AID shuffling mechanism based on group-buying auction for identifier network security

J Guan, Y Zhang, S Yao, L Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Identifier network is one of promising network architectures to solve IP dual-property issues
by separating network into access network and core network. The key design is the …

Overall-transparent dynamic identifier-mapping mechanism against scanning and worm propagation in the SINET

L Yao, P Dong, H Zhang, X Wang - China Communications, 2020 - ieeexplore.ieee.org
Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a
network. However, existing dynamic IP address assignment approaches suffer from two …

Security analysis of m-to-n mapping against eavesdropping in identifier-based universal network

M Wan, Y Liu, H Zhang - 2011 4th IEEE International …, 2011 - ieeexplore.ieee.org
It is commonly recognized that the dual semantics of IP address has brought about serious
scaling and security problems in today's Internet. Aiming at addressing these problems …

Stochastic cost minimization mechanism based on identifier network for IoT security

S Yao, Z Li, J Guan, Y Liu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
An identifier network (IN), as one of the promising network architectures to solve the IP dual
properties problems, has been applied in many areas, including Internet of Things (IoT) for …

Network access control mechanism based on locator/identifier split

T Rui, S Jinshu, C Feng - 2009 IEEE International Conference …, 2009 - ieeexplore.ieee.org
Legacy IP address-based access control has met many challenges, because the network
nodes cannot be identified accurately based on their variable IP addresses …

[PDF][PDF] Efficient DoS-limiting support by indirect mapping in networks with locator/identifier separation

D Huang, D Yang, H Zhang, F Lin - Journal of Networks, 2013 - Citeseer
Recent research in the designing of an elegant mapping service to map identifiers onto
locators in networks with locator/identifier separation, focuses on solving practical issues …

[PDF][PDF] Building an IPv6 address generation and traceback system with NIDTGA in address driven network

Y Liu, G Ren, JP Wu, SL Zhang, L He… - Science China …, 2015 - nkcs.iops.ai
In the design and construction process of Next Generation Internet, it is important to identify
the source of each IP packet forwarding accurately, especially for the support of precise fine …

MIN: Co-governing multi-identifier network architecture and its prototype on operator's network

H Li, J Wu, X Yang, H Wang, J Lan, K Xu, H Tan… - IEEE …, 2020 - ieeexplore.ieee.org
IP protocol is the core of TCP/IP network layer. However, since IP address and its Domain
Name are allocated and managed by a single agency, there are risks of centralization. The …

Modelling and simulations for DDoS attacks mitigation in identifier–locator split network

Y Liu, YS Lee, HK Zhang, TY Wu… - International Journal of …, 2013 - Taylor & Francis
With the increasingly prominent problems in the scalability, security, mobility and some other
issues of Internet, identifier–locator split network has become a hot topic in the research of …

Smart identifier network: A collaborative architecture for the future internet

H Zhang, W Quan, H Chao, C Qiao - IEEE network, 2016 - ieeexplore.ieee.org
The current Internet has many inherent shortcomings, such as poor security, low mobility,
and high energy consumption, which all seriously hinder its further development. This article …