Study on the DDS Network Information Security Technology

Article Preview

Abstract:

The paper firstly analyzes security and stability existed in the DDS network, and then finds that present DDS regulations cannot guarantee information’s confidentiality and integrity when facing an attack. Based on this, the paper puts forward a core thought of data analysis. According to the draft of DDS information security regulation, the paper analyzes information security threats that the DDS system must face, provides corresponding information security strategies in accordance with data granularity and operation means, and designs and realizes an information security model based on DDS. The security model there into is divided into three levels: boundary security, transmission security and data application security of fine granularity. At the same time, the paper also analyzes several important elements which influence DDS network security in detail, and then designs again the data-centered publication/subscription model. Finally, through the model testing by a lot of experiments, the experimental results show that: the model not only largely improves security of DDS network information, but also has already promoted stability and reliability of data transmission process.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1213-1216

Citation:

Online since:

March 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] S.S. Dai, Y. Zhang: A Wireless Physiological Multi-parameter Monitoring System Based on Mobile Communication Networks, Proc. of IEEE International Symposium on Computer based Medical Systems. IEEE Press, (2006).

DOI: 10.1109/cbms.2006.1

Google Scholar

[2] E. C. Marie, B. Ainat, H. Kim: The American Journal of Cardiology Vol. 84(2010), pp.860-862.

Google Scholar

[3] P. C. Gerardo: OMG Data-Distribution Service (DDS): Architectural Update, 2004 IEEE Military Communications Conference Vol. 2(2004), p.961~967.

DOI: 10.1109/milcom.2004.1494965

Google Scholar

[4] A .M. Saleh, R.A. Valenzuela: IEEE Journal on Selected Areas in Communications Vol. 5(2011), pp.128-137.

Google Scholar

[5] H. Hashemi: IEEE Journal on Selected Areas in Communications Vol. 11(2010), pp.967-978.

Google Scholar

[6] J.J. Yuan, X. S . Yang, Z.M. Tian: A Multipath Delay Model for Indoor UltraWideband Systems, USA: IEEE Press, (2012).

Google Scholar

[7] A. Thusoo, Z. Shao, S. Anthony: Data warehousing and analytics infrastructure at facebook, ACM, (2010).

Google Scholar