Joint Security Protection and Transmission Delay Scheduling Scheme of Voice Switching Network

  • Conference paper
  • First Online:
Artificial Intelligence in China (AIC 2023)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1043))

Included in the following conference series:

  • 127 Accesses

Abstract

Security protection technology has been gradually receiving wide attention in the voice switching network. However, this technology will bring about a delay in user response and a decline in the quality of service. This study proposes a mechanism by which an encryption algorithm and a hybrid traffic security scheduling mechanism (TES) are combined. Specifically, the mechanism first adopts various encryption methods for different traffic according to the traffic types entering the switching network, and afterward, it reduces its resource occupation by adjusting the sampling period of the control class traffic. At the same time, an algorithm of priority injection (PI) is proposed in order to schedule the voice traffic. According to the experimental results, the contradiction between the security protection and transmission delay of voice interactive network is resolved, and the scheduling of mixed traffic in the voice switching network is realized securely and efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Spain)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (Spain)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 207.99
Price includes VAT (Spain)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ni J, Zhang K, Lin X, Shen X (2019) Balancing security and efficiency for smart metering against misbehaving collectors. IEEE Trans Smart Grid 10(2):1225–1236

    Article  Google Scholar 

  2. Ganguly P, Nasipuri M, Dutta S (2019) Challenges of the existing security measures deployed in the smart grid framework. In: 2019 IEEE 7th international conference on smart energy grid engineering, pp 1–5

    Google Scholar 

  3. Ma Y, Su H, Zhou X, Tu F (2022) Research on data security and privacy protection of smart grid based on alliance chain. In: 2022 IEEE international conference on mechatronics and automation, pp 157–162

    Google Scholar 

  4. Dong Z, Zhao J, Wen F (2014) From smart grid to energy internet: basic concept and research framework. Power Syst Autom 38(15):1–11

    Google Scholar 

  5. Banu AJ, Velayutham R (2013) Secure communication in wireless sensor networks using AES algorithm with delay efficient sleep scheduling. In: 2013 IEEE international conference on emerging trends in computing, communication and nanotechnology, pp 706–711

    Google Scholar 

  6. Daigmorte H, Boyer M, Zhao L (2018) Modelling in network calculus a TSN architecture mixing time-triggered, credit based shaper and best-effort queues. Arch Ouverte HA, pp 1–14

    Google Scholar 

  7. Chen J, Hu C, Zeng H, Zhang J (2009) Impact of security on QoS in communication network. In: 2009 international conference on networks security, wireless communications and trusted computing, pp 40–43

    Google Scholar 

  8. Gavriluţ V, Zhao L, Raagaard ML, Pop P (2018) AVB-aware routing and scheduling of time-triggered traffic for TSN. IEEE Access 6:75229–75243

    Article  Google Scholar 

  9. Zhang J, Xu Q, Lu X, Zhang Y, Chen C (2020) Coordinated data transmission in time-sensitive networking for mixed time-sensitive applications. In: ECON 2020 the 46th annual conference of the IEEE industrial electronics society, pp 3805–3810

    Google Scholar 

  10. Wang Z, Sun H (2013) Bandwidth scheduling based on variable sampling period networked control systems. In: Proceedings of the 32nd China control conference, pp 1589–1593

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruilin Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tang, R. et al. (2024). Joint Security Protection and Transmission Delay Scheduling Scheme of Voice Switching Network. In: Wang, W., Mu, J., Liu, X., Na, Z.N. (eds) Artificial Intelligence in China. AIC 2023. Lecture Notes in Electrical Engineering, vol 1043. Springer, Singapore. https://doi.org/10.1007/978-981-99-7545-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7545-7_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7544-0

  • Online ISBN: 978-981-99-7545-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation