Results 301 to 310 of about 3,766,161 (380)
Security architecture for the internet protocol [PDF]
In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer. The design includes three components: (1) a security policy for determining when, where, and how security measures are to be applied; (2) a modular key management
Pau-Chen Cheng+3 more
openaire +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Network Design, Modelling and Performance Evaluation, 2018
In this chapter, the author will first present in Section 3.1 an overview of IP addresses with various types and addressing mechanisms. The first version of IP addresses, namely, IP version 4 (IPv4) will be discussed in Section 3.2 followed by various mechanisms for dividing the network with subnetting in Sections 3.3 and 3.4 as well as how to group ...
Quoc-Tuan Vien
openaire +3 more sources
In this chapter, the author will first present in Section 3.1 an overview of IP addresses with various types and addressing mechanisms. The first version of IP addresses, namely, IP version 4 (IPv4) will be discussed in Section 3.2 followed by various mechanisms for dividing the network with subnetting in Sections 3.3 and 3.4 as well as how to group ...
Quoc-Tuan Vien
openaire +3 more sources
RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones
IEEE Internet of Things Journal, 2022Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones deployed for collecting sensitive data to be used in critical applications. The drones transmit the collected data to the control room (CR) for analysis, while CR sends
Muhammad Tanveer+3 more
semanticscholar +1 more source
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
IEEE Internet of Things Journal, 2021One of the most important and critical requirements for the Internet of Vehicles (IoV) is security under strict latency. Typically, authentication protocols for vehicular ad hoc networks need to authenticate themselves frequently. This results in reduced
M. Aman, Uzair Javaid, B. Sikdar
semanticscholar +1 more source
SURFER: A Secure SDN-Based Routing Protocol for Internet of Vehicles
IEEE Internet of Things Journal, 2021Software-defined networking (SDN) is becoming the most dominant method for network management. By decoupling the control plane from the data plane, SDN provides a centralized view and more flexibility, scalability, and global knowledge of the network. In
Khaleel W. Mershad
semanticscholar +1 more source
Enabling ICN in the Internet Protocol: Analysis and Evaluation of the Hybrid-ICN Architecture
Information-Centric Networking, 2019Information-Centric Networking (ICN) embraces a family of network architectures rethinking Internet communication principles around named-data. After several years of research and the emergence of a few popular proposals, the idea to replace the Internet
G. Carofiglio+5 more
semanticscholar +1 more source
A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain
IEEE Internet of Things Journal, 2020Recent developments in IoT have facilitated advancements in the Internet of Vehicles (IoV) with autonomous vehicles and roadside infrastructure as its key components.
Uzair Javaid, M. Aman, B. Sikdar
semanticscholar +1 more source
Computer Networks (1976), 1981
Abstract A variety of computer networks are interconnected by gateway computers in the ARPA internetwork system. Processes on different networks may exchange messages with each other by means of an Internet Protocol which must be implemented in each subscriber (host) computer and in the gateways.
Carl A. Sunshine+2 more
openaire +2 more sources
Abstract A variety of computer networks are interconnected by gateway computers in the ARPA internetwork system. Processes on different networks may exchange messages with each other by means of an Internet Protocol which must be implemented in each subscriber (host) computer and in the gateways.
Carl A. Sunshine+2 more
openaire +2 more sources
IEEE Internet Computing, 2012
The Internet is based on a layered set of protocols a#x2014; the most basic of which is TCP/IP a#x2014; and the servers and routers that support them. This special issue addresses challenges to the Internet's basic protocols as our collective Internet usage increases in both magnitude and type and becomes increasingly crucial for our economy and ...
Oliver Spatscheck, Charles J. Petrie
openaire +2 more sources
The Internet is based on a layered set of protocols a#x2014; the most basic of which is TCP/IP a#x2014; and the servers and routers that support them. This special issue addresses challenges to the Internet's basic protocols as our collective Internet usage increases in both magnitude and type and becomes increasingly crucial for our economy and ...
Oliver Spatscheck, Charles J. Petrie
openaire +2 more sources