赛搏空间网络安全体系结构演化与设计方法探讨[J].无线互联科技,2011(6):3-5,9.
Zhou Wei,Zhang Hong,Li Qianmu,et al.The evaluation and design method of cyber space security architecture[J].Wireless Network Technology,2011(6):3-5,9.
[5]周未,张宏,李千目,等.“数字珍珠港”时代的到来:赛博网络空间简介[J].网络与信息,2011(10):38-39.
Zhou Wei,Zhang Hong,Li Qianmu,et al.The coming era of‘digital pearl harbour':Introduction of cyber space[J].Network and Information,2011(10):38-39.
[6]周未,张宏,李千目,等.浅谈赛博网络空间[J].计算机与信息技术,2011(10):36-37,40.
Zhou Wei,Zhang Hong,Li Qianmu,et al. Brief discussion on cyber space network[J].Computer and Information Techology,2011(10):36-37,40.
[7]Acs G,Butty'an L,Vajda I.The security proof of a link-state routing protocol for wireless sensor networks[A].IEEE International Conference on Mobile Adhoc and Sensor System(MASS)[C].Pisa,Italy:IEEE,2007.
[8]Li Ping,Lin Yaping,Zeng Weini.Search on security in sensor networks[J].Journal of Software,2006,17(12):2577-2588.
[9]王佳昊,秦志光,蓝天,等.一种改进的无线传感器网络随机密钥预分配算法[J].电子科技大学学报(自然科学版),2006,35(4):710-713.
Wang Jiahao,Qin Zhiguang,Lan Tian,et al.An improved random key predistribution scheme in wireless sensor network[J].Jounal of University of Eliectronic Science and Technology of China(Natural Science Edition),2006,35(4):710-713.
[10]陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报.2006,4(17):885-897.
Chen Xiuzhen,Zheng Qinghua,Guan Xiaohong,et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,17(4):885-897.
[11]张宏,贺也平,石志国.基于周期时间限制的自主访问控制委托模型[J].计算机学报,2006,8(29):1427-1437.
Zhang Hong,He Yeping,Shi Zhiguo.A delegation model for periodicity constraints based DAC[J].Chinese Journal of Computers,2006,8(29):1427-1437.
[12]Fabien A,Jean-Marie B.An application of the context transfer protocol:Ipsec in a IPv6 mobility environment[J].International Journal of Communication Networks and Distributed Systems,2008,1(1):110-126.

Memo

Memo:
-
Last Update: 2013-12-31