2019
DOI: 10.1109/access.2019.2936043
|View full text |Cite
|
Sign up to set email alerts
|

AID Shuffling Mechanism Based on Group-Buying Auction for Identifier Network Security

Abstract: Identifier network is one of promising network architectures to solve IP dual-property issues by separating network into access network and core network. The key design is the identifier/location separation mechanism which introduces user accessing address space and network routing address space to represent the identifier and location of terminal, respectively. The core network can prevent the cyber attacks by controlling the mapping relationship between Accessing IDentifier (AID) and Routing IDentifier (RID)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 34 publications
(44 reference statements)
0
2
0
Order By: Relevance
“…The way the access router connects to the core network has security issues and is vulnerable to attacks. An AID shuffling mechanism is designed to ensure individual rationality, budget balance and authenticity [14]. Figure 5 shows the basic architecture of identifier network and AID shuffling mechanism.…”
Section: Information Centric Networkingmentioning
confidence: 99%
“…The way the access router connects to the core network has security issues and is vulnerable to attacks. An AID shuffling mechanism is designed to ensure individual rationality, budget balance and authenticity [14]. Figure 5 shows the basic architecture of identifier network and AID shuffling mechanism.…”
Section: Information Centric Networkingmentioning
confidence: 99%
“…The need for computer networks is becoming increasingly important in education, work, and entertainment. Network security is one of the most critical aspects of managing a computer network [2]. With many network access points, there are also numerous opportunities for network criminals to engage in activities such as online data theft, disabling network resources for hacking purposes, and so on [3].…”
Section: Introductionmentioning
confidence: 99%