|Table of Contents|

Research and design of network architecture for cyberspace


Research Field:
Publishing date:


Research and design of network architecture for cyberspace
Zhou WeiZhang HongLi QianmuGuo Ping
School of Computer Science and Engineering,NUST,Nanjing 210094,China
cyberspace networks multi-layer architecture protocol model Cybernodes
To solve the problem of network architecture design of cyberspace,a cyberspace protocol model supporting multi-layer architecture is studied.Through analyzing the basic architecture of open networks,network synthesis and self-management architecture,the interface and the network level supporting network modular functionality are realized by using the interfaces between different layers of the protocol model.The communication qualities and safeties of all kinds of cybernodes are realized by enhancing the whole-area apperception,reach and control abilities.Comparison results show that the model proposed here simplifies the access service mode between levels,makes the layer functions easy to be updated,and reduces the possible cost of communication.


[1] Anish A,Prabal D,Sandp B,et al.A line in the sand:A wireless sensor network for target detection,classification and tracking[J].Computer Networks:The international Joumal of Distributed Informatique,2004,46(5):605-634.
[2]Luo Liqian,Abdelzaher T F,He Tian,et al.Stankovic:Design and comparison of lightweight group manage-ment strategies in envirosuite[A].DCOSS'05:International Conference on Distributed Computing in Sensor Networks[C].Marina del Rey,CA,USA:Springer,2005:155-172.
[3]Joseph H,Scherrer W,Grund C.A cyberspace command and control model[M].Montgomery,Alabama,USA:Air University Press,2009.
Zhou Wei,Zhang Hong,Li Qianmu,et al.The evaluation and design method of cyber space security architecture[J].Wireless Network Technology,2011(6):3-5,9.
Zhou Wei,Zhang Hong,Li Qianmu,et al.The coming era of‘digital pearl harbour':Introduction of cyber space[J].Network and Information,2011(10):38-39.
Zhou Wei,Zhang Hong,Li Qianmu,et al. Brief discussion on cyber space network[J].Computer and Information Techology,2011(10):36-37,40.
[7]Acs G,Butty'an L,Vajda I.The security proof of a link-state routing protocol for wireless sensor networks[A].IEEE International Conference on Mobile Adhoc and Sensor System(MASS)[C].Pisa,Italy:IEEE,2007.
[8]Li Ping,Lin Yaping,Zeng Weini.Search on security in sensor networks[J].Journal of Software,2006,17(12):2577-2588.
Wang Jiahao,Qin Zhiguang,Lan Tian,et al.An improved random key predistribution scheme in wireless sensor network[J].Jounal of University of Eliectronic Science and Technology of China(Natural Science Edition),2006,35(4):710-713.
Chen Xiuzhen,Zheng Qinghua,Guan Xiaohong,et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,17(4):885-897.
Zhang Hong,He Yeping,Shi Zhiguo.A delegation model for periodicity constraints based DAC[J].Chinese Journal of Computers,2006,8(29):1427-1437.
[12]Fabien A,Jean-Marie B.An application of the context transfer protocol:Ipsec in a IPv6 mobility environment[J].International Journal of Communication Networks and Distributed Systems,2008,1(1):110-126.


Last Update: 2013-12-31