Threat analysis for space information network based on network security attributes: a review
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot...
Ausführliche Beschreibung
Autor*in: |
Wu, Xuesong [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2022 |
---|
Schlagwörter: |
---|
Anmerkung: |
© The Author(s) 2022 |
---|
Übergeordnetes Werk: |
Enthalten in: Complex & intelligent systems - Berlin : SpringerOpen, 2015, 9(2022), 3 vom: 28. Nov., Seite 3429-3468 |
---|---|
Übergeordnetes Werk: |
volume:9 ; year:2022 ; number:3 ; day:28 ; month:11 ; pages:3429-3468 |
Links: |
---|
DOI / URN: |
10.1007/s40747-022-00899-z |
---|
Katalog-ID: |
SPR051855534 |
---|
LEADER | 01000naa a22002652 4500 | ||
---|---|---|---|
001 | SPR051855534 | ||
003 | DE-627 | ||
005 | 20230610064809.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230610s2022 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s40747-022-00899-z |2 doi | |
035 | |a (DE-627)SPR051855534 | ||
035 | |a (SPR)s40747-022-00899-z-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Wu, Xuesong |e verfasserin |4 aut | |
245 | 1 | 0 | |a Threat analysis for space information network based on network security attributes: a review |
264 | 1 | |c 2022 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a © The Author(s) 2022 | ||
520 | |a Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. | ||
650 | 4 | |a Space information network |7 (dpeaa)DE-He213 | |
650 | 4 | |a Network security attribute |7 (dpeaa)DE-He213 | |
650 | 4 | |a Threat analysis |7 (dpeaa)DE-He213 | |
650 | 4 | |a Secure communication mechanism |7 (dpeaa)DE-He213 | |
650 | 4 | |a Satellite network security |7 (dpeaa)DE-He213 | |
700 | 1 | |a Du, Ye |4 aut | |
700 | 1 | |a Fan, Tao |4 aut | |
700 | 1 | |a Guo, Junyan |4 aut | |
700 | 1 | |a Ren, Jie |4 aut | |
700 | 1 | |a Wu, Runfang |4 aut | |
700 | 1 | |a Zheng, Tianshuai |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Complex & intelligent systems |d Berlin : SpringerOpen, 2015 |g 9(2022), 3 vom: 28. Nov., Seite 3429-3468 |w (DE-627)835589269 |w (DE-600)2834740-7 |x 2198-6053 |7 nnns |
773 | 1 | 8 | |g volume:9 |g year:2022 |g number:3 |g day:28 |g month:11 |g pages:3429-3468 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s40747-022-00899-z |z kostenfrei |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 9 |j 2022 |e 3 |b 28 |c 11 |h 3429-3468 |
author_variant |
x w xw y d yd t f tf j g jg j r jr r w rw t z tz |
---|---|
matchkey_str |
article:21986053:2022----::hetnlssosaenomtontokaeontoke |
hierarchy_sort_str |
2022 |
publishDate |
2022 |
allfields |
10.1007/s40747-022-00899-z doi (DE-627)SPR051855534 (SPR)s40747-022-00899-z-e DE-627 ger DE-627 rakwb eng Wu, Xuesong verfasserin aut Threat analysis for space information network based on network security attributes: a review 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © The Author(s) 2022 Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. Space information network (dpeaa)DE-He213 Network security attribute (dpeaa)DE-He213 Threat analysis (dpeaa)DE-He213 Secure communication mechanism (dpeaa)DE-He213 Satellite network security (dpeaa)DE-He213 Du, Ye aut Fan, Tao aut Guo, Junyan aut Ren, Jie aut Wu, Runfang aut Zheng, Tianshuai aut Enthalten in Complex & intelligent systems Berlin : SpringerOpen, 2015 9(2022), 3 vom: 28. Nov., Seite 3429-3468 (DE-627)835589269 (DE-600)2834740-7 2198-6053 nnns volume:9 year:2022 number:3 day:28 month:11 pages:3429-3468 https://dx.doi.org/10.1007/s40747-022-00899-z kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 9 2022 3 28 11 3429-3468 |
spelling |
10.1007/s40747-022-00899-z doi (DE-627)SPR051855534 (SPR)s40747-022-00899-z-e DE-627 ger DE-627 rakwb eng Wu, Xuesong verfasserin aut Threat analysis for space information network based on network security attributes: a review 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © The Author(s) 2022 Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. Space information network (dpeaa)DE-He213 Network security attribute (dpeaa)DE-He213 Threat analysis (dpeaa)DE-He213 Secure communication mechanism (dpeaa)DE-He213 Satellite network security (dpeaa)DE-He213 Du, Ye aut Fan, Tao aut Guo, Junyan aut Ren, Jie aut Wu, Runfang aut Zheng, Tianshuai aut Enthalten in Complex & intelligent systems Berlin : SpringerOpen, 2015 9(2022), 3 vom: 28. Nov., Seite 3429-3468 (DE-627)835589269 (DE-600)2834740-7 2198-6053 nnns volume:9 year:2022 number:3 day:28 month:11 pages:3429-3468 https://dx.doi.org/10.1007/s40747-022-00899-z kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 9 2022 3 28 11 3429-3468 |
allfields_unstemmed |
10.1007/s40747-022-00899-z doi (DE-627)SPR051855534 (SPR)s40747-022-00899-z-e DE-627 ger DE-627 rakwb eng Wu, Xuesong verfasserin aut Threat analysis for space information network based on network security attributes: a review 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © The Author(s) 2022 Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. Space information network (dpeaa)DE-He213 Network security attribute (dpeaa)DE-He213 Threat analysis (dpeaa)DE-He213 Secure communication mechanism (dpeaa)DE-He213 Satellite network security (dpeaa)DE-He213 Du, Ye aut Fan, Tao aut Guo, Junyan aut Ren, Jie aut Wu, Runfang aut Zheng, Tianshuai aut Enthalten in Complex & intelligent systems Berlin : SpringerOpen, 2015 9(2022), 3 vom: 28. Nov., Seite 3429-3468 (DE-627)835589269 (DE-600)2834740-7 2198-6053 nnns volume:9 year:2022 number:3 day:28 month:11 pages:3429-3468 https://dx.doi.org/10.1007/s40747-022-00899-z kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 9 2022 3 28 11 3429-3468 |
allfieldsGer |
10.1007/s40747-022-00899-z doi (DE-627)SPR051855534 (SPR)s40747-022-00899-z-e DE-627 ger DE-627 rakwb eng Wu, Xuesong verfasserin aut Threat analysis for space information network based on network security attributes: a review 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © The Author(s) 2022 Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. Space information network (dpeaa)DE-He213 Network security attribute (dpeaa)DE-He213 Threat analysis (dpeaa)DE-He213 Secure communication mechanism (dpeaa)DE-He213 Satellite network security (dpeaa)DE-He213 Du, Ye aut Fan, Tao aut Guo, Junyan aut Ren, Jie aut Wu, Runfang aut Zheng, Tianshuai aut Enthalten in Complex & intelligent systems Berlin : SpringerOpen, 2015 9(2022), 3 vom: 28. Nov., Seite 3429-3468 (DE-627)835589269 (DE-600)2834740-7 2198-6053 nnns volume:9 year:2022 number:3 day:28 month:11 pages:3429-3468 https://dx.doi.org/10.1007/s40747-022-00899-z kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 9 2022 3 28 11 3429-3468 |
allfieldsSound |
10.1007/s40747-022-00899-z doi (DE-627)SPR051855534 (SPR)s40747-022-00899-z-e DE-627 ger DE-627 rakwb eng Wu, Xuesong verfasserin aut Threat analysis for space information network based on network security attributes: a review 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © The Author(s) 2022 Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. Space information network (dpeaa)DE-He213 Network security attribute (dpeaa)DE-He213 Threat analysis (dpeaa)DE-He213 Secure communication mechanism (dpeaa)DE-He213 Satellite network security (dpeaa)DE-He213 Du, Ye aut Fan, Tao aut Guo, Junyan aut Ren, Jie aut Wu, Runfang aut Zheng, Tianshuai aut Enthalten in Complex & intelligent systems Berlin : SpringerOpen, 2015 9(2022), 3 vom: 28. Nov., Seite 3429-3468 (DE-627)835589269 (DE-600)2834740-7 2198-6053 nnns volume:9 year:2022 number:3 day:28 month:11 pages:3429-3468 https://dx.doi.org/10.1007/s40747-022-00899-z kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 9 2022 3 28 11 3429-3468 |
language |
English |
source |
Enthalten in Complex & intelligent systems 9(2022), 3 vom: 28. Nov., Seite 3429-3468 volume:9 year:2022 number:3 day:28 month:11 pages:3429-3468 |
sourceStr |
Enthalten in Complex & intelligent systems 9(2022), 3 vom: 28. Nov., Seite 3429-3468 volume:9 year:2022 number:3 day:28 month:11 pages:3429-3468 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Space information network Network security attribute Threat analysis Secure communication mechanism Satellite network security |
isfreeaccess_bool |
true |
container_title |
Complex & intelligent systems |
authorswithroles_txt_mv |
Wu, Xuesong @@aut@@ Du, Ye @@aut@@ Fan, Tao @@aut@@ Guo, Junyan @@aut@@ Ren, Jie @@aut@@ Wu, Runfang @@aut@@ Zheng, Tianshuai @@aut@@ |
publishDateDaySort_date |
2022-11-28T00:00:00Z |
hierarchy_top_id |
835589269 |
id |
SPR051855534 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">SPR051855534</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230610064809.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230610s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s40747-022-00899-z</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR051855534</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s40747-022-00899-z-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Xuesong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat analysis for space information network based on network security attributes: a review</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s) 2022</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Space information network</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security attribute</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Threat analysis</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Secure communication mechanism</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Satellite network security</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Du, Ye</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fan, Tao</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guo, Junyan</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ren, Jie</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wu, Runfang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zheng, Tianshuai</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Complex & intelligent systems</subfield><subfield code="d">Berlin : SpringerOpen, 2015</subfield><subfield code="g">9(2022), 3 vom: 28. Nov., Seite 3429-3468</subfield><subfield code="w">(DE-627)835589269</subfield><subfield code="w">(DE-600)2834740-7</subfield><subfield code="x">2198-6053</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:9</subfield><subfield code="g">year:2022</subfield><subfield code="g">number:3</subfield><subfield code="g">day:28</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:3429-3468</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s40747-022-00899-z</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">9</subfield><subfield code="j">2022</subfield><subfield code="e">3</subfield><subfield code="b">28</subfield><subfield code="c">11</subfield><subfield code="h">3429-3468</subfield></datafield></record></collection>
|
author |
Wu, Xuesong |
spellingShingle |
Wu, Xuesong misc Space information network misc Network security attribute misc Threat analysis misc Secure communication mechanism misc Satellite network security Threat analysis for space information network based on network security attributes: a review |
authorStr |
Wu, Xuesong |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)835589269 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
2198-6053 |
topic_title |
Threat analysis for space information network based on network security attributes: a review Space information network (dpeaa)DE-He213 Network security attribute (dpeaa)DE-He213 Threat analysis (dpeaa)DE-He213 Secure communication mechanism (dpeaa)DE-He213 Satellite network security (dpeaa)DE-He213 |
topic |
misc Space information network misc Network security attribute misc Threat analysis misc Secure communication mechanism misc Satellite network security |
topic_unstemmed |
misc Space information network misc Network security attribute misc Threat analysis misc Secure communication mechanism misc Satellite network security |
topic_browse |
misc Space information network misc Network security attribute misc Threat analysis misc Secure communication mechanism misc Satellite network security |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Complex & intelligent systems |
hierarchy_parent_id |
835589269 |
hierarchy_top_title |
Complex & intelligent systems |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)835589269 (DE-600)2834740-7 |
title |
Threat analysis for space information network based on network security attributes: a review |
ctrlnum |
(DE-627)SPR051855534 (SPR)s40747-022-00899-z-e |
title_full |
Threat analysis for space information network based on network security attributes: a review |
author_sort |
Wu, Xuesong |
journal |
Complex & intelligent systems |
journalStr |
Complex & intelligent systems |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2022 |
contenttype_str_mv |
txt |
container_start_page |
3429 |
author_browse |
Wu, Xuesong Du, Ye Fan, Tao Guo, Junyan Ren, Jie Wu, Runfang Zheng, Tianshuai |
container_volume |
9 |
format_se |
Elektronische Aufsätze |
author-letter |
Wu, Xuesong |
doi_str_mv |
10.1007/s40747-022-00899-z |
title_sort |
threat analysis for space information network based on network security attributes: a review |
title_auth |
Threat analysis for space information network based on network security attributes: a review |
abstract |
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. © The Author(s) 2022 |
abstractGer |
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. © The Author(s) 2022 |
abstract_unstemmed |
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN. © The Author(s) 2022 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
3 |
title_short |
Threat analysis for space information network based on network security attributes: a review |
url |
https://dx.doi.org/10.1007/s40747-022-00899-z |
remote_bool |
true |
author2 |
Du, Ye Fan, Tao Guo, Junyan Ren, Jie Wu, Runfang Zheng, Tianshuai |
author2Str |
Du, Ye Fan, Tao Guo, Junyan Ren, Jie Wu, Runfang Zheng, Tianshuai |
ppnlink |
835589269 |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.1007/s40747-022-00899-z |
up_date |
2024-07-04T00:06:42.368Z |
_version_ |
1803604829006725120 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">SPR051855534</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230610064809.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230610s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s40747-022-00899-z</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR051855534</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s40747-022-00899-z-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Xuesong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat analysis for space information network based on network security attributes: a review</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s) 2022</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Space information network</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security attribute</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Threat analysis</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Secure communication mechanism</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Satellite network security</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Du, Ye</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fan, Tao</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guo, Junyan</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ren, Jie</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wu, Runfang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zheng, Tianshuai</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Complex & intelligent systems</subfield><subfield code="d">Berlin : SpringerOpen, 2015</subfield><subfield code="g">9(2022), 3 vom: 28. Nov., Seite 3429-3468</subfield><subfield code="w">(DE-627)835589269</subfield><subfield code="w">(DE-600)2834740-7</subfield><subfield code="x">2198-6053</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:9</subfield><subfield code="g">year:2022</subfield><subfield code="g">number:3</subfield><subfield code="g">day:28</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:3429-3468</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s40747-022-00899-z</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">9</subfield><subfield code="j">2022</subfield><subfield code="e">3</subfield><subfield code="b">28</subfield><subfield code="c">11</subfield><subfield code="h">3429-3468</subfield></datafield></record></collection>
|
score |
7.399954 |