centralized controller
Recently Published Documents


TOTAL DOCUMENTS

63
(FIVE YEARS 18)

H-INDEX

6
(FIVE YEARS 1)

2021 ◽  
Vol 2113 (1) ◽  
pp. 012054
Author(s):  
Yu Wang ◽  
Zongchun Wei ◽  
Haibo Bao ◽  
Gaofeng Deng ◽  
Jiangwei Li ◽  
...  

Abstract In order to solve the problem that the process of WAPI terminal connection is troublesome, this paper proposes an intelligent support and command system of WAPI terminal equipment based on centralized control AC + AP architecture. The system stores WAPI certificate on AC (centralized controller), WAPI terminal equipment is associated with AP (wireless access point), and AP equipment notifies AC of the associated events of the terminal, AC equipment and terminal equipment enter authentication and complete certificate authentication. Complete access authentication through AC and terminal equipment, and store the unicast and multicast keys generated by authentication negotiation on AC. This method is more convenient to maintain the certificate. At the same time, on the premise of ensuring the security of the certificate, it also improves the encryption and decryption efficiency and improves the user’s business experience.


Author(s):  
Swaneet D. Rao

Abstract: In today’s world, robots are taking over the world by doing the tasks which used to be done by humans a while ago. Robots are continuously evolving into better and more efficient autonomous agents, makes substantial growth in fields like adaptive artificial intelligence. Our main objective of this people is to create an efficient multi agent autonomous environment for robots for cleaning purposes. Keywords: Gradient Descent, Centralized controller, autonomous agents, LiDAR


Micromachines ◽  
2021 ◽  
Vol 12 (9) ◽  
pp. 1019
Author(s):  
Yen-Hung Chen ◽  
Yuan-Cheng Lai ◽  
Kai-Zhong Zhou

The Deterministic Network (DetNet) is becoming a major feature for 5G and 6G networks to cope with the issue that conventional IT infrastructure cannot efficiently handle latency-sensitive data. The DetNet applies flow virtualization to satisfy time-critical flow requirements, but inevitably, DetNet flows and conventional flows interact/interfere with each other when sharing the same physical resources. This subsequently raises the hybrid DDoS security issue that high malicious traffic not only attacks the DetNet centralized controller itself but also attacks the links that DetNet flows pass through. Previous research focused on either the DDoS type of the centralized controller side or the link side. As DDoS attack techniques are evolving, Hybrid DDoS attacks can attack multiple targets (controllers or links) simultaneously, which are difficultly detected by previous DDoS detection methodologies. This study, therefore, proposes a Flow Differentiation Detector (FDD), a novel approach to detect Hybrid DDoS attacks. The FDD first applies a fuzzy-based mechanism, Target Link Selection, to determine the most valuable links for the DDoS link/server attacker and then statistically evaluates the traffic pattern flowing through these links. Furthermore, the contribution of this study is to deploy the FDD in the SDN controller OpenDayLight to implement a Hybrid DDoS attack detection system. The experimental results show that the FDD has superior detection accuracy (above 90%) than traditional methods under the situation of different ratios of Hybrid DDoS attacks and different types and scales of topology.


2021 ◽  
Vol 11 (4) ◽  
pp. 7515-7521
Author(s):  
N. A. Zainurin ◽  
S. A. B. Anas ◽  
R. S. S. Singh

This paper describes the development of a centralized controller to charge or discharge the battery storages that are connected to renewable energy sources. The centralized controller is able to assist, control, and manage the battery storage charging when excessive power is available from renewable energy sources. At the same time, the centralized controller also performs battery storage discharging when the connected load requires a power source, especially when the renewable energy sources are unavailable. Background studies regarding battery storage charging-discharging are presented in the introduction section. Also, generally developed charging-discharging methods or techniques were applied at the system level and not specifically to the battery storage system level. Due to the limited study on battery storage system charging-discharging, this paper reviews some of the similar studies in order to understand the battery storage charging–discharging characteristics as well as to propose a new conceptual methodology for the proposed centralized controller. The battery storage State-of-Charge (SoC) is used as the criterion to develop the conceptual centralized controller, which is also used as a switching characteristic between charging or discharging when only the battery energy storages are supplying the output power to the connected load. Therefore, this paper mainly focuses on the conceptual methodology as well as explaining the functionality and operationality of the proposed centralized controller. A summarized comparison based on the studied charging–discharging systems with the proposed centralized controller is presented to indicate the validity of the proposed centralized controller.


2021 ◽  
Author(s):  
Maryam Kia

Software Defined networking (SDN) is a new approach for the design and management of computer networks. The main concept behind SDN is the separation of the network’s control and forwarding planes with the control plane moved to the centralized controller. In SDN networks with the centralized controller structure DDoS attacks can easily exhaust the controller's or the switches' computing and communication resources, thus, breakdown the network within a short time. In this thesis, the scheme, running at the controller, can detect DDoS attacks at the early stage. The method not only can detect the attacks but also identify the attacking paths and start a mitigation process to provide some degree of protection of the network devices the moment an attack is detected. The Proposed method is based on the Entropy variation of destination IP address, Flow initiation rate and study of the Flow specifications.


2021 ◽  
Author(s):  
Maryam Kia

Software Defined networking (SDN) is a new approach for the design and management of computer networks. The main concept behind SDN is the separation of the network’s control and forwarding planes with the control plane moved to the centralized controller. In SDN networks with the centralized controller structure DDoS attacks can easily exhaust the controller's or the switches' computing and communication resources, thus, breakdown the network within a short time. In this thesis, the scheme, running at the controller, can detect DDoS attacks at the early stage. The method not only can detect the attacks but also identify the attacking paths and start a mitigation process to provide some degree of protection of the network devices the moment an attack is detected. The Proposed method is based on the Entropy variation of destination IP address, Flow initiation rate and study of the Flow specifications.


Sign in / Sign up

Export Citation Format

Share Document