next generation networking
Recently Published Documents


TOTAL DOCUMENTS

39
(FIVE YEARS 8)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 11 (4) ◽  
pp. 4750-4763
Author(s):  
Madhura Apte ◽  
Supriya Kelkar ◽  
Aishwarya Dorge ◽  
Shilpa Deshpande ◽  
Pooja Bomble ◽  
...  

Internet of Things (IoT) a growing phenomenon, refers to the seamless integration of things into the information network. The security in IoT is tampered because of the various attacks which happen due to resource constrained nature of the devices in the network. Thus, although IoT is evolving as an attractive next generation networking paradigm, it can be adopted only when the security issues are resolved. This implies that, in a dynamic and collaborative IoT environment, the devices need to be trustworthy. This paper proposes a gateway based trust management system and an algorithm for computation of trust for the devices. The system focuses on making the computations on the devices lightweight and the network robust. The proposed system is tested against various IoT attacks and results demonstrate that it can clearly identify the malicious device if any, in the IoT network.


Author(s):  
Zhangbing Zhou ◽  
Takahiro Hara ◽  
Deze Zeng ◽  
Yu Zhang ◽  
Chunsheng Zhu

Author(s):  
Muralikrishnan Srinivasan ◽  
Sarath Gopi ◽  
Sheetal Kalyani ◽  
Xiaojing Huang ◽  
Lajos Hanzo

2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Andrew Stewart

Decision advantage for the DoD and Combined Cyber Operations results from the secure, seamless, and rapid maneuver of data and information. In the DoD’s 2018 Artificial Intelligence Strategy, the DoD recognized that it must, “put in place key building blocks and platforms to scale and democratize access to AI. This includes creating a common foundation of shared data, reusable tools, frameworks and standards, and cloud and edge services.” More than ever, integrated, adaptive cyber operations provide the means of maneuver for data to enable DoD’s decision advantage-based goals. To support this vision, the integrated implementation three innovative cyber technologies must be rapidly realized across DoD Networks in order to execute cyber operations according to Commander’s Intent—at machine speed. Getting Information to the “edge” is what makes DoD competitive and provides advantage. The word “edge” in this context reflects the distributed individual platforms, sensors, and people who comprise the scale and scope of today’s globally networked DoD operations. That edge is creating the demand to access data and consume information as never before, and a greater need for more innovation to support DoD cyber operations on the DoD Information Network (DODIN). At the heart of the need for innovation is an increased demand for data and information, as well as the size and scale of networks and networking exploding without a proportionate growth in the IT resources to support today’s cyber operational demand. If the network continues to grow exponentially and must function as the medium of maneuver for the data that provides DoD decision advantage to the edge, then the DoD must deploy revolutionary innovations to reinvent the network as an integrated platform for cyber operations—across the enterprise and to the edge and implemented natively as hybrid multicloud-ready. Three innovative, next-generation networking technologies, integrated tightly together, offer the opportunity for DoD to provide revolutionary cyber operations capabilities across the DODIN and produce improved, data-enabled mission results. The scalable and seamless integration of: (1) advanced identity management, (2) software-defined networking, and (3) hybrid multicloud capabilities provides a Commander’s Intent-driven Cyber Platform implemented in a zero trust architecture that operates at machine speed and ensures decision advantage for the DoD.


2018 ◽  
Vol 56 (4) ◽  
pp. 14-15 ◽  
Author(s):  
M. Shamim Hossain ◽  
Changsheng Xu ◽  
Ying Li ◽  
Josu Bilbao ◽  
Abdulmotaleb El Saddik

Sign in / Sign up

Export Citation Format

Share Document