JOURNAL ARTICLE

Towards Double Defense Network Security Based on Multi-Identifier Network Architecture

Yunmin WangAbla SmahiHuayu ZhangHui Li

Year: 2022 Journal:   Sensors Vol: 22 (3)Pages: 747-747   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

Recently, more and more mobile devices have been connected to the Internet. The Internet environment is complicated, and network security incidents emerge endlessly. Traditional blocking and killing passive defense measures cannot fundamentally meet the network security requirements. Inspired by the heuristic establishment of multiple lines of defense in immunology, we designed and prototyped a Double Defense strategy with Endogenous Safety and Security (DDESS) based on multi-identifier network (MIN) architecture. DDESS adopts the idea of a zero-trust network, with identity authentication as the core for access control, which solves security problems of traditional IP networks. In addition, DDESS achieves individual static security defense through encryption and decryption, consortium blockchain, trusted computing whitelist, and remote attestation strategies. At the same time, with the dynamic collection of data traffic and access logs, as well as the understanding and prediction of the situation, DDESS can realize the situation awareness of network security and the cultivation of immune vaccines against unknown network attacks, thus achieving the active herd defense of network security.

Keywords:
Computer security Computer science Network Access Control Identifier Network security Computer network Network security policy Authentication (law) Internet security Security service Cloud computing security Information security Cloud computing

Metrics

9
Cited By
1.00
FWCI (Field Weighted Citation Impact)
47
Refs
0.64
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Artificial Immune Systems Applications
Physical Sciences →  Engineering →  Biomedical Engineering
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Identifier-based universal network architecture

Journal:   China Communications Year: 2013 Vol: 10 (11)Pages: vi-viii
JOURNAL ARTICLE

Defense data network security architecture

Robert W. Shirey

Journal:   ACM SIGCOMM Computer Communication Review Year: 1990 Vol: 20 (2)Pages: 66-72
JOURNAL ARTICLE

Scalable Identifier System for Industrial Internet Based on Multi-Identifier Network Architecture

Yunmin WangHui LiTing HuangXinchun ZhangYongjie Bai

Journal:   IEEE Internet of Things Journal Year: 2021 Vol: 10 (3)Pages: 1919-1932
JOURNAL ARTICLE

Multi-Layer Network Security Architecture

Vincent W. S. Chan

Journal:   IEEE Communications Magazine Year: 2020 Vol: 58 (12)Pages: 4-4
© 2026 ScienceGate Book Chapters — All rights reserved.