Showing 1,461 - 1,480 results of 29,875 for search '"communications"', query time: 0.13s Refine Results
  1. 1461

    SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization by Jiahua Zhang, Zhongxue Yang, Jiangping Wang, Yukai Shi, Liang Wei

    Published 2015-04-01
    “…A SDN communication quality assurance strategy which organic combines DDoS threat identification with route optimization was put forward.It means,when the intent link was congestive attacked by DDoS,it wi11 identify and filter the abnormal data packet,and wi11 generate optimized routing to ensure the quality of network communications.First of a11,a distributed intrusion detection system under SDN framework was designed.The system realizes the detection recognition,filtration and treatment about the DDoS threat,such as cheating message,excepting message and destroying message.Secondly,a kind of best algorithm about generating routing path was realized.The experimental result shows that the network deployment plan which mentioned in this paper,can identify and filter the aggressive data packet,and the average network data transmission delay doesn't increase sharply when the network is under attack.…”
    Get full text
    Article
  2. 1462

    Performance analysis of UWB-IR anti-intercepting communication based on chaotic mapping by MA Long1, WANG Ting-chang2

    Published 2005-01-01
    “…UWB-IR technology has been concerned in military communications in recent years because of its high data rate,low power consumption,low probability of detection and low probability of interception.By applying the chaos mapping into the UWB-IR was applied and proposed a novel module for chaos modulation and demodulation was proposed,which enhances both the capability of anti-detecting and the capability of anti-intercepting of the UWB-IR.Furthermore,The feasibility of this application was verified.through simulations…”
    Get full text
    Article
  3. 1463

    A secure message-passing framework for inter-vehicular communication using blockchain by Muhammd Awais Hassan, Ume Habiba, Usman Ghani, Muhmmad Shoaib

    Published 2019-02-01
    “…Internet of vehicles provides the communication channel between the vehicles, but existing solutions require a centralized communication system to distribute the message and to authenticate the source. …”
    Get full text
    Article
  4. 1464
  5. 1465
  6. 1466
  7. 1467
  8. 1468

    Research on the Impact of Environmental Regulation on Enterprise Innovation from the Perspective of Official Communication by Lili Feng, Lin Wang, Wenjun Zhou

    Published 2021-01-01
    “…Meanwhile, there is an inverted U-type relationship between official communication and innovation of enterprises. Furthermore, at present, the average level of official communication in China is too high, which will weaken the role of environmental regulation in promoting enterprise innovation. …”
    Get full text
    Article
  9. 1469
  10. 1470
  11. 1471
  12. 1472
  13. 1473
  14. 1474
  15. 1475

    Lightweight and secure vehicle track verification scheme via broadcast communication channels by Zhiqiang NING, Yuanyuan WANG, Chi ZHANG, Lingbo WEI, Nenghai YU, Yue HAO

    Published 2023-10-01
    “…In intelligent transportation systems, it is crucial for smart vehicles to broadcast real-time vehicle track messages to coordinate driving decisions and ensure driving safety.However, attackers can manipulate vehicle tracks by modifying timestamps or manipulating signal frequencies, posing a threat to security.To address this problem, a lightweight vehicle track verification scheme was proposed, utilizing the broadcast communication channels to achieve secure verification of vehicle tracks without any special hardware support.Without time synchronization, each verifier calculated the time interval between the reception time of the message and the sending timestamp.Spatial position constraint equations are formulated by combining these time intervals between any two verifiers, effectively defending against timestamp forgery attacks.Additionally, each verifier calculates the Doppler frequency shift between the arrival frequency and the scheduled transmit frequency.Velocity vector constraint equations were formulated by combining these frequency shifts between any two verifiers, providing defense against carrier frequency manipulation attacks.Formal analysis shows that increasing the number of verifiers improves the accuracy of the proposed verification scheme.Experimental results in a real-world environment further validate that the proposed verification scheme exhibits the best performance when the number of verifiers is set to 3.Compared to the existing solution, the proposed verification scheme has a higher accuracy, lower false rejection rate, and lower false acceptance rate when validating true vehicle track and false vehicle track separately.…”
    Get full text
    Article
  16. 1476
  17. 1477
  18. 1478
  19. 1479
  20. 1480