Abstract
Security protection technology has been gradually receiving wide attention in the voice switching network. However, this technology will bring about a delay in user response and a decline in the quality of service. This study proposes a mechanism by which an encryption algorithm and a hybrid traffic security scheduling mechanism (TES) are combined. Specifically, the mechanism first adopts various encryption methods for different traffic according to the traffic types entering the switching network, and afterward, it reduces its resource occupation by adjusting the sampling period of the control class traffic. At the same time, an algorithm of priority injection (PI) is proposed in order to schedule the voice traffic. According to the experimental results, the contradiction between the security protection and transmission delay of voice interactive network is resolved, and the scheduling of mixed traffic in the voice switching network is realized securely and efficiently.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ni J, Zhang K, Lin X, Shen X (2019) Balancing security and efficiency for smart metering against misbehaving collectors. IEEE Trans Smart Grid 10(2):1225–1236
Ganguly P, Nasipuri M, Dutta S (2019) Challenges of the existing security measures deployed in the smart grid framework. In: 2019 IEEE 7th international conference on smart energy grid engineering, pp 1–5
Ma Y, Su H, Zhou X, Tu F (2022) Research on data security and privacy protection of smart grid based on alliance chain. In: 2022 IEEE international conference on mechatronics and automation, pp 157–162
Dong Z, Zhao J, Wen F (2014) From smart grid to energy internet: basic concept and research framework. Power Syst Autom 38(15):1–11
Banu AJ, Velayutham R (2013) Secure communication in wireless sensor networks using AES algorithm with delay efficient sleep scheduling. In: 2013 IEEE international conference on emerging trends in computing, communication and nanotechnology, pp 706–711
Daigmorte H, Boyer M, Zhao L (2018) Modelling in network calculus a TSN architecture mixing time-triggered, credit based shaper and best-effort queues. Arch Ouverte HA, pp 1–14
Chen J, Hu C, Zeng H, Zhang J (2009) Impact of security on QoS in communication network. In: 2009 international conference on networks security, wireless communications and trusted computing, pp 40–43
Gavriluţ V, Zhao L, Raagaard ML, Pop P (2018) AVB-aware routing and scheduling of time-triggered traffic for TSN. IEEE Access 6:75229–75243
Zhang J, Xu Q, Lu X, Zhang Y, Chen C (2020) Coordinated data transmission in time-sensitive networking for mixed time-sensitive applications. In: ECON 2020 the 46th annual conference of the IEEE industrial electronics society, pp 3805–3810
Wang Z, Sun H (2013) Bandwidth scheduling based on variable sampling period networked control systems. In: Proceedings of the 32nd China control conference, pp 1589–1593
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tang, R. et al. (2024). Joint Security Protection and Transmission Delay Scheduling Scheme of Voice Switching Network. In: Wang, W., Mu, J., Liu, X., Na, Z.N. (eds) Artificial Intelligence in China. AIC 2023. Lecture Notes in Electrical Engineering, vol 1043. Springer, Singapore. https://doi.org/10.1007/978-981-99-7545-7_13
Download citation
DOI: https://doi.org/10.1007/978-981-99-7545-7_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7544-0
Online ISBN: 978-981-99-7545-7
eBook Packages: Computer ScienceComputer Science (R0)