Design and research of a large-scale network access control system with hybrid router configuration

W Jiang, BX Fang, ZH Tian… - 2008 3rd International …, 2008 - ieeexplore.ieee.org
This paper presents a new automatic hybrid router configuration (HRC) approach to access
control, which combine the advantages of direct configuration (DC) method and routing …

Capability-based egress network access control for transferring access rights

S Suzuki, Y Shinjo, T Hirotsu, K Itano… - … and Applications (ICITA' …, 2005 - ieeexplore.ieee.org
In conventional egress network access control (NAC) using access control lists (ACLs),
modifying ACLs is a heavy task for administrators. To enable rapid configuration without a …

Countermeasures of interest flooding attack in named data networking: a survey

L Yu, H Ai, DO Choi - International Journal of Electrical …, 2023 - journals.sagepub.com
Named data networking (NDN) is a typical representation and implementation of information-
centric networking and serves as a basis for the next-generation Internet. However, any …

ZNP: A new generation network layer protocol based on ID/locator split considering practical operation

S Kanemaru, K Yonemura… - IEICE transactions on …, 2013 - search.ieice.org
To support mobility, multihoming, routing scalability, and security, there are a lot of proposals
based on ID/Locator split approach not only for the current Internet but also for the future …

A Proposal of Dynamic Access Control with SDN for Practical Network Separation

S Nakamura, H Hasegawa, Y Tateiwa… - … Report; IEICE Tech …, 2017 - ken.ieice.org
(in English) As one of effective countermeasures against recent sophisticated cyber attacks,
many researches have paid attention to network separation with access control, eg …

On the benefits of keeping path identifiers secret in future Internet: A DDoS perspective

H Luo, Z Chen, J Li, T Vasilakos - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, there are increasing interests in using path identifiers (PIDs) as inter-domain
routing objects in the future Internet. While PIDs are advertised throughout the Internet in …

An interest‐based access control scheme via edge verification in Named Data Networking

Y Tao, Y Zhu - International Journal of Communication Systems, 2022 - Wiley Online Library
Summary Named Data Networking (NDN) is a disruptive future architecture, in which content
delivery can be significantly improved through named routing and distributed caching …

Design and analysis of data link impersonation attack for wired LAN application layer services

A ElShafee, W El-Shafai - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Impersonation attack, also known as MAC spoofing, is widespread in wireless local area
networks. Under this attack, the senders cannot control the device that listens to their traffic …

IDNet: beyond all‐IP network

H Jung, WS Lim, J Hong, C Hur, JC Lee, T You… - ETRI …, 2015 - Wiley Online Library
Recently, new network systems have begun to emerge (for instance, 5G, IoT, and ICN) that
require capabilities beyond that provided by existing IP networking. To fulfill the …

A future internet architecture based on de-conflated identities

S Paul, J Pan, R Jain - 2010 IEEE Global Telecommunications …, 2010 - ieeexplore.ieee.org
We present a new Internet architecture based on de-conflated identities (ADI) that explicitly
establishes the separation of ownership of hosts from the underlying infrastructure …