ID | 原文 | 译文 |
4303 | NS3 仿真结果表明,所提方法显著提高了 IEEE 802.11ah 协议的网络性能。 | NS3 simulation results show that the proposed method significantly improves the performance of IEEE 802.11ah protocol networks. |
4304 | 针对传统动态迁移方法在应对侧信道攻击问题时存在迁移节点多、迁移频率高、迁移后服务功能链路径过长的问题,提出了一种基于风险感知的关键虚拟网络功能动态迁移方法。 | Aiming at the problems that traditional dynamic migration methods have many migration nodes, high migra-tion frequency, and long service function chain (SFC) link path after migration when dealing with side channel attack, adynamic migration method of critical virtual network function (VNF) based on risk awareness was proposed. |
4305 | 所提方法仅对含隐私信息的关键虚拟网络功能进行迁移,以减少迁移节点数量; | In order to reduce the number of migrated nodes, only the key VNF with private information was migrated. |
4306 | 结合侧信道攻击检测系统,对遭受攻击的关键虚拟网络功能执行触发式迁移,同时依据侧信道信息泄露模型对关键虚拟网络功能进行定期式迁移; | Combined with the sidechannel attack detection system, the triggering migration was performed on the critical VNF which were under attack,and the key VNF was also periodically migrated according to the side channel information leakage model. |
4307 | 采用基于逼近理想解排序的多属性节点排序方法选择迁移目的服务器,以避免迁移后路径过长。 | Finally, a mul-ti-attribute node sorting method base on the technique for order preference by similarity to ideal solution was used to se-lect the migration destination server to avoid the path being too long after migration. |
4308 | 实验结果表明,所提方法在达到相同的侧信道攻击防御性能的情况下,具有更低的节点迁移数量与迁移频率,同时有效避免了迁移后服务功能链路径过长问题。 | Experiments show that the proposedmethod has a lower number of migration nodes and migration frequency when achieving the same side channel attackdefense performance, and effectively avoids the problem that the SFC path is too long after migration.Key words: service function chain, virtual network function, side-channel attack, dynamic migration, |
4309 | 针对公钥加密方案的陷门安全问题,引入随机数构造陷门与索引,用于抵御来自服务器内部的关键字猜测攻击,避免因服务器好奇行为带来的数据泄露。 | Aiming at the trapdoor security problem of the public key encryption scheme, a random number constructingtrapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakagecaused by server curious behavior. |
4310 | 对第三方的可信问题进行研究,将区块链技术与可搜索加密方案相结合,使用智能合约作为可信第三方进行检索工作,既可以防止服务器内部的关键字猜测攻击,又可以保证检索结果的正确性,从而限制服务器在下发数据时的恶意行为。 | Research on trusted issues of third parties, the blockchain mechanism with a searcha-ble encryption scheme was combined, and smart contracts as trusted third parties for retrieval was used, which couldprevent keyword guessing attacks inside the server and ensure retrieval. The correctness of the results, thereby limitingthe malicious behavior of the server when sending data. |
4311 | 通过安全性分析,验证了所提方案满足 IND-KGA安全性。 | The solution was analyzed for security and the verificationscheme satisfies IND-KGA security. |
4312 | 经过与其他方案进行实验对比,证明了所提方案在时间开销上具有一定的优势。 | Experiments in real data sets, compared with other programs, prove that the programhas certain advantages in time overhead. |