scholarly journals Analysis on the Security of Satellite Internet

Author(s):  
Huan Cao ◽  
Lili Wu ◽  
Yue Chen ◽  
Yongtao Su ◽  
Zhengchao Lei ◽  
...  

AbstractSatellite Internet (SI) is a new way to provide internet access all over the world. It will bring great convenience to international communication. Compared with the traditional communication networks, SI has a significant change in network architecture and communication model, which will have an important impact on national information network security. For example, the global interconnected SI consists of a large number of small satellites and each satellite has multi-beams to cover a vast area, which leads to the disorderly flow of information across the border, and greatly increases the difficulty of network protection. Therefore, it is necessary to closely track the development of SI and analyze security problems brought by SI. In this paper, we analyze the security risks of SI from the perspective of national security, network security and equipment security, and thirteen security issues have been summarized to provide reference for the healthy development of SI industry.

2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Muhammad Muzamil Aslam ◽  
Liping Du ◽  
Xiaoyan Zhang ◽  
Yueyun Chen ◽  
Zahoor Ahmed ◽  
...  

Recently, 5G installation has been started globally. Different capabilities are in the consistent procedure, like ultrareliability, mass connectivity, and specific low latency. Though, 5G is insufficient to meet all the necessities of the future technology in 2030 and so on. Next generation information and communication technology is playing an important role in attraction of researchers, industries, and technical people. With respect to 5G networks, sixth-generation (6G) CR networks are anticipated to familiarize innovative use cases and performance metrics, such as to offer worldwide coverage, cost efficiency, enhanced spectral, energy improved intelligence, and safety. To reach such requirements, upcoming 6G CRNs will trust novel empowering technologies. Innovative network architecture and transmission technologies and air interface are of excessive position, like multiple accesses, waveform design, multiantenna technologies, and channel coding schemes. (1) To content, the condition should be of worldwide coverage, there will be no limit on 6G to global CR communication networks that may require to be completed with broadcast networks, like satellite communication networks, therefore, attaining a sea integrated communication network. (2) The spectrums overall will be entirely travelled to the supplementary rise connection density data rates in optical frequency bands, millimeter wave (mmWave), sub-6 GHz, and terahertz (THz). (3) To see big datasets created because of tremendously varied CR communication networks, antenna rush, diverse communication scenarios, new provision necessities, wide bandwidth, and 6G CRNs will allow an innovative variety of intelligent applications with the assistance of big data and AI technologies. (4) Need to improve network security when deploying 6G technology in CR networks. 6G is decentralized, intended, intelligent innovative, and distributed network. In this article, we studied a survey of current developments and upcoming trends. We studied the predicted applications, possible technologies, and security issues for 6G CR network communication. We also discussed predicted future key challenges in 6G.


Legacy networks which were discovered in 1970’s suited better for olden day’s communication model where the network is host centric, but nowadays expectations from communication networks is changing and it is shifting from host centric to data centric. To suit recent expectations there is need of revolution in communication networks; Information Centric Network (ICN) is a new kind of network architecture evolving for future internet. This article introduces ICN and its prominent features and reviews the work done post architectural approaches in the areas of routing, transport and security specifically.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2021 ◽  
Vol 14 (2) ◽  
pp. 268-277
Author(s):  
Etza nofarita

Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.


Author(s):  
Ibraim Didmanidze ◽  
Zebur Beridze ◽  
Vladimir Zaslavski

In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.  


Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


Sign in / Sign up

Export Citation Format

Share Document