Figure - available from: Transactions on Emerging Telecommunications Technologies
This content is subject to copyright. Terms and conditions apply.
Comparison of multipath transmission models

Comparison of multipath transmission models

Source publication
Article
Full-text available
Cyber security is the basis of ensuring reliable network transmission. In addition to encrypting the data, dividing the data into multiple paths for transmission is also an important way to improve the security. However, the development of semantic analysis algorithms leads to the fact that the eavesdroppers can restore the data as long as they obt...

Similar publications

Article
Full-text available
Coastal areas serve as a vital interface between the land and sea or ocean and host about 40% of the world’s population, providing significant social, economic, and ecological functions. Meanwhile, the sea-level rise caused by climate change, along with coastal erosion and accretion, alters coastal landscapes profoundly, threatening coastal sustain...
Preprint
Full-text available
This study presents critical infrastructure network component vulnerability in the 2015 Illapel tsunami at Coquimbo, Chile. We analyse road and utility pole vulnerability to physical damage based on modelled tsunami hazard intensity (depth, velocity and hydrodynamic force) and network component characteristics. A Random Forest Model and Spearman’s...

Citations

... Liu et al [16] research Established on Fountain Code -FMPST to obtain Multipath Transmission Algorithm. Investigations have revealed that FMPST can recover data safety by three times more and decrease communication latency by at least 50% compared to other multipath transmission algorithms. ...
Article
Full-text available
The Internet's growth in popularity requires computer networks for both agility and resilience. Recently, unable to satisfy the computer needs for traditional networking systems. Software Defined Networking (SDN) is known as a paradigm shift in the networking industry. Many organizations are used SDN due to their efficiency of transmission. Striking the right balance between SDN and legacy switching capabilities will enable successful network scenarios in architecture networks. Therefore, this object grand scenario for a hybrid network where the external perimeter transport device is replaced with an SDN device in the service provider network. With the moving away from older networks to SDN, hybrid SDN includes both legacy and SDN switches. Existing models of SDN have limitations such as overfitting, local optimal trapping, and poor path selection efficiency. This paper proposed a Deep Kronecker Neural Network (DKNN) to improve its efficiency with a moderate optimization method for multipath selection in SDN. Dynamic resource scheduling is used for the reward function the learning performance is improved by the deep reinforcement learning (DRL) technique. The controller for centralised SDN acts as a network brain in the control plane. Among the most important duties network is selected for the best SDN controller. It is vulnerable to invasions and the controller becomes a network bottleneck. This study presents an intrusion detection system (IDS) based on the SDN model that runs as an application module within the controller. Therefore, this study suggested the feature extraction and classification of contractive auto-encoder with a triple attention-based classifier. Additionally, this study leveraged the best performing SDN controllers on which many other SDN controllers are based on OpenDayLight (ODL) provides an open northbound API and supports multiple southbound protocols. Therefore, one of the main issues in the multi-controller placement problem (CPP) that addresses needed in the setting of SDN specifically when different aspects in interruption, ability, authenticity and load distribution are being considered. Introducing the scenario concept, CPP is formulated as a robust optimization problem that considers changes in network status due to power outages, controller’s capacity, load fluctuations and changes in switches demand. Therefore, to improve network performance, it is planned to improve the optimal amount of controller placements by simulated annealing using different topologies the modified Dragonfly optimization algorithm (MDOA).
... Literature [22] proposes a weighted online fountain code with low feedback, which can reduce buffer occupancy and feedback transmission with good intermediate performance by adjusting the weights. A secure multipath transmission algorithm based on fountain codes-FMPST is proposed in the literature [23], which evaluates the channel packet loss rate through an improved random forest model and utilizes the FMPST algorithm to reduce data leakage and link congestion. For the communication confidentiality protocol is easy to be deciphered and stolen, literature [24], [25] pointed out that LT code, SLT code, and other fountain codes can be used as antieavesdropping codes, and combining them can greatly increase the untranslated rate of eavesdroppers. ...
Article
Full-text available
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design. This method targets the Luby Transform (LT) code transmission for some of the original symbols of the Shifted LT (SLT) code and utilizes the fountain code to receive the correct symbols in different noise channels with differential characteristics so that the decoding process of the eavesdropper changes and cannot be decoded in synchronization with the legitimate receivers, and then the partial symbols of the recovered source are different from those of the legitimate receivers. When these symbols continue to participate in SLT decoding, increasing the untranslated rate of the eavesdropper. Experimental results show that although the method proposed in this paper increases the number of decoded symbols by a small amount, the eavesdropper untranslated rate of this scheme gets improved by about 15% when the main channel or the wiretap channel is varied individually, compared with LT code and SLT code. When both the main channel and the wiretap channel are varied simultaneously, the untranslated rate of the eavesdropper in this scheme gets approximately 30% higher compared to LT code and SLT code, and the untranslated rate of the eavesdropper in this scheme gets approximately 14% higher compared to SLT-LT fountain code. When the main channel is worse or slightly better than the wiretap channel, the untranslated rate of eavesdroppers of this scheme is better than that of SLT-LT fountain code, which effectively ensures secure transmission of information.
Conference Paper
Low Earth orbit (LEO) satellite networks, which feature low-latency and full-coverage connectivity, promise to revolutionize the Internet and become an indispensable part of the next-generation communications network. However, due to the limited bandwidth and processing resources available on board, LEO satellite networks are susceptible to network attacks, especially link flooding attacks (LFAs). LFAs are a specific type of the notorious DoS attack where the attacker tries to cut off critical network links using seemingly legitimate traffic. Unlike attacks targeted directly on servers, LFAs undermine networks in a more insidious manner. In this paper, we present DoSat (DDoS on Satellites), an LFA attack model that focuses on the time-varying topology of satellite networks. The model takes advantage of such an opportunity to concentrate attack traffic: the traffic having been sent out during the process of path delay switching will reach the destination in tandem. We demonstrate through simulation experiments that DoSat can reduce the cost of LFAs by approximately 20% without any tradeoffs of attack’s undetectability.