Journal on Communications ›› 2022, Vol. 43 ›› Issue (4): 36-49.doi: 10.11959/j.issn.1000-436x.2022079
• Topics: Key Technologies of the Polymorphic Network Environment • Previous Articles Next Articles
Hongbin LUO1,2,3,4, Shan ZHANG1,2,3,4, Zhiyuan WANG1,4
Revised:
2022-03-22
Online:
2022-04-25
Published:
2022-04-01
Supported by:
CLC Number:
Hongbin LUO, Shan ZHANG, Zhiyuan WANG. Architecture and mechanisms for secure and efficient internetworking of heterogeneous network[J]. Journal on Communications, 2022, 43(4): 36-49.
[1] | CHERITON D R . Sirpent:a high-performance internetworking approach[J]. ACM SIGCOMM Computer Communication Review, 1989,19(4): 158-169. |
[2] | CLARK D D , TENNENHOUSE D L . Architectural considerations for a new generation of protocols[J]. ACM SIGCOMM Computer Communication Review, 1990,20(4): 200-208. |
[3] | TENNENHOUSE D L , WETHERALL D J . Towards an active network architecture[J]. ACM SIGCOMM Computer Communication Review, 1996,26(2): 5-17. |
[4] | CHERITON D . Triad[J]. ACM SIGOPS Operating Systems Review, 2000,34(2): 34. |
[5] | KOPONEN T , CHAWLA M , CHUN B G ,et al. A data-oriented (and beyond) network architecture[J]. ACM SIGCOMM Computer Communication Review, 2007,37(4): 181-192. |
[6] | JACOBSON V , SMETTERS D K , THORNTON J D ,et al. Networking named content[C]// Proceedings of the 5th International Conference on Emerging networking Experiments and Technologies. New York:ACM Press, 2009: 1-12. |
[7] | ZHANG L X , AFANASYEV A , BURKE J ,et al. Named data networking[J]. ACM SIGCOMM Computer Communication Review, 2014,44(3): 66-73. |
[8] | RAYCHAUDHURI D , NAGARAJA K , VENKATARAMANI A . MobilityFirst:a robust and trustworthy mobility-centric architecture for the future Internet[J]. ACM SIGMOBILE Mobile Computing and Communication Review, 2012,16(3): 2-13. |
[9] | NAYLOR D , MUKERJEE M K , AGYAPONG P ,et al. XIA:architecting a more trustworthy and evolvable Internet[J]. ACM SIGCOMM Computer Communication Review, 2014,44(3): 50-57. |
[10] | KOPONEN T , SHENKER S , BALAKRISHNAN H ,et al. Architecting for innovation[J]. ACM SIGCOMM Computer Communication Review, 2011,41(3): 24-36. |
[11] | PERRIG A , SZALACHOWSKI P , REISCHUK R M ,et al. SCION:a secure internet architecture[M]. Cham: Springer International Publishing, 2017. |
[12] | MCCAULEY J , HARCHOL Y , PANDA A ,et al. Enabling a permanent revolution in Internet architecture[C]// Proceedings of the ACM Special Interest Group on Data Communication. New York:ACM Press, 2019: 1-14. |
[13] | 张宏科, 苏伟 . 新网络体系基础研究:一体化网络与普适服务[J]. 电子学报, 2007,35(4): 593-598. |
ZHANG H K , SU W . Fundamental research on the architecture of new network—universal network and pervasive services[J]. Acta Electronica Sinica, 2007,35(4): 593-598. | |
[14] | HEGLAND A M , HAUGE M , HOLTZER A . Federating tactical edge networks:ways to improve connectivity,security,and network efficiency in tactical heterogeneous networks[J]. IEEE Communications Magazine, 2020,58(2): 72-78. |
[15] | NARAYAN S , ISHRAR S , KUMAR A ,et al. Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols[C]// Proceedings of 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN). Piscataway:IEEE Press, 2016: 1-7. |
[16] | CLARK D D . Designing an Internet[M]. Massachusetts: The MIT Press, 2018. |
[17] | LUO H B , CHEN Z , LI J W ,et al. Preventing distributed denial-of-service flooding attacks with dynamic path identifiers[J]. IEEE Transactions on Information Forensics and Security, 2017,12(8): 1801-1815. |
[18] | LUO H B , CHEN Z , LI J W ,et al. On the benefits of keeping path identifiers secret in future Internet:a DDoS perspective[J]. IEEE Transactions on Network and Service Management, 2018,15(2): 650-664. |
[19] | LUO H B , CUI J B , CHEN Z ,et al. Efficient integration of software defined networking and information-centric networking with CoLoR[C]// Proceedings of 2014 IEEE Global Communications Conference. Piscataway:IEEE Press, 2014: 1962-1967. |
[20] | LUO H B , CHEN Z , CUI J B ,et al. CoLoR:an information-centric Internet architecture for innovations[J]. IEEE Network, 2014,28(3): 4-10. |
[21] | 李红祎 . 基于 OMNeT++的 CoLoR 分组转发机制仿真与分析[D]. 北京:北京交通大学, 2019. |
LI H Y . OMNeT++-based simulation for packet forwarding mechanisms in CoLoR[D]. Beijing:Beijing Jiaotong University, 2019. | |
[22] | 张康宁 . 共生网络中数据跨域传输管控机制的设计与实现[D]. 北京:北京航空航天大学, 2021. |
ZHANG K N . Design and implementation of a control mechanism for data cross-domain transmission in CoLoR network[D]. Beijing:Beihang University, 2021. | |
[23] | 潘刚 . 智慧协同网络中边界路由器的设计与开发[D]. 北京:北京交通大学, 2018. |
PAN G . Design and development of the border router in SINET[D]. Beijing:Beijing Jiaotong University, 2018. | |
[24] | 温兴泵 . 服务标识通告和查找机制的设计与实现[D]. 北京:北京交通大学, 2018. |
WEN X B . Design and implementation of announcement and lookup mechanisms for service identifiers[D]. Beijing:Beijing Jiaotong University, 2018. | |
[25] | WEN X B , LUO H B , LIN Y . Interest forwarding in CoLoR:a baseline implementation and performance evaluation[C]// Proceedings of 2016 IEEE/CIC International Conference on Communications in China (ICCC). Piscataway:IEEE Press, 2016: 1-6. |
[26] | 刘洲彪 . 共生网络中的DDoS攻击检测与溯源机制研究与验证[D]. 北京:北京航空航天大学, 2020. |
LIU Z B . DDoS attack detection and traceback in CoLoR network:mechanism design and validation[D]. Beijing:Beihang University, 2020. | |
[27] | 陈哲 . 智慧协同网络基于路径标识的路由体系及安全性研究[D]. 北京:北京交通大学, 2016. |
CHEN Z . Research on path-identifier-based routing architecture and its security in smart identifier network[D]. Beijing:Beijing Jiaotong University, 2016. | |
[28] | LI J W , LUO H B , ZHANG S ,et al. Traffic engineering in information-centric networking:opportunities,solutions and challenges[J]. IEEE Communications Magazine, 2018,56(11): 124-130. |
[29] | LI J W , LUO H B , ZHANG S ,et al. Design and implementation of efficient control for incoming inter-domain traffic with information-centric networking[J]. Journal of Network and Computer Applications, 2019,133: 109-125. |
[30] | 李隽杰 . 基于共生网络的无人机集群路由机制设计与仿真[D]. 北京:北京航空航天大学, 2020. |
LI J J . CoLoR based routing mechanism for UAV swarm networking:design and simulation[D]. Beijing:Beihang University, 2020. | |
[31] | ZHANG M , LUO H B , ZHANG H K . A survey of caching mechanisms in information-centric networking[J]. IEEE Communications Surveys & Tutorials, 2015,17(3): 1473-1499. |
[32] | LUO H B , CHEN Z , CUI J B ,et al. An approach for efficient,accurate,and timely estimation of traffic matrices[C]// Proceedings of 2014 IEEE Conference on Computer Communications Workshops. Piscataway:IEEE Press, 2014: 67-72. |
[1] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[2] | Yuancheng LI, Yongtai QIN. Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform [J]. Journal on Communications, 2023, 44(5): 181-192. |
[3] | Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN. Intelligent planning method for cyber defense strategies based on bounded rationality [J]. Journal on Communications, 2023, 44(5): 52-63. |
[4] | Kaiju LI, Qiang XU, Hao WANG. Communication-efficient federated learning method via redundant data elimination [J]. Journal on Communications, 2023, 44(5): 79-93. |
[5] | Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG. Survey on rail transit mobile edge computing network security [J]. Journal on Communications, 2023, 44(4): 201-215. |
[6] | Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG. Study of SDN intrusion intent identification algorithm based on Bayesian attack graph [J]. Journal on Communications, 2023, 44(4): 216-225. |
[7] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[8] | Yi GUO, Yiqing WANG, Yuanyuan FAN, Gang LIU. OFDM transmission scheme with subcarrier supply index modulation [J]. Journal on Communications, 2023, 44(2): 104-111. |
[9] | Haiyan KANG, Molan LONG. Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Journal on Communications, 2023, 44(2): 122-135. |
[10] | Caixia LIU, Xinsheng JI, Jiangxing WU. Endogenous security common problems and solutions of the mobile communication networks [J]. Journal on Communications, 2022, 43(9): 70-79. |
[11] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
[12] | Zongxuan SHA, Ru HUO, Chuang SUN, Shuo WANG, Tao HUANG. Forwarding efficiency aware traffic scheduling algorithm based on deep reinforcement learning [J]. Journal on Communications, 2022, 43(8): 30-40. |
[13] | Shaoshuai FAN, Jianbo WU, Hui TIAN. Federated learning resource management for energy-constrained industrial IoT devices [J]. Journal on Communications, 2022, 43(8): 65-77. |
[14] | Runhua SHI, Hui YU, Weiyang KE, Xiaotong XU. Quantum anonymous one-vote veto protocol based on BB84 states [J]. Journal on Communications, 2022, 43(8): 109-120. |
[15] | Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA. Survey of capacity limits and implementation techniques in wireless covert communication [J]. Journal on Communications, 2022, 43(8): 203-218. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|