首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
Research of Secure Multicast Key Management Protocol Based on Fault-Tolerant Mechanism 基于容错机制的安全组播密钥管理协议研究
Guangwei Liu, Jian Xu, Mengmeng Cao, Fu-cai Zhou, Bin Zhang
As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point failure. In order to settle the issues mentioned above, a fault-tolerant and secure multicast key management protocol (FTS, for short) with using the fault-tolerant algorithm and the password authentication mechanism is proposed in this paper. In our protocol, legal members are able to agree on a key despite failures of other members. The protocol can also prevent man-in-the-middle attacks. Finally, we evaluate the security of FTS, and compare our protocol with the FTKM through performance analysis. The analytic results show that the protocol not only avoids the single-point failure but also improves the comprehensive performance.
随着组播作为一种高效的通信机制在面向组的Internet应用中得到越来越多的应用,对组播密钥管理的研究成为一个热点问题。首先,分析了n方GDH.2组播密钥管理协议,指出该协议存在缺乏认证、易受中间人攻击、单点故障等缺陷。为了解决上述问题,本文提出了一种采用容错算法和密码认证机制的容错安全组播密钥管理协议(FTS)。在我们的协议中,合法成员能够在其他成员失败的情况下就密钥达成一致。该协议还可以防止中间人攻击。最后,我们评估了FTKM协议的安全性,并通过性能分析将我们的协议与FTKM协议进行了比较。分析结果表明,该协议不仅避免了单点故障,而且提高了综合性能。
{"title":"Research of Secure Multicast Key Management Protocol Based on Fault-Tolerant Mechanism","authors":"Guangwei Liu, Jian Xu, Mengmeng Cao, Fu-cai Zhou, Bin Zhang","doi":"10.1109/NSWCTC.2009.273","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.273","url":null,"abstract":"As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point failure. In order to settle the issues mentioned above, a fault-tolerant and secure multicast key management protocol (FTS, for short) with using the fault-tolerant algorithm and the password authentication mechanism is proposed in this paper. In our protocol, legal members are able to agree on a key despite failures of other members. The protocol can also prevent man-in-the-middle attacks. Finally, we evaluate the security of FTS, and compare our protocol with the FTKM through performance analysis. The analytic results show that the protocol not only avoids the single-point failure but also improves the comprehensive performance.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Attestation for Custom-built Software 定制软件的远程认证
Ce Meng, Yeping He, Qian Zhang
With trusted computing technology, we can build trust relations between computing platforms distributed on network. But current methods which are merely based on the integrity of components to justify the dependability of remote runtime environment, are hard to adapt today’s Internet full of heterogeneous platforms due to the scalability of measurement list. Especially when verifying open source software, this shortcoming is more obvious for the reason that all possible custom-built versions have to be considered. To solve this problem, we extended existing method to limit the size of measurement list by attesting the building process of custom-built software.
利用可信计算技术,我们可以在分布在网络上的计算平台之间建立信任关系。但是,现有的方法仅仅基于组件的完整性来证明远程运行环境的可靠性,由于测量表的可扩展性,难以适应当今充满异构平台的互联网。特别是在验证开源软件时,这个缺点更加明显,因为必须考虑所有可能的定制版本。为了解决这一问题,我们扩展了现有的方法,通过验证定制软件的构建过程来限制测量列表的大小。
{"title":"Remote Attestation for Custom-built Software","authors":"Ce Meng, Yeping He, Qian Zhang","doi":"10.1109/NSWCTC.2009.158","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.158","url":null,"abstract":"With trusted computing technology, we can build trust relations between computing platforms distributed on network. But current methods which are merely based on the integrity of components to justify the dependability of remote runtime environment, are hard to adapt today’s Internet full of heterogeneous platforms due to the scalability of measurement list. Especially when verifying open source software, this shortcoming is more obvious for the reason that all possible custom-built versions have to be considered. To solve this problem, we extended existing method to limit the size of measurement list by attesting the building process of custom-built software.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis and Design of the Classification Management on the Information Content Security Based on the Label 基于标签的信息内容安全分类管理的分析与设计
Junhua He, S. Mao
As the Internet is a lack of effective information management tools, adopting a classification markings on the Internet for information management, and has designed a hierarchical structure of the security labels Protection measures, an analysis of management at different levels in the framework of a number of key technologies and security tag technology. The system has a certain value on the proliferation of content on the Internet today.
由于互联网缺乏有效的信息管理工具,采用分类标记对互联网上的信息进行管理,并设计了分层结构的防伪标签保护措施,分析了在不同层次管理框架下的若干关键技术和防伪标签技术。该系统在互联网内容泛滥的今天具有一定的应用价值。
{"title":"Analysis and Design of the Classification Management on the Information Content Security Based on the Label","authors":"Junhua He, S. Mao","doi":"10.1109/NSWCTC.2009.308","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.308","url":null,"abstract":"As the Internet is a lack of effective information management tools, adopting a classification markings on the Internet for information management, and has designed a hierarchical structure of the security labels Protection measures, an analysis of management at different levels in the framework of a number of key technologies and security tag technology. The system has a certain value on the proliferation of content on the Internet today.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Wavelet Packet in Defect Recognition of Optical Fiber Fusion Based on ISO14000 小波包在ISO14000光纤融合缺陷识别中的应用
Zhen Zhang, Jun-jie Xi
The important meaning of the optical fiber fusion defect recognition was introduced based on ISO14000. Detecting the optical fiber fusion point by using the UltraPAC system, aiming at the defect feature, the method of analyzing and extracting the defect eigenvalue by using wavelet packet analysis and pattern recognition by making use of the wavelet neural network is discussed. This method can realize to extract the interrelated information which can reflect defect feature from the ultrasonic information being detected and analysis it by the information. Constructing the network model for realizing the qualitative recognition of defects. The results of experiment show that the wavelet packet analysis adequately make use of the information in time-domain and in frequency-domain of the defected echo signal, multi-level partition the frequency bands and analyze the high-frequency part further which don’t been subdivided by multi-resolution analysis, and choose the interrelated frequency bands to make it suited with signal spectrum. Thus, the time-frequency resolution is risen, the good local amplificatory property of the wavelet neural network and the study characteristic of multi-resolution analysis can achieve the higher accuracy rate of the qualitative classification of fusion defects.
介绍了基于ISO14000标准的光纤熔接缺陷识别的重要意义。利用UltraPAC系统对光纤熔点进行检测,针对缺陷特征,讨论了利用小波包分析提取缺陷特征值和利用小波神经网络进行模式识别的方法。该方法可以实现从被检测的超声信息中提取能反映缺陷特征的相关信息,并利用这些信息进行分析。构建实现缺陷定性识别的网络模型。实验结果表明,小波包分析充分利用了缺陷回波信号的时域和频域信息,对多分辨率分析无法细分的频段进行多级划分,并对高频部分进行进一步分析,选择相互关联的频段,使其与信号频谱相适应。从而提高了时频分辨率,利用小波神经网络良好的局部放大特性和多分辨率分析的研究特点,可以达到较高的融合缺陷定性分类准确率。
{"title":"Application of Wavelet Packet in Defect Recognition of Optical Fiber Fusion Based on ISO14000","authors":"Zhen Zhang, Jun-jie Xi","doi":"10.1109/NSWCTC.2009.35","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.35","url":null,"abstract":"The important meaning of the optical fiber fusion defect recognition was introduced based on ISO14000. Detecting the optical fiber fusion point by using the UltraPAC system, aiming at the defect feature, the method of analyzing and extracting the defect eigenvalue by using wavelet packet analysis and pattern recognition by making use of the wavelet neural network is discussed. This method can realize to extract the interrelated information which can reflect defect feature from the ultrasonic information being detected and analysis it by the information. Constructing the network model for realizing the qualitative recognition of defects. The results of experiment show that the wavelet packet analysis adequately make use of the information in time-domain and in frequency-domain of the defected echo signal, multi-level partition the frequency bands and analyze the high-frequency part further which don’t been subdivided by multi-resolution analysis, and choose the interrelated frequency bands to make it suited with signal spectrum. Thus, the time-frequency resolution is risen, the good local amplificatory property of the wavelet neural network and the study characteristic of multi-resolution analysis can achieve the higher accuracy rate of the qualitative classification of fusion defects.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flexible Authorizations with Logic Program 灵活的授权与逻辑程序
Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang
Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.
柔性授权是普适计算中一个重要的研究领域。逻辑程序无论在理论上还是在实践中都是一种有价值的表达和推理柔性授权的方法。本文主要研究如何使用逻辑程序来指定灵活的授权策略。分析了灵活授权的特点。研究了基于有序析取逻辑程序的冲突解决和动态授权问题。
{"title":"Flexible Authorizations with Logic Program","authors":"Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang","doi":"10.1109/NSWCTC.2009.9","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.9","url":null,"abstract":"Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Colour Image Encryption Based on Chaotic Map and OCML Model 基于混沌映射和OCML模型的彩色图像加密改进
Jun He, Jun Zheng, Zhi-bin Li, Hai-feng Qian
In this paper, an improved colour image encryption is proposed, which is based on a chaotic logistic map and the one-way coupled-map lattices (OCML) model. The results of several experimental, statistical analyses and key sensitivity tests prove the security robustness of the proposed cryptosystem.
提出了一种基于混沌逻辑映射和单向耦合映射格(OCML)模型的彩色图像加密算法。实验、统计分析和密钥敏感性测试的结果证明了该密码系统的安全鲁棒性。
{"title":"An Improved Colour Image Encryption Based on Chaotic Map and OCML Model","authors":"Jun He, Jun Zheng, Zhi-bin Li, Hai-feng Qian","doi":"10.1109/NSWCTC.2009.243","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.243","url":null,"abstract":"In this paper, an improved colour image encryption is proposed, which is based on a chaotic logistic map and the one-way coupled-map lattices (OCML) model. The results of several experimental, statistical analyses and key sensitivity tests prove the security robustness of the proposed cryptosystem.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122601016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Immune Based Adaptive Intrusion Detection System Model 基于免疫的自适应入侵检测系统模型研究
Lei Deng, De-yuan Gao
Intrusion Detection Systems (IDSs) are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Recently applying Artificial Intelligence, machine learning and data mining techniques to IDS are increasing. Artificial Intelligence plays a driving role in security services. This paper proposes an Immune based Adaptive Intrusion Detection System Model (IAIDSM). Analyzing the training data obtaining from internet, the self behavior set and nonself behavior set can be obtained by the partitional clustering algorithm, then it extracts Self and nonself pattern sets from these two behavior sets by association rules and sequential patterns mining. The Self and nonself sets can update automatically and constantly online. So IAIDSM improves the ability of detecting new type intrusions and the adaptability of the system.
入侵检测系统日益成为系统防御的重要组成部分。目前,人们正在使用各种入侵检测方法,但它们都相对无效。近年来,人工智能、机器学习和数据挖掘技术在IDS中的应用越来越多。人工智能在安全服务中发挥着推动作用。提出了一种基于免疫的自适应入侵检测系统模型(IAIDSM)。对从互联网上获取的训练数据进行分析,利用分簇聚类算法得到自我行为集和非自我行为集,然后通过关联规则和顺序模式挖掘从这两个行为集中提取出自我和非自我模式集。Self和nonself集合可以自动和持续在线更新。从而提高了对新型入侵的检测能力和系统的适应性。
{"title":"Research on Immune Based Adaptive Intrusion Detection System Model","authors":"Lei Deng, De-yuan Gao","doi":"10.1109/NSWCTC.2009.87","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.87","url":null,"abstract":"Intrusion Detection Systems (IDSs) are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Recently applying Artificial Intelligence, machine learning and data mining techniques to IDS are increasing. Artificial Intelligence plays a driving role in security services. This paper proposes an Immune based Adaptive Intrusion Detection System Model (IAIDSM). Analyzing the training data obtaining from internet, the self behavior set and nonself behavior set can be obtained by the partitional clustering algorithm, then it extracts Self and nonself pattern sets from these two behavior sets by association rules and sequential patterns mining. The Self and nonself sets can update automatically and constantly online. So IAIDSM improves the ability of detecting new type intrusions and the adaptability of the system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Improved Real-coding Genetic Algorithm 改进的实编码遗传算法
J. An, Hai-juan Jin, Chaohun Liu
To solve the slow convergence rate and local convergence of Simple Genetic Algorithm, an improved genetic algorithm (IGA) with real-coding, elite reservation, 2/4competitive choosing and adaptive genetic strategy is proposed. The experiment shows that the improved algorithm is more effective in realizing the global optimization and promoting evolution efficiency.
针对简单遗传算法收敛速度慢和局部收敛的问题,提出了一种具有实数编码、精英保留、2/4竞争选择和自适应遗传策略的改进遗传算法(IGA)。实验表明,改进后的算法在实现全局优化和提高进化效率方面更加有效。
{"title":"Improved Real-coding Genetic Algorithm","authors":"J. An, Hai-juan Jin, Chaohun Liu","doi":"10.1109/NSWCTC.2009.335","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.335","url":null,"abstract":"To solve the slow convergence rate and local convergence of Simple Genetic Algorithm, an improved genetic algorithm (IGA) with real-coding, elite reservation, 2/4competitive choosing and adaptive genetic strategy is proposed. The experiment shows that the improved algorithm is more effective in realizing the global optimization and promoting evolution efficiency.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of N-way Dual-Frequency Power Divider Base on Genetic Algorithm 基于遗传算法的n路双频功率分配器设计
Wei Wang, Wencheng Li, Dan Chen
A N-way dual-frequency power divider designed with genetic algorithm is proposed. The structure of power divider is composed of n two-section transmission line transformers and n isolation resisters. After even-odd mode analysis with ideal transmission-line model, the optimal parameters are obtained with genetic algorithm. In the genetic algorithm, elitist strategy, crossover and mutation of changing probability are preserved to prevent premature convergence, and to avoid complex formula derivation, one can get the optimized results rapidly and efficiently. The performance of the power divider is analyzed by simulation with software ADS. The results show that impedance is matching at all ports and isolation meet the application requirements.
提出了一种采用遗传算法设计的n路双频功率分配器。功率分配器的结构由n个两段传输线变压器和n个隔离电阻组成。通过对理想输电在线模型进行奇偶模态分析,利用遗传算法得到最优参数。遗传算法中保留了精英策略、改变概率的交叉和变异,避免了过早收敛,避免了复杂的公式推导,可以快速有效地得到优化结果。利用ADS软件对功率分配器的性能进行了仿真分析,结果表明各端口阻抗匹配,隔离度满足应用要求。
{"title":"Design of N-way Dual-Frequency Power Divider Base on Genetic Algorithm","authors":"Wei Wang, Wencheng Li, Dan Chen","doi":"10.1109/NSWCTC.2009.65","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.65","url":null,"abstract":"A N-way dual-frequency power divider designed with genetic algorithm is proposed. The structure of power divider is composed of n two-section transmission line transformers and n isolation resisters. After even-odd mode analysis with ideal transmission-line model, the optimal parameters are obtained with genetic algorithm. In the genetic algorithm, elitist strategy, crossover and mutation of changing probability are preserved to prevent premature convergence, and to avoid complex formula derivation, one can get the optimized results rapidly and efficiently. The performance of the power divider is analyzed by simulation with software ADS. The results show that impedance is matching at all ports and isolation meet the application requirements.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Topology and Routing Schemes for Fault-Tolerant Clos Network 容错Clos网络的拓扑和路由方案
Xinming Duan, Dakun Zhang, Xuemei Sun
In this paper, a new fault-tolerant Clos network is presented by adding extra switches and redirecting boxes in ordinary Clos network. The extra switches and redirecting boxes can improve the run time of the routing algorithm significantly when the Clos network displays few or no faults. The paper also presents a fault-tolerant routing algorithm for fault-tolerant Clos network. This algorithm employs a minimum distribution priority scheme handling Clos specification matrix column by column and completely achieves rearrangeable non-blocking routing. The fault-tolerant routing algorithm can reach a low time complexity O(N3/2) even in the worst case. Thus, the presented fault-tolerant Clos network and its routing algorithm are readily applicable to more Reliable Clos network.
本文通过在普通Clos网络中增加额外的交换机和重定向盒,提出了一种新的容错Clos网络。当Clos网络出现很少或没有故障时,额外的交换机和重定向盒可以显著提高路由算法的运行时间。本文还提出了一种容错Clos网络的容错路由算法。该算法采用最小分布优先级方案逐列处理Clos规范矩阵,完全实现了可重排的无阻塞路由。容错路由算法即使在最坏的情况下也能达到较低的时间复杂度O(N3/2)。因此,本文提出的容错Clos网络及其路由算法可以应用于更可靠的Clos网络。
{"title":"Topology and Routing Schemes for Fault-Tolerant Clos Network","authors":"Xinming Duan, Dakun Zhang, Xuemei Sun","doi":"10.1109/NSWCTC.2009.362","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.362","url":null,"abstract":"In this paper, a new fault-tolerant Clos network is presented by adding extra switches and redirecting boxes in ordinary Clos network. The extra switches and redirecting boxes can improve the run time of the routing algorithm significantly when the Clos network displays few or no faults. The paper also presents a fault-tolerant routing algorithm for fault-tolerant Clos network. This algorithm employs a minimum distribution priority scheme handling Clos specification matrix column by column and completely achieves rearrangeable non-blocking routing. The fault-tolerant routing algorithm can reach a low time complexity O(N3/2) even in the worst case. Thus, the presented fault-tolerant Clos network and its routing algorithm are readily applicable to more Reliable Clos network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128615639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1