Search
Search Results
-
A novel frame switching model based on virtual MAC in SDN
MAC address spoofing has plagued LAN communication for a long time. Many attacks use it as a springboard to carry out subsequent attacks. The main...
-
Sub Data Path Filtering Protocol for Subscription of Event Parts and Event Regeneration in Pub/Sub Pattern
Pub/Sub is a common pattern allowing a producer to publish events to consumers. In types of Pub/Sub, structure of an event is either identified by... -
A particle swarm optimization routing scheme for wireless sensor networks
For the energy consumption problem among nodes in wireless sensor networks (WSNs), a particle swarm optimization routing (PSOR) scheme is proposed in...
-
Research on Dos Attack Simulation and Detection in Low-Orbit Satellite Network
Low-Earth Orbit (LEO) satellite networks are increasingly becoming the communication infrastructure of critical sectors because of their extensive... -
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches
Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding,...
-
sRetor: a semi-centralized regular topology routing scheme for data center networking
The performance of the data center network is critical for lowering costs and increasing efficiency. The software-defined networks (SDN) technique...
-
Application of improved ant colony algorithm in load balancing of software-defined networks
Software-defined networking (SDN) separates the forwarding plane and control plane of the network equipment, adopts a centralized control mode to...
-
Attitude-Aware Based Geographical Opportunity Routing Protocol for Floating Wireless Sensor Network
Wireless sensor devices are increasingly deployed in both terrestrial and aquatic environments. In wireless sensor networks, routing protocols are... -
Multi-objective NSGA-II optimization framework for UAV path planning in an UAV-assisted WSN
The recent technological advancements such as IoT-enabled sensor nodes, Global Positioning System, Wi-Fi transceivers, and lightweight lithium-ion...
-
Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure
In edge computing, repetitive computations are a common occurrence. However, the traditional TCP/IP architecture used in edge computing fails to...
-
An efficient multicast multi-rate reinforcement learning based opportunistic routing algorithm
Multicasting through device-to-device communication (MD2D) is a promising solution for handling the heavy load caused by the extraordinary high...
-
Fuzzy intelligence based V2V routing protocol in Internet of Vehicles: a cross-layer approach
Internet of Vehicles (IoV), a vital component in intelligent transportation systems, supports diverse applications ranging from periodic safety...
-
ACI Fundamentals: Underlay Infrastructure
In this chapter, you will focus on establishing a proper understanding of the main ACI components: the underlay network infrastructure and APIC... -
Insights into SAV Implementations in the Internet
Source Address Validation (SAV) is designed to block packets with spoofed IP addresses. Obtaining insights into the deployment and implementation of... -
Functional Properties and Scalability
In Chaps. 2–5, we have presented the main components of the SCION architecture: beacon service, certificate service, and path service; the concept of... -
On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks
Software-Defined Networking (SDN) has attracted much attention from research and industrial communities recently as it is more agile and flexible...
-
Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration
The phenomenon of diversified terminal structures is common in the Industrial Internet of Things (IIoT), and the information transmission methods...
-
Control Plane
This chapter describes SCION's control plane, whose main purpose is to create and manage path segments, which can then be combined into forwarding... -
Bungee-ML: A Cross-Plane Approach for a Collaborative Defense Against DDoS Attacks
Network services and applications are targeted by different types of attacks on a daily basis. One of the most common and devastating types is...
-
A survey on interest packet flooding attacks and its countermeasures in named data networking
The current Internet architecture is not suitable for the growing data (generated from billions of devices) and contents (stored in multiple...