http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Research on Access Control and Encryption Transmission of 6LoWPAN
Fan Tongrang,He Bingchao,Zhao Wenbin,Huang Xin,Yu Tao 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.12
Based on research about network mobility, this paper analyzes the security requirements of internet of things and wireless network based on 6LoWPAN, and designs the security architecture based on 6LoWPAN network, especially for the frequent mobile handoff access and data multi-hop forwarding. The access authentication scheme and data encryption method are designed and implemented based on 6LoWPAN mobile switching. Through comparing with non-symmetric encryption and symmetric encryption, AES pre-shared key encryption scheme is determined to use for 6LoWPAN, and is compared with typical cryptographic algorithms on internet of things platform and Contiki operate system. In experiment, the lightweight security of IoT mobile communication is realized on CC2530 nodes, including the advanced encryption standard, the payload encryption of network data packet and wireless nodes access authentication. Security architecture for mobile switching scenarios are verified, the feasibility of proposed scheme is confirmed.
Internet Immunization Strategy based on Relations of Nodes
Fan Tongrang,Qin Wanting,Zhao Wenbin,Wang Qian,Yu Tao 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.11
Inspired by the biological immune system against outside invasion in nature, this paper propose a network security strategy using Agent technology. The Agents with independent behavior capacity are set for resisting network intrusion using their spontaneous coordinate organization. Based on the comparisons of existing immunization strategies, such as target immune, acquaintance immune and random immunity, it is found that the importance of nodes in network are influenced by interaction between nodes, degree of nodes, information flow, and other factors. If the nodes are more important, they have a greater influence over the whole network. When important nodes are infected by virus, there will be a higher probability of spreading of hazard information. Therefore, this paper proposes a network security model using Agent technology, where important nodes are implanted with relationship immunization strategy. Experimental results show when the network suffered from random or malicious attacks, relationship immunization strategy is more effective than others existing methods.
Discovery of Subject of Science and Technology Policy based on LDA Model
Jianmin Wang,Shaobo Li,Tongrang Fan,Hui Wang 보안공학연구지원센터 2016 International Journal of Database Theory and Appli Vol.9 No.12
With the continuous increase of science and technology policy, how to find valuable information from the massive scientific and technological policies has becoming an urgent problem to be solved. Thus, this paper proposes a subject discovery method for large scale science and technology policy set. Based on LDA subject model for science and technology policy document subject modeling, this approach extracts time and geographical labels of science and technology policy, computes intensity of subjects under different time and geographical conditions, and obtains important subjects and analysis of theme change trend of the intensity of subjects under condition constraints. Experimental results demonstrate that this method can excavate and analyze the subjects form large scale science and technology policies quickly and effectively.