[1]周 未,张 宏,李千目,等.赛博空间网络体系架构研究与设计[J].南京理工大学学报(自然科学版),2013,37(06):845-849.
 Zhou Wei,Zhang Hong,Li Qianmu,et al.Research and design of network architecture for cyberspace[J].Journal of Nanjing University of Science and Technology,2013,37(06):845-849.
点击复制

赛博空间网络体系架构研究与设计
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
37卷
期数:
2013年06期
页码:
845-849
栏目:
出版日期:
2013-12-31

文章信息/Info

Title:
Research and design of network architecture for cyberspace
作者:
周 未张 宏李千目郭 萍
南京理工大学 计算机科学与工程学院,江苏 南京 210094
Author(s):
Zhou WeiZhang HongLi QianmuGuo Ping
School of Computer Science and Engineering,NUST,Nanjing 210094,China
关键词:
赛博空间 网络 分层框架 协议模型 赛博节点
Keywords:
cyberspace networks multi-layer architecture protocol model Cybernodes
分类号:
TN915
摘要:
为了解决赛博空间(Cyberspace)的网络架构设计问题,该文研究了支持分层框架的赛博空间协议模型。在分析构建开放网络基础架构、网络合成和自我管理架构的基础上,利用协议模型的层间接口及各层组织方式保证了支持网络模块化功能的接口和网络层次。通过增强全域感知、全域到达、全域控制能力保证了所有类型的赛博节点(Cybernode)的通信质量和安全。对比结果表明该模型简化了层次间访问服务方式,使层的功能易于更新,减少了可能的通信代价。
Abstract:
To solve the problem of network architecture design of cyberspace,a cyberspace protocol model supporting multi-layer architecture is studied.Through analyzing the basic architecture of open networks,network synthesis and self-management architecture,the interface and the network level supporting network modular functionality are realized by using the interfaces between different layers of the protocol model.The communication qualities and safeties of all kinds of cybernodes are realized by enhancing the whole-area apperception,reach and control abilities.Comparison results show that the model proposed here simplifies the access service mode between levels,makes the layer functions easy to be updated,and reduces the possible cost of communication.

参考文献/References:

[1] Anish A,Prabal D,Sandp B,et al.A line in the sand:A wireless sensor network for target detection,classification and tracking[J].Computer Networks:The international Joumal of Distributed Informatique,2004,46(5):605-634.
[2]Luo Liqian,Abdelzaher T F,He Tian,et al.Stankovic:Design and comparison of lightweight group manage-ment strategies in envirosuite[A].DCOSS'05:International Conference on Distributed Computing in Sensor Networks[C].Marina del Rey,CA,USA:Springer,2005:155-172.
[3]Joseph H,Scherrer W,Grund C.A cyberspace command and control model[M].Montgomery,Alabama,USA:Air University Press,2009.
[4]周未,张宏,李千目,等.赛搏空间网络安全体系结构演化与设计方法探讨[J].无线互联科技,2011(6):3-5,9.
Zhou Wei,Zhang Hong,Li Qianmu,et al.The evaluation and design method of cyber space security architecture[J].Wireless Network Technology,2011(6):3-5,9.
[5]周未,张宏,李千目,等.“数字珍珠港”时代的到来:赛博网络空间简介[J].网络与信息,2011(10):38-39.
Zhou Wei,Zhang Hong,Li Qianmu,et al.The coming era of‘digital pearl harbour':Introduction of cyber space[J].Network and Information,2011(10):38-39.
[6]周未,张宏,李千目,等.浅谈赛博网络空间[J].计算机与信息技术,2011(10):36-37,40.
Zhou Wei,Zhang Hong,Li Qianmu,et al. Brief discussion on cyber space network[J].Computer and Information Techology,2011(10):36-37,40.
[7]Acs G,Butty'an L,Vajda I.The security proof of a link-state routing protocol for wireless sensor networks[A].IEEE International Conference on Mobile Adhoc and Sensor System(MASS)[C].Pisa,Italy:IEEE,2007.
[8]Li Ping,Lin Yaping,Zeng Weini.Search on security in sensor networks[J].Journal of Software,2006,17(12):2577-2588.
[9]王佳昊,秦志光,蓝天,等.一种改进的无线传感器网络随机密钥预分配算法[J].电子科技大学学报(自然科学版),2006,35(4):710-713.
Wang Jiahao,Qin Zhiguang,Lan Tian,et al.An improved random key predistribution scheme in wireless sensor network[J].Jounal of University of Eliectronic Science and Technology of China(Natural Science Edition),2006,35(4):710-713.
[10]陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报.2006,4(17):885-897.
Chen Xiuzhen,Zheng Qinghua,Guan Xiaohong,et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,17(4):885-897.
[11]张宏,贺也平,石志国.基于周期时间限制的自主访问控制委托模型[J].计算机学报,2006,8(29):1427-1437.
Zhang Hong,He Yeping,Shi Zhiguo.A delegation model for periodicity constraints based DAC[J].Chinese Journal of Computers,2006,8(29):1427-1437.
[12]Fabien A,Jean-Marie B.An application of the context transfer protocol:Ipsec in a IPv6 mobility environment[J].International Journal of Communication Networks and Distributed Systems,2008,1(1):110-126.

相似文献/References:

[1]陈洪,陈森发.基于模糊GMDH网络的交通流量预测模型[J].南京理工大学学报(自然科学版),2010,(01):46.
 CHEN Hong,CHEN Sen-fa.Model of Traffic Volume Forecasting Based on Fuzzy GMDH Network[J].Journal of Nanjing University of Science and Technology,2010,(06):46.

备注/Memo

备注/Memo:
收稿日期:2012-04-25 修回日期:2012-09-16
基金项目:国家自然科学基金(60903027)
作者简介:周未(1979-),男,博士生,主要研究方向:无线自组织网络、赛博空间网络架构、安全体系及关键技术等,E-mail:zhou_ziheng@126.com; 通讯作者:张宏(1956-),男,教授,博士生导师,主要研究方向:网络安全、数据库安全、 数据挖掘,E-mail:zhanghong@njust.edu.cn。
引文格式:周未,张宏,李千目,等.赛博空间网络体系架构研究与设计[J].南京理工大学学报,2013,37(6):845-849.
投稿网址:http://njlgdxxb.paperonce.org
更新日期/Last Update: 2013-12-31