Research on Satellite Network Security Mechanism Based on BlockChain Technology

Author(s):  
Chengjie Li ◽  
Lidong Zhu ◽  
Michele Luglio ◽  
Zhongqiang Luo ◽  
Zhen Zhang
2014 ◽  
Vol 926-930 ◽  
pp. 2434-2437
Author(s):  
Jin Meng ◽  
Yu Yang Du ◽  
Xiao Zhang

IPV6 is the next generation networking protocol. It can provide more address space than IPV4 and more secure service. This paper studies the technical features of the IPv6 protocol, discusses IPv6 network security mechanisms.


Author(s):  
Hoseong Jeon ◽  
Min Young Chung ◽  
Jaehyoun Kim ◽  
Hyunseung Choo

Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2110
Author(s):  
Desire Ngabo ◽  
Dong Wang ◽  
Celestine Iwendi ◽  
Joseph Henry Anajemba ◽  
Lukman Adewale Ajao ◽  
...  

The recent developments in fog computing architecture and cloud of things (CoT) technology includes data mining management and artificial intelligence operations. However, one of the major challenges of this model is vulnerability to security threats and cyber-attacks against the fog computing layers. In such a scenario, each of the layers are susceptible to different intimidations, including the sensed data (edge layer), computing and processing of data (fog (layer), and storage and management for public users (cloud). The conventional data storage and security mechanisms that are currently in use appear to not be suitable for such a huge amount of generated data in the fog computing architecture. Thus, the major focus of this research is to provide security countermeasures against medical data mining threats, which are generated from the sensing layer (a human wearable device) and storage of data in the cloud database of internet of things (IoT). Therefore, we propose a public-permissioned blockchain security mechanism using elliptic curve crypto (ECC) digital signature that that supports a distributed ledger database (server) to provide an immutable security solution, transaction transparency and prevent the patient records tampering at the IoTs fog layer. The blockchain technology approach also helps to mitigate these issues of latency, centralization, and scalability in the fog model.


2014 ◽  
Vol 530-531 ◽  
pp. 773-776
Author(s):  
Xin Min Wu ◽  
Hao Shu Wu

First, as the 4G network, the introduction of IPv6 network layer security mechanism, security is enhanced at the same time, IPv6 security mechanism applied to the 4G network system security as well as new demands and challenges, followed by the core network based on IPv6 network security to face the next 4G threats and security problems, concludes with IPv6 technical analysis and 4G network defense and countermeasures.


2013 ◽  
Vol 475-476 ◽  
pp. 817-823
Author(s):  
Chun Dong She

The traditional hierarchical network architecture has the defect of redundancy and no interaction between the layers. These defects have bad impact on QoS and network security. Hierarchical network protocols is difficult to be used to satellite network. Component-based network architecture is proposed for eliminating of hierarchical network design flaws. Network protocols will be divided according to the function for forming of low coupling functional components. It provides high quality services to the application using combined components.


Sign in / Sign up

Export Citation Format

Share Document