Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Research summary of secure routing protocol for low-power and lossy networks
LUO Yujie, ZHANG Jian, TANG Zhangguo, LI Huanzhou
Journal of Computer Applications    2018, 38 (12): 3462-3470.   DOI: 10.11772/j.issn.1001-9081.2018051067
Abstract378)      PDF (1423KB)(303)       Save
With the rapid development of the Internet of Things (IoT), the research and application of Low-power and Lossy Network (LLN) has become a trend of development. Firstly, the basic principle and structure of IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) and Routing Protocol for Low-power and lossy network (RPL) were introduced. Secondly, the main security threats of RPL routing in LLN and the corresponding solutions were summarized, classified and compared through the different strategies adopted by the protocol. Then, the research status of existing secure RPL at home and abroad was introduced and analyzed. At the same time, the existing security threats and solutions were summarized. Finally, the security issues and development trends that needed to be further studied in large-scale, mobile, self-organizing and low-power RPL were proposed.
Reference | Related Articles | Metrics
Heuristic detection system of Trojan based on trajectory analysis
ZHONG Mingquan, FAN Yu, LI Huanzhou, TANG Zhangguo, ZHANG Jian
Journal of Computer Applications    2015, 35 (3): 756-760.   DOI: 10.11772/j.issn.1001-9081.2015.03.756
Abstract461)      PDF (771KB)(373)       Save

Concerning of the low accurate rate of active defense technology, a heuristic detection system of Trojan based on the analysis of trajectory was proposed. Two kinds of typical Trojan trajectories were presented, and by using the behavioral data on Trojan trajectory the danger level of the suspicious file was detected with the decision rules and algorithm. The experimental results show that the performance of detecting unknown Trojan of this system is better than that of the traditional method, and some special Trojans can also be detected.

Reference | Related Articles | Metrics