network protocol
Recently Published Documents


TOTAL DOCUMENTS

674
(FIVE YEARS 107)

H-INDEX

24
(FIVE YEARS 4)

Author(s):  
Andréa da Silva Pereira ◽  
Arthur Reys Carvalho de Oliveira ◽  
Pedro F. G. Silvino ◽  
Moises Bastos-Neto ◽  
Sebastião M. P. Lucena

2022 ◽  
Vol 2022 ◽  
pp. 1-11
Author(s):  
Yue Zhao

Based on the principle of cluster wireless sensor network, this article introduces typical routing protocols in wireless sensors, and wireless sensor network protocol in detail analyzes their advantages and disadvantages and addresses their shortcomings. First, in the clustering network, a uniform clustering protocol with multiple hops in the circular network is proposed. The circular network is divided into rings of equal width, and clusters of equal size are set on different rings. Secondly, the ordinary nodes on each layer of the ring send the collected data to the auxiliary intelligent nodes in the cluster in a single-hop manner, and the auxiliary intelligent nodes located on the outer ring transfer the data to the auxiliary intelligent nodes located on the adjacent inner ring. Finally, on the basis of studying the clustering network protocol, this paper proposes a new clustering routing algorithm, a multihop adaptive clustering routing algorithm. The simulation results show that the algorithm can effectively extend the life of the network, save network energy consumption, and achieve network load balance. At the same time, the initial energy of the auxiliary intelligent node is set according to the energy consumption of the ordinary node and the relative distance between the auxiliary intelligent node and the base station on each layer of the ring. The theoretical and simulation results prove that, compared with the clustered network and auxiliary intelligent nodes, the clustered network can extend the life of the network.


2021 ◽  
Vol 13 (1) ◽  
pp. 14
Author(s):  
Muhammad Yusuf Bagus Rasyiidin ◽  
Fachroni Arbi Murad ◽  
Fachroni Arbi Murad

Abstract - SNMP is a network protocol used for monitoring network devices, especially servers, which allows senders and recipients to exchange information. With SNMP all device activities can be monitored using several additions available on Linux operating systems namely apache, PHP, SNMP, MySQL, and Cacti. Server monitoring is needed to find and solve some problems on a network that has many devices, aiming to monitor all network devices using Cacti. A problem that often occurs on a network is a slow connection and disconnected, with the presence of Cacti a network administrator can identify problems and fix them.


2021 ◽  
Vol 2132 (1) ◽  
pp. 012022
Author(s):  
Siqi Lu ◽  
Qingdi Han ◽  
Xuyang Miao ◽  
Yubo Liu

Abstract Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol become particularly important. In this paper, firstly, we introduce SmartVerif, which is the first formal analysis tool to automatically verify the security of protocols through dynamic strategies. And then, we use SmartVerif to verify the pseudo-randomness of the encapsulated key of the Two-Pass AKE protocol, which was proposed by Liu’s in ASIACRYPT in 2020. Finally, we summary our work and show some limitations of SmartVerif. At the same time, we also point out the direction for future improvement of SmartVerif.


Author(s):  
Jianping Fan ◽  
Huaying Lan ◽  
Wenfeng Ning ◽  
Rongzhen Zhong ◽  
Feng Chen ◽  
...  

Author(s):  
Federico Franzoni ◽  
Xavier Salleras ◽  
Vanesa Daza

AbstractOver the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the same time, the lack of topology information hinders the analysis of the network, which is essential to improve efficiency and security. In this paper, we thoroughly review network-level attacks and empirically show that topology obfuscation is not an effective countermeasure. We then argue that the benefits of an open topology potentially outweigh its risks, and propose a protocol to reliably infer and monitor connections among reachable nodes of the Bitcoin network. We formally analyze our protocol and experimentally evaluate its accuracy in both trusted and untrusted settings. Results show our system has a low impact on the network, and has precision and recall are over 90% with up to 20% of malicious nodes in the network.


Sign in / Sign up

Export Citation Format

Share Document