SRCV: A Source Routing based Consistency Verification Mechanism in SDN

Author(s):  
Jiqiang Xia ◽  
Pengshuai Cui ◽  
Ziyong Li ◽  
Julong Lan
2013 ◽  
Vol 24 (5) ◽  
pp. 1098-1110
Author(s):  
Yu-Xing SUN ◽  
Li XIE ◽  
Yi-Fei CHEN

2010 ◽  
Author(s):  
Bow-Nan Cheng ◽  
Randy Charland ◽  
Paul Christensen ◽  
Andrea Coyle ◽  
Edward Kuczynski ◽  
...  
Keyword(s):  

2019 ◽  
Vol 942 (12) ◽  
pp. 41-49
Author(s):  
A.M. Portnov

Using unified principles of formation and maintenance of register/cadaster with information about spatial data of landscape objects as the informational and technological basis for updating the public topographic maps and modernization of state cartographic system is proposed. The problems of informational relevancy of unified electronical cartographic basis and capacity of its renovation in case of public cadaster map data. The need to modernize the system of classification and coding of cartographic information, the use of unified standards for the coordinate description of register objects for their topological consistency, verification and updating is emphasized. Implementing such solutions is determined by economical expediency as well as necessity of providing a variety of real thematic data for wide range of consumers in the field of urban planning, territories development and completing the tasks of Governmental program “Digital economy of the Russian Federation”.


2020 ◽  
Vol 167 ◽  
pp. 106975 ◽  
Author(s):  
Cristina K. Dominicini ◽  
Gilmar L. Vassoler ◽  
Rodolfo Valentim ◽  
Rodolfo S. Villaca ◽  
Moisés R.N. Ribeiro ◽  
...  

Author(s):  
Ashutosh Srivastava ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

AbstractMobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.


Sign in / Sign up

Export Citation Format

Share Document