{"id":"https://openalex.org/W2434466158","doi":"https://doi.org/10.1109/chinacom.2015.7498063","title":"Design and implementation of trusted routing strategy based on IPv6 flow identification","display_name":"Design and implementation of trusted routing strategy based on IPv6 flow identification","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2434466158","doi":"https://doi.org/10.1109/chinacom.2015.7498063","mag":"2434466158"},"language":"en","primary_location":{"id":"doi:10.1109/chinacom.2015.7498063","is_oa":false,"landing_page_url":"https://doi.org/10.1109/chinacom.2015.7498063","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Conference on Communications and Networking in China (ChinaCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004110781","display_name":"Ansheng YIN -","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ansheng Yin","raw_affiliation_strings":["Engineering Research Center of Broadband Wireless Communication Technology, Ministry of Education Nanjing University of Posts and Telecommunications Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Broadband Wireless Communication Technology, Ministry of Education Nanjing University of Posts and Telecommunications Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045638177","display_name":"Shunyi Zhang","orcid":"https://orcid.org/0009-0009-0425-2559"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunyi Zhang","raw_affiliation_strings":["Engineering Research Center of Broadband Wireless Communication Technology, Ministry of Education Nanjing University of Posts and Telecommunications Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Broadband Wireless Communication Technology, Ministry of Education Nanjing University of Posts and Telecommunications Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004110781"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":1.0246,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.87298621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"19","issue":null,"first_page":"887","last_page":"892"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7665491700172424},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7146739363670349},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.6013548970222473},{"id":"https://openalex.org/keywords/enhanced-interior-gateway-routing-protocol","display_name":"Enhanced Interior Gateway Routing Protocol","score":0.57712322473526},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5150198936462402},{"id":"https://openalex.org/keywords/ipv4","display_name":"IPv4","score":0.49706152081489563},{"id":"https://openalex.org/keywords/zone-routing-protocol","display_name":"Zone Routing Protocol","score":0.4778537452220917},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.4706558287143707},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.4623123109340668},{"id":"https://openalex.org/keywords/policy-based-routing","display_name":"Policy-based routing","score":0.4520060420036316},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.43012046813964844},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3715389370918274},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34271740913391113},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11568596959114075},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09866347908973694}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7665491700172424},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7146739363670349},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.6013548970222473},{"id":"https://openalex.org/C87044965","wikidata":"https://www.wikidata.org/wiki/Q1091139","display_name":"Enhanced Interior Gateway Routing Protocol","level":5,"score":0.57712322473526},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5150198936462402},{"id":"https://openalex.org/C2779233093","wikidata":"https://www.wikidata.org/wiki/Q11103","display_name":"IPv4","level":4,"score":0.49706152081489563},{"id":"https://openalex.org/C189884158","wikidata":"https://www.wikidata.org/wiki/Q8073926","display_name":"Zone Routing Protocol","level":5,"score":0.4778537452220917},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.4706558287143707},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.4623123109340668},{"id":"https://openalex.org/C196423136","wikidata":"https://www.wikidata.org/wiki/Q7209671","display_name":"Policy-based routing","level":5,"score":0.4520060420036316},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.43012046813964844},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3715389370918274},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34271740913391113},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11568596959114075},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09866347908973694}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/chinacom.2015.7498063","is_oa":false,"landing_page_url":"https://doi.org/10.1109/chinacom.2015.7498063","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Conference on Communications and Networking in China (ChinaCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W186819605","https://openalex.org/W1985702577","https://openalex.org/W2000338940","https://openalex.org/W2031232069","https://openalex.org/W2032087901","https://openalex.org/W2043515430","https://openalex.org/W2048643145","https://openalex.org/W2096371059","https://openalex.org/W2115703056","https://openalex.org/W2130234299","https://openalex.org/W2131727629","https://openalex.org/W2132082225","https://openalex.org/W2135632803","https://openalex.org/W2323363012","https://openalex.org/W2365996629","https://openalex.org/W6607589067"],"related_works":["https://openalex.org/W2349428606","https://openalex.org/W2360869876","https://openalex.org/W3004929566","https://openalex.org/W1849784828","https://openalex.org/W2374277641","https://openalex.org/W2391251019","https://openalex.org/W2791057254","https://openalex.org/W2347589432","https://openalex.org/W2129227231","https://openalex.org/W2391250720"],"abstract_inverted_index":{"Research":[0],"on":[1,16,27,37,60,85],"trusted":[2,10,33],"routing":[3,18,34,83],"emerges":[4],"in":[5],"the":[6,13,17,38,90],"wake":[7],"of":[8,20,41,94],"burgeoning":[9],"networks.":[11],"Currently,":[12],"research":[14],"focuses":[15],"strategies":[19],"lightweight":[21],"network,":[22],"which":[23,43],"is":[24,44],"mainly":[25],"based":[26,36,84],"IPv4.":[28],"This":[29],"paper":[30,65],"presents":[31],"a":[32,50,68],"scheme":[35],"flow":[39,51,86],"label":[40,87],"IPv6,":[42],"to":[45,54],"be":[46],"achieved":[47],"by":[48],"adding":[49],"identification":[52],"module":[53],"(Trusted":[55],"Network":[56],"Connection)TNC":[57],"module.":[58],"Drawing":[59],"Previous":[61],"Proxy":[62],"ARP,":[63],"this":[64,77],"also":[66],"designs":[67],"proxy-based":[69],"virtual":[70],"link":[71],"protocol.":[72],"Experiments":[73],"have":[74],"proved":[75],"that":[76],"new":[78],"protocol":[79],"can":[80],"achieve":[81],"IPv6":[82],"and":[88,92],"improve":[89],"security":[91],"quality":[93],"information":[95],"transmission.":[96]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
