• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches

    2024-05-25 14:40:06JiajunYanYingZhouAnchenDaiandTaoWang
    Computers Materials&Continua 2024年4期

    Jiajun Yan,Ying Zhou,Anchen Dai and Tao Wang

    School of Electronics and Communication Engineering,Sun Yat-sen University,Shenzhen,518107,China

    ABSTRACT As an emerging network paradigm,the software-defined network(SDN)finds extensive application in areas such as smart grids,the Internet of Things(IoT),and edge computing.The forwarding layer in software-defined networks is susceptible to eavesdropping attacks.Route hopping is a moving target defense(MTD)technology that is frequently employed to resist eavesdropping attacks.In the traditional route hopping technology,both request and reply packets use the same hopping path.If an eavesdropping attacker monitors the nodes along this path,the risk of 100%data leakage becomes substantial.In this paper,we present an effective route hopping approach,called two-day different path(TDP),that turns communication paths into untraceable moving targets.This technology minimizes the probability of data leakage by transmitting request data and reply data through different paths.Firstly,a brief introduction to the network model and attack model involved in this paper is given.Secondly,the algorithm and processing method of the TDP are proposed.Thirdly,the paper proposes three different metrics to measure the effectiveness of the proposed approach.Finally,theoretical analysis and simulation results show that the TDP can effectively reduce the percentage of data exposure,decrease eavesdropping attack success probability,and improve the unpredictability of the path.

    KEYWORDS Route hopping;moving target defense;software-defined network;two-way different path;metrics

    1 Introduction

    The software-defined network is a new networking paradigm,aimed at augmenting flexibility and manageability by segregating the control plane from the data plane in conventional switches and routers.SDN offers several advantages,including plane separation,centralized control,and network programmability.Currently,SDN shows promising development prospects in areas such as network function virtualization,network security defense,and 5G network technologies.Integrating network function virtualization with SDN significantly improves network management and fosters the efficient use of resources.Furthermore,SDN’s centralized control framework provides a distinct benefit in terms of enhancing network transparency and facilitating the enforcement of security policies,thereby supporting the formulation of more sophisticated security strategies.During the deployment of 5G,SDN provides the capability for flexible control and efficient management of network resources,essential for satisfying the elevated data rates and reduced latency demands of 5G technology.SDN has found extensive applications across a variety of areas,including smart grids,campus networks,large data center networks,cloud computing,IoT,and edge computing.However,software-defined networks have become susceptible to security threats in recent years,including scanning,Denial of Service,and eavesdropping attacks.

    Moving target defense embraces a proactive approach to network security,shifting away from the pursuit of an impenetrable,flawless network.Instead,it focuses on creating a dynamic,heterogeneous,and unpredictable network environment.This approach aims to enhance system randomness or diminish system predictability,thereby complicating potential attacks.Currently,many researchers have implemented the concept of moving target defense in the security defense of software-defined networks [1].Steinberger et al.[2] introduced MTD solutions to defend against threats faced by high-speed software-defined networks.Luo et al.[3] proposed a hybrid strategy combining MTD and honeypots to address threats in software-defined networks.Narantuya et al.[4]utilized multiple controllers to enhance the multiplexing capability of the MTD strategy.Various defense strategies are devised for different attack methods in SDN.Jafarian et al.[5] proposed an address mutation approach called OpenFlow Random Host Mutation(OF-RHM)to transparently mutate IP addresses with high unpredictability and high rate.The authors report that OF-RHM can invalidate 99%of the collected information.Furthermore,Jafarian et al.[6]proposed a multipath routing approach,called random route mutation which considers flow,network,security constraints,attacker’s capabilities,and attacker’s strategies.They state that this approach can decrease the percentage of disrupted packets to below 10%,as compared with single-path routing schemes.Additionally,Ma et al.[7] introduced a moving target defense strategy to thwart eavesdropping attacks,the full protocol stack randomization and message packaging randomization are realized by protocol-oblivious forwarding.The authors claim that this innovative approach significantly lowers the likelihood of message interception by attackers and complicates the process of message reassembly.

    Route hopping is an important technology within the domain of moving target defense,enhancing the unpredictability of communication paths by dynamically altering the communication paths and routing rules among network nodes.Eavesdropping attacks,characterized by their covert nature,stand as a primary concern within security defenses.Route hopping plays an essential role in countering such attacks,making it more difficult for adversaries to intercept complete communication packets.In this paper,route hopping is used to protect the forwarding layer of SDN from eavesdropping attacks.Firstly,a two-day different path approach based on the software-defined network is proposed.In the TDP approach,request packets and reply packets use different paths for transmission,thereby enhancing the unpredictability of the communication path.Secondly,the algorithm and processing procedure of the TDP are proposed.Thirdly,to measure the effectiveness of TDP,we introduce metrics including the percentage of data exposure,eavesdropping attack success probability,and route hopping entropy.Finally,the effectiveness of theoretical analysis and the TDP in defending against eavesdropping attacks is verified through experiments.

    The main contributions of our paper are summarized as follows:

    1) The two-way different path approach is proposed to increase the difficulty for attackers to intercept the complete request and reply packets.

    2)The route-hopping process is optimized to ensure packet integrity during transmission.

    3) Three metrics are proposed to measure the advantages of the TDP in terms of data leakage,resistance to eavesdropping attacks,and path unpredictability.

    4)The effectiveness of the proposed approach and the correctness of the theoretical analysis were verified in the experimental networks.

    The rest of this paper is organized as follows.Related works are discussed in Section 2.Section 3 briefly introduces the network model of SDN and the attack model.Section 4 describes the algorithm and processing procedure of the TDP.Section 5 presents network topology and evaluation metrics.The experimental results are discussed in Section 6.Finally,Section 7 concludes the paper.

    2 Related Work

    The combination of route hopping and software-defined networks has attracted the interest of many researchers.Currently,many researchers are studying the hopping mechanism of route hopping.Authors in [8] first proposed the technology of adding a dynamic mapping layer between logical routing and physical routing to achieve a larger space range of route randomization,higher route randomization frequency,and smaller route randomization costs.In[9],a weighted random routing hopping scheme based on network state constraints was proposed.This scheme adjusts weighted values based on the network state to randomly select routing paths,enhancing the unpredictability of path selection.In[10],a routing mutation trigger mechanism based on network traffic anomaly detection was proposed.Furthermore,to enhance the unpredictability of the path during the randomization process,an optimal routing path selection algorithm based on the improved ant colony algorithm was proposed.In[11],an SDN-based multipath routing application is designed to increase the difficulty for an eavesdropper attempting to intercept the communication data flow between Supervisory Control and Data Acquisition devices.Authors in[12]identified a vulnerability in existing multipath methods that could result in 100% data leakage and propose a two-way multipath approach to mitigate the issue of complete data leakage in current multipath methods.Besides,most recent studies model route hopping as a constraint satisfaction problem.They satisfy route hopping requirements by considering performance constraints,time constraints,and space constraints.Duan et al.in[13]modeled capacity,overlap,and quality of service as constraint satisfaction problems.They proposed a random route mutation technology capable of simultaneously altering multiple flows,applicable in both traditional networks and SDN networks.The authors in[14]proposed corresponding constraints from the three dimensions of forwarding path capacity,delay,and reachability,and proposed an optimal routing path generation method based on the security capacity matrix.Zhang et al.[15]utilized the Jaccard distance matrix and temporal constraints to enlarge the mutation space.This mutation space can be dynamically changed to enhance unpredictability.Concurrently,they proposed strategies involving route weights and pre-distribution of flow entries,aimed at balancing network traffic and reducing time overhead respectively.The authors in [16] proposed an MTD technology based on adaptive forwarding path migration.Traditional path mutation approaches often overlook the problems of performance constraints of the forwarding path and inappropriate combination of mutation paths and mutation period.This paper addresses these issues by applying satisfiability modulo theory and a mutation path generation algorithm,which is grounded in the network security capacity matrix.

    Additionally,integrating route hopping with other moving target defense technologies is currently an important research area.In [17],a double-hopping communication method was proposed,in which both the routing path of the communication and the end information of the packet are changed dynamically.In[18],a path-hopping communication method based on SDN was proposed.By assigning data to different paths for transmission and dynamically changing end information,the overhead of eavesdropping attacks and the difficulty for attackers to recover data is increased.

    In summary,route hopping is an effective approach to defend against eavesdropping attacks.However,there are still two problems with the above method.One is that after a path hopping,the request and reply packets are transmitted through the same path,which is easy to intercept and analyze by the attacker[9–13].If an attacker successfully monitors the transmission path of the current time interval,it could result in complete data leakage;The second is the lack of a suitable approach for evaluating the effectiveness and unpredictability [14–18].To solve these problems,we propose an approach of two-way different paths,aiming at increasing the difficulty for attackers to intercept the complete request and reply packets.Meanwhile,we propose three evaluation metrics to measure the effectiveness and unpredictability of route hopping.These metrics include the exposure rate,the eavesdropping attack success rate,and the route hopping entropy.

    3 System Model

    3.1 Network Model of SDN

    As shown in Fig.1,the architecture of Software-Defined Network comprises six components:Application layer,northbound interface,control layer,southbound interface,forwarding layer,and data layer.

    Figure 1: The architecture of SDN

    Application layer: This layer can realize unified management of network resources and enables the development of applications based on application programming interface (API).It controls the low-level devices through the API provided by the control layer and develops various personalized applications based on the northbound interface.

    Northbound interface:This interface realizes the interactive communication between the application plane and the control plane through the protocol.Northbound interface protocols are primarily responsible for offering an abstract network view,enabling applications to directly control the behavior of the network and conveniently access underlying network resources.

    Control layer:This layer centrally manages all devices in the network.The control layer is the core of SDN,composed of various controllers.It communicates with the forwarding layer via southbound interfaces and with the application layer through northbound interfaces.

    Southbound interface:This interface realizes the information transmission between the forwarding layer and the controller through the protocol.The southbound interface protocol primarily implements two functions.Firstly,it provides the collected switch information to the control layer,delivers control strategies to the forwarding layer,and guides the forwarding actions of the forwarding layer.Secondly,it plays a key role in network configuration and management.

    Forwarding layer:This layer is responsible for flow table processing,data forwarding,and status collection.The forwarding layer makes forwarding decisions based on flow table entries provided by the control layer.It focuses on data processing based on flow entries.Unlike traditional switches,SDN switches do not handle control logic tasks like link discovery,address learning,and route calculation.

    Data layer: This layer is composed of various terminal devices,including various clients,servers,etc.

    3.2 Attack Model

    The smart grid based on Software-Defined Networking is a power system that integrates SDN technology to achieve a more flexible,intelligent,and manageable electrical network.In the pursuit of flexibility and efficiency,smart grids face a series of security threats,including control plane attacks,spoofing and deception,and eavesdropping attacks.Within eavesdropping attacks,traffic monitoring and control plane monitoring are crucial methods of attack.We consider the following attack behaviors in this work.

    Eavesdropping attack: Eavesdropping attacks refer to a type of attack in which an attacker attempts to obtain sensitive information without authorization.Such attacks typically involve monitoring,interception,and interpretation of communication channels.Attackers may eavesdrop through physical methods,network interception,or malware.

    As shown in Fig.2,within the smart grid framework,an attacker can identify all possible request and reply paths for source and destination addresses and eavesdrop on some communication nodes.In addition,attackers can analyze and reorganize data through intercepted data.

    Figure 2: Devices in forwarding layer and data layer of SDN-based smart grid

    4 Two-Way Different Path Approach

    In smart grids that deploy traditional route hopping technology,whether it is communication between substations or communication between users and the substation,both the request packet and the reply packet transmit in the same hopping path,potentially resulting in complete data leakage.To mitigate the risk of data leakage,this paper proposes a two-way different path approach based on software-defined networks.During the hopping period,request data and reply data use different transmission paths,reducing the relevance of information intercepted by an attacker at a specific node or link.

    4.1 Two-Way Different Path Algorithm in SDN Controller

    The proposed two-way different path algorithm is presented in Algorithm 1,which is designed to be deployed in the POX controller.

    As shown in Algorithm 1,the controller processes all legitimate data packets from the switch by extracting the source(src)and destination(dst)IP addresses,and then checks whether the transmission path of the source and destination IP addresses already exists.If it already exists,the original path is used to transmit the packet.Otherwise,the controller calculates all communication paths from the source to the destination IP address(Multipaths(src,dst)).In the routing calculation module,the Floyd-Warshall-based algorithm is used to calculate‘n’shortest paths.A subset ofMultipaths(src,dst)is selected as a pool of the request (Request Multipaths(src,dst)) and reply paths (Reply Multipaths(src,dst)) based on specific constraints.After completing the routing path calculation,a path is randomly selected as the request path (Requestpath(src,dst)) and the corresponding flow table is delivered to the switch according to the selected request path.Then,a path is randomly selected as the reply path(Replypath(dst,src))and the flow table is delivered to the switch based on the selected reply path.Finally,the switch completes the transmission process of the data packet according to the flow table.

    When the hopping intervalTis reached,the request path,the reply path and the flow table are updated.The controller sends the flow table to the corresponding OpenFlow Switch (OFSwitch)according to the new request and reply paths.This OF-Switch then executes the data packet transmission process according to the new flow table.

    4.2 The Process of the Two-Way Different Path

    As shown in Fig.3,consider a scenario where a message is transmitted between Substation 7 and Substation 10.In the traditional route hopping process,during a hopping interval,the controller randomly selectsas the request routing path.Subsequently,is selected as the reply routing path.

    In the approach of this paper,after completing the path calculation of the source and destination IP addresses,the controller randomly selectsas the request routing path in the path set and then delivers the flow table to the switches in the selected path.Different from the traditional route hopping approach,the controller may not useas its reply routing path,but will randomly selectas its reply routing path,then deliver the flow table to the corresponding switch.This approach further increases the dispersion of messages,thereby increasing the complexity of eavesdropping attacks.

    Figure 3: The process of the two-way different path

    During the process of route hopping,the traditional mechanism for updating flow tables may result in the loss of data packets.To this end,we have designed a flow table update mechanism characterized by “sequential addition and delayed deletion”.“Sequential addition”means that the hopping controller installs flow table information on the nodes along the hopping path in the sequential direction from the source node to the destination node.“Delayed deletion”means that the hopping controller will wait for one complete communication cycle before deleting the old flow table rules.Take the request process of Fig.3 as an example,when substation 7 initiates communication with substation 10.Assuming that the communication path of the current hopping period is,and the routing path of the next hopping period is,the specific steps for the establishment and update of the flow table are as follows:

    (1)Initially,the controller calculates all communication paths between substation 7 and substation 10.Subsequently,is randomly selected as the communication path and the flow table is delivered sequentially.

    (2)Assume that the route hopping period isTseconds.AfterTseconds,the controller randomly selectsas the request path from the calculated routing path,and then updates the old flow table in Switch 7 through the modification command.At last,the controller sends a new flow table to Switch 2,Switch 4,Switch 6,and Switch 10.

    (3)After waiting for the maximum delay in communication between Substation 7 and Substation 10,the controller will deliver a flow entries deletion command to delete the old flow entries in Switch 2,Switch 5,and Switch 10.

    Under the flow table update mechanism of“sequential addition,delayed deletion”,assuming that the old routing path is denoted asRPold,the new routing path is denoted asRPnew,and a hopping route is denoted asRPi,the following situations exist:

    (1)RPiRPnew∪RPi/∈RPold:It indicates thatRPidoes not belong to the old routing path,nor does it belong to the new routing path.Consequently,since data does not enterRPi,it will not be transmitted viaRPi.

    (2)RPi/∈RPnew∪RPi∈RPold:It indicates thatRPibelongs to the old routing path and does not belong to the new routing path.As a result,communication data will continue to be transmitted along the old routing path.

    (3)RPi∈RPnew∪RPi∈RPold:It indicates thatRPibelongs to both the old routing path and the new routing path.Consequently,it implies that the routing path of the next hopping period is the same as the routing path of the current period.Thus,communication data will be forwarded according to the corresponding flow table entry.

    (4)RPi∈RPnew∪RPi/∈RPold: It indicates thatRPibelongs to the new routing path and does not belong to the old routing path.Consequently,New communication data will be transmitted on the new routing path.In addition,due to the flow table update mechanism of “sequential addition,delayed deletion”,existing communication data continues to be transmitted in the old routing path until the transmission completion.

    According to the above discussion,the flow table update process of“sequential addition,delayed deletion”not only guarantees the continuity of data transmission but also ensures the integrity of data packets during the transmission process.This establishes it as a dependable mechanism for flow table updates.

    5 Deployment and Simulation Experiment

    5.1 Simulation Experiment

    To validate the feasibility and effectiveness of the TDP,we utilized mininet and POX controller[19]to construct an experimental network topology(N1),as shown in Fig.4.

    Figure 4: The network topology used in the simulation

    5.2 Metrics

    5.2.1 The Percentage of Data Exposure

    Eavesdropping attackers will eavesdrop on the transmission link.The percentage of data exposure refers to the probability that the link eavesdropper intercepts a complete request and reply data.Assuming thatmrepresent the total number of data packets transmitted from a senderSto a receiverRin the data plane.Assume that there arenselected paths for data transmission fromStoR,withS1andS2being adjacent switches in the forwarding plane.This analysis is concerned with packet exposure occurring when both request and reply packets are intercepted on the same link.The estimated percentage of data exposureEof a linkis defined as:

    wherebdenotes the number of combinations of request and reply paths.When the request path and the reply path are the same hopping path,b=n;when the request path and the reply path use different hopping path,b=n?n;εrepresents the total number of paths where both the request and reply path use this link.The percentage of data exposure is a metric for assessing the risk of data being compromised on this link.The largerE() is,the easier it is for the data to be exposed.Moreover,this formula also helps us better understand where the TDP algorithm is optimized.

    5.2.2 Eavesdropping Attack Success Probability

    Eavesdropping attack success probability measures the probability that the attacker intercepts certain data from the specified source host to the destination host and then successfully reorganizes it to reconstruct the original data.In graph theory,a‘cut’is an operation that divides the nodes of a graph into two disjoint parts.The‘minimum cut’refers to finding a way to divide the graph so that the cost of cutting is minimized.In a software-defined network,we can abstract the devices in the forwarding layer into a graph.Consequently,the eavesdropping attack success probability can be analyzed using a theory similar to the minimum cut.

    In the approach of this paper,we assume that the set of request node isCi,and the set of reply node isSi,whenCi∩/=?,Si∩/=?,the minimum cut set of eavesdropping nodes is satisfied,a network attacker is capable of intercepting the entirety of the transmitted data.Since 0 ≤Pt≤1,the range of eavesdropping attack success probabilityPdis

    5.2.3 Entropy

    1)Information entropy

    Information entropy is a fundamental concept in information theory that serves as a measure of information quantity,describing the uncertainty of a random variable.The greater the information entropy,the higher the uncertainty of the information.Conversely,lower information entropy indicates reduced uncertainty.

    In probability theory,for a discrete random variableX,its probability distribution is denoted asP(X).The information entropyH(X)can be calculated by the following formula:

    wherexidenotes the possible values ofX,andp(xi)denotes the probability of the corresponding value ofxi.

    2)Route hopping entropy

    Referring to the concept of information entropy in information theory,route hopping entropy is proposed to measure the uncertainty of the hopping path.During route hopping,assuming thatHis the entropy of route hopping,the entropy of route hopping can be defined as follows:

    whereRrepresents the set of paths that can be selected,Ridenotes theithselected path,andp(Ri)is the probability of the corresponding value ofRi.

    Route hopping entropy serves as a metric to evaluate the effectiveness of route-hopping strategies.A higher route hopping entropy signifies increased path uncertainty,thereby rendering the prediction of the next hop path more challenging for an attacker.Consequently,enhancing route-hopping entropy can help improve attack costs and defense effects.

    6 Experimental Results and Analysis

    6.1 Effectiveness and Scalability

    6.1.1 Effectiveness

    In our experimental scenario,host 1 runs the ping command to communicate with host 2.This procedure continues for a total duration of 10 min,with the route hopping interval configured at 30 s and the number of selectable paths denoted asn,fixed at 4.To compare the effectiveness of different approaches,both the approach in literature[13]and the TDP are implemented for the transmission of data packets.Considering that the majority of route hopping adopts the approach in literature[13],the approach RRM in literature[13]can be regarded as a traditional route hopping approach.

    As illustrated in Table 1,we conducted a comparative analysis using data from four hopping periods for different hopping approaches.In the approach of literature[13],both request and reply data are transmitted through the same routing path during each hopping interval.In contrast,our route hopping approach generally uses different routing paths to transmit request and reply data within the same hopping period.

    Table 1: Comparison of routing paths of different approaches

    6.1.2 Scalability

    In this section,an experimental network(N2)was established,comprising one hundred switches labeled S1 through S100.Each switch is connected to two hosts,denoted as h1s1,h2s1,...,h1s100,h2s100.Then,we deploy TDP to N2.In our experimental scenario,h1s1 runs the ping command to communicate with h1s9,repeating the experimental steps in 6.1.1.The experimental results are shown in Table 2.

    Table 2: Comparison of routing paths of different network sizes

    It can be concluded from the experimental results that in large networks,the request path and reply path of data are also generally different within the same hopping period.This shows that the TDP is suitable for large networks and the TDP is scalable.

    6.2 Result and Analysis for the Percentage of Data Exposure

    In our experimental scenario,host1 runs the ping command to communicate with host2.This procedure continues for a total duration of ten minutes,with the route hopping interval configured at five seconds.The number of selectable paths denoted asn,is configured to be either 3 or 4.To evaluate and compare the percentage of data exposure of different approaches,both the RRM and the TDP are employed for data packet transmission.The total number of data packets passing through each transmission link is counted and the calculation results are shown in Fig.5.

    As shown in Fig.5,for bothn=3 andn=4,the percentage of data exposure caused by using the TDP is significantly lower.This is because the request data packet and the reply data packet are transmitted through different paths most of the time in the TDP.Under TDP,the number of request and reply path combinations aren?n,compared tonin the traditional route hopping approach.According to formula(1),the percentage of data exposure of the TDP approach is lower than the traditional route hopping approach.In addition,the more pathsncan be selected,the lower the percentage of data exposure is.What’s more,whenn=3,the percentage of data exposure for links AB and HJ are higher than for other links.Similarly,whenn=4,the percentage of data exposure for links AB,HJ,AC,and IJ is higher than for other links,owing to their more frequent reuse in the hopping routes.

    Figure 5: Comparing data exposure using different approaches

    6.3 Result and Analysis for Eavesdropping Attack Success Probability

    In our experimental scenario,refer to the experimental steps in Section 6.2,the main difference lies in the configuration of the number of selectable paths,which are set to 2,3,and 4.For comparative experiments,we assume that the attacker can eavesdrop from 1 to 10 nodes,respectively.In our approach,we try to avoid duplication of request paths and reply paths.According to the discussion in Section 5.2.2,we counted the probabilities of obtaining complete communication data with varying numbers of eavesdropping nodes for both approaches under different scenarios.The results of these calculations are illustrated in Fig.6.

    As shown in Fig.6,it is observed that for both the approach proposed in this paper and the traditional route hopping approach,the eavesdropping attack success probability gradually increases to 100% with an increasing number of eavesdropping nodes.When the quantity of eavesdropping nodes remains constant,the eavesdropping attack success probability in the TDP is found to be lower than that in the traditional routing hopping approach.This remains the case until the point where an attacker is required to eavesdrop on the complete network topology.At this point,the eavesdropping attack success probability for both approaches becomes equivalent,as observed in scenarios like whenn=4.Theoretically,in the TDP,an increase in the number of available paths should lead to a reduction in the eavesdropping attack success probability.However,during this experiment,an increase in the number of selectable paths did not result in a significant change in this probability.This issue can be attributed to the constraints of the experimental network topology,which offers only four selectable paths.Consequently,attackers are required to eavesdrop on the set of nodes that satisfy the minimum cut.

    Figure 6: Eavesdropping attack success probability with different numbers of eavesdropping nodes

    6.4 Result and Analysis for Unpredictability

    In our experimental scenario,host 1 functions as the client,while host 2 operates as the server.The client executes the wget command every 10 s to obtain web page information from the server.The duration of the experiment was established to be 10 min.For comparative analysis,the TDP and the approach in[12]were employed.We quantified the probability associated with each combination of request and reply paths,and subsequently calculated the route hopping entropy utilizing formula(5).

    As shown in Fig.7,fornvalues of 2,3,and 4,the route hopping entropy of the two approaches is basically consistent with the theoretical value calculated by formula(5).The route hopping entropy of the TDP is higher than that using the traditional route hopping approach,which indicates that TDP has greater unpredictability and enhanced defensive capabilities.This advantage is attributed to TDP’s capability to provide a greater number of request and reply path combinations.Moreover,asnincreases,the entropy values for both approaches increase,indicating that a larger pool of optional paths helps to increase the unpredictability of the hopping paths.

    Figure 7: Route hopping entropy for different number of path selections

    7 Conclusion

    In this paper,a two-way different path approach is proposed.The TDP improves path unpredictability by selecting different paths to transmit request packets and reply packets.To evaluate the TDP’s effectiveness in reducing data leakage,resisting eavesdropping attacks,and increasing path unpredictability,three metrics are proposed,namely the percentage of data exposure,eavesdropping attack success probability,and route-hopping entropy.The final theoretical analysis and experimental results show that the TDP is better than the traditional route-hopping approach in reducing the percentage of data exposure,decreasing the eavesdropping attack success probability,and improving the route hopping entropy.Although the TDP approach adopts a random hopping mechanism to better increase unpredictability,it will cause some additional overhead.In the future,we will study adaptive route-hopping methods.

    Acknowledgement:We would like to thank the anonymous reviewers for their helpful and constructive comments.

    Funding Statement:This research was partially funded by the Natural Science Foundation of Guangdong Province under Grant Number 2021A1515011910,and by the Shenzhen Science and Technology Program under Grant No.KQTD20190929172704911.

    Author Contributions:The authors confirm contribution to the paper as follows:Conceptualization:J.Y.and Y.Z.;methodology: J.Y.and Y.Z.;software: J.Y.;validation: J.Y.,Y.Z.,A.D.and T.W.;writing—original draft preparation: J.Y.;writing—review and editing: J.Y.,Y.Z.,A.D.and T.W.;supervision: Y.Z.and T.W.;project administration: J.Y.,Y.Z.,A.D.and T.W.;funding acquisition:Y.Z.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    成人毛片60女人毛片免费| 亚洲国产欧美人成| 一级毛片电影观看 | 久久久久久大精品| 精品一区二区三区视频在线| 又爽又黄a免费视频| 久久久久国产网址| 国产av在哪里看| 国产成人精品婷婷| 亚洲va在线va天堂va国产| 一卡2卡三卡四卡精品乱码亚洲| 小蜜桃在线观看免费完整版高清| 免费观看在线日韩| 亚洲av成人av| 久99久视频精品免费| 日韩欧美国产在线观看| 国产极品精品免费视频能看的| 亚洲精品成人久久久久久| a级毛片免费高清观看在线播放| 久久九九热精品免费| 国产av一区在线观看免费| 精品少妇黑人巨大在线播放 | 欧美性猛交黑人性爽| 日本爱情动作片www.在线观看| 可以在线观看的亚洲视频| 久久久精品大字幕| 日本-黄色视频高清免费观看| 日韩欧美一区二区三区在线观看| 久久韩国三级中文字幕| 99热这里只有精品一区| 亚洲最大成人中文| 热99在线观看视频| 日本爱情动作片www.在线观看| 干丝袜人妻中文字幕| 欧美变态另类bdsm刘玥| 国产av在哪里看| 最近视频中文字幕2019在线8| 国产精华一区二区三区| 国产亚洲av片在线观看秒播厂 | 中文在线观看免费www的网站| 岛国毛片在线播放| 国产蜜桃级精品一区二区三区| 天天躁日日操中文字幕| 嘟嘟电影网在线观看| 国产伦一二天堂av在线观看| 国产真实伦视频高清在线观看| 在线观看美女被高潮喷水网站| 久久99热6这里只有精品| 看片在线看免费视频| 身体一侧抽搐| a级毛片免费高清观看在线播放| 国产精品美女特级片免费视频播放器| 99久久精品一区二区三区| 日本-黄色视频高清免费观看| 丰满人妻一区二区三区视频av| 一边摸一边抽搐一进一小说| 成人美女网站在线观看视频| 1000部很黄的大片| 久久久久久国产a免费观看| 国产精品一区www在线观看| 免费人成在线观看视频色| 国产高清不卡午夜福利| АⅤ资源中文在线天堂| 欧美色欧美亚洲另类二区| 成人综合一区亚洲| 午夜福利在线在线| 综合色丁香网| 深夜a级毛片| 亚洲国产欧美人成| 51国产日韩欧美| 亚洲三级黄色毛片| 国产av在哪里看| 我要搜黄色片| 麻豆乱淫一区二区| 看免费成人av毛片| 国产精品久久久久久精品电影| 精品免费久久久久久久清纯| 国产av一区在线观看免费| 国产亚洲精品久久久久久毛片| 久久精品国产清高在天天线| 一边摸一边抽搐一进一小说| 国产综合懂色| .国产精品久久| 菩萨蛮人人尽说江南好唐韦庄 | 在线免费观看不下载黄p国产| 成人午夜精彩视频在线观看| 91av网一区二区| 国产精品日韩av在线免费观看| 久久久色成人| 可以在线观看毛片的网站| 大型黄色视频在线免费观看| 日本免费a在线| 国产精品伦人一区二区| 精品不卡国产一区二区三区| 丰满人妻一区二区三区视频av| 久久午夜亚洲精品久久| av在线亚洲专区| 少妇人妻一区二区三区视频| 少妇猛男粗大的猛烈进出视频 | 中文精品一卡2卡3卡4更新| 1024手机看黄色片| 精品久久久久久久久久免费视频| 久久欧美精品欧美久久欧美| 在线观看美女被高潮喷水网站| 老司机福利观看| 久久久久久久久久久免费av| 国产成人精品婷婷| 久久久国产成人精品二区| 欧美激情久久久久久爽电影| www日本黄色视频网| 免费大片18禁| 女的被弄到高潮叫床怎么办| 日本熟妇午夜| 亚洲精品久久久久久婷婷小说 | 午夜老司机福利剧场| 晚上一个人看的免费电影| 欧美不卡视频在线免费观看| 97超视频在线观看视频| 狂野欧美白嫩少妇大欣赏| 小蜜桃在线观看免费完整版高清| 亚洲av中文字字幕乱码综合| 在线天堂最新版资源| 美女黄网站色视频| 一区二区三区免费毛片| 亚洲在线观看片| 国产精品综合久久久久久久免费| 久久久精品欧美日韩精品| 99久国产av精品| 中国美白少妇内射xxxbb| 91aial.com中文字幕在线观看| 欧美zozozo另类| 高清毛片免费看| 精品熟女少妇av免费看| 一级毛片久久久久久久久女| 午夜福利成人在线免费观看| 国产女主播在线喷水免费视频网站 | 亚洲,欧美,日韩| 少妇被粗大猛烈的视频| 久久九九热精品免费| 国产精品电影一区二区三区| 免费看a级黄色片| 精品国内亚洲2022精品成人| .国产精品久久| 丰满人妻一区二区三区视频av| 午夜爱爱视频在线播放| 免费看光身美女| 成人亚洲欧美一区二区av| 哪里可以看免费的av片| 一级av片app| 成年版毛片免费区| 天堂√8在线中文| 久久99热6这里只有精品| 三级经典国产精品| 久久久精品94久久精品| 国产精品永久免费网站| av在线蜜桃| 久久久久久久午夜电影| 精品99又大又爽又粗少妇毛片| 熟女电影av网| 亚洲欧洲日产国产| 成熟少妇高潮喷水视频| 一进一出抽搐gif免费好疼| 综合色丁香网| 中文字幕人妻熟人妻熟丝袜美| 男的添女的下面高潮视频| 天美传媒精品一区二区| 精品99又大又爽又粗少妇毛片| 亚洲人与动物交配视频| 亚洲,欧美,日韩| 久久精品国产清高在天天线| 免费看av在线观看网站| 国产熟女欧美一区二区| 青春草亚洲视频在线观看| 欧美另类亚洲清纯唯美| 久久精品人妻少妇| 免费看美女性在线毛片视频| 亚洲精品乱码久久久v下载方式| 欧美日韩一区二区视频在线观看视频在线 | 中文字幕熟女人妻在线| 亚洲av电影不卡..在线观看| 天天躁夜夜躁狠狠久久av| 亚洲av熟女| 国产色婷婷99| 亚洲成人精品中文字幕电影| 久久久久网色| 免费无遮挡裸体视频| 亚洲国产欧洲综合997久久,| 99热6这里只有精品| 国产精品乱码一区二三区的特点| 中文精品一卡2卡3卡4更新| 少妇人妻精品综合一区二区 | 国产精品日韩av在线免费观看| 久久精品夜色国产| 全区人妻精品视频| 成人漫画全彩无遮挡| 直男gayav资源| 欧美精品一区二区大全| 在线观看午夜福利视频| 中文字幕av在线有码专区| 国产三级在线视频| 好男人在线观看高清免费视频| 亚洲人成网站在线观看播放| 国产成人91sexporn| 一进一出抽搐动态| 人体艺术视频欧美日本| 狠狠狠狠99中文字幕| 乱码一卡2卡4卡精品| 国产极品天堂在线| 美女cb高潮喷水在线观看| 日韩大尺度精品在线看网址| 国产免费一级a男人的天堂| 最近视频中文字幕2019在线8| 99热这里只有精品一区| 一区二区三区高清视频在线| 99riav亚洲国产免费| 中国美白少妇内射xxxbb| 日韩欧美一区二区三区在线观看| 国产日本99.免费观看| 国产精品国产高清国产av| 国产成人精品婷婷| 国产在视频线在精品| 男女啪啪激烈高潮av片| 国国产精品蜜臀av免费| 国产中年淑女户外野战色| 久久久久久久久久成人| 搡女人真爽免费视频火全软件| 亚洲欧美清纯卡通| 少妇熟女aⅴ在线视频| 少妇的逼好多水| 久久99热6这里只有精品| 成人特级黄色片久久久久久久| 美女xxoo啪啪120秒动态图| 亚洲av成人精品一区久久| 神马国产精品三级电影在线观看| 最后的刺客免费高清国语| 少妇的逼水好多| 免费观看a级毛片全部| 在现免费观看毛片| 插逼视频在线观看| 女人十人毛片免费观看3o分钟| 黄色欧美视频在线观看| av免费在线看不卡| 亚洲av不卡在线观看| 国产熟女欧美一区二区| av卡一久久| 人人妻人人看人人澡| 一区福利在线观看| 男人狂女人下面高潮的视频| 日本五十路高清| 久久久久九九精品影院| 婷婷精品国产亚洲av| 国产黄a三级三级三级人| 九九爱精品视频在线观看| 亚洲精品自拍成人| 国产片特级美女逼逼视频| 久久久久久久久久久免费av| 国产高清有码在线观看视频| 国产综合懂色| 国产精品无大码| 亚洲欧美中文字幕日韩二区| 三级男女做爰猛烈吃奶摸视频| 少妇的逼好多水| 校园春色视频在线观看| 久久人人精品亚洲av| av女优亚洲男人天堂| 国产精品一区二区三区四区免费观看| 在线观看美女被高潮喷水网站| 联通29元200g的流量卡| 黑人高潮一二区| 成熟少妇高潮喷水视频| 亚洲国产精品sss在线观看| 精品一区二区三区视频在线| 永久网站在线| 免费观看的影片在线观看| 久久亚洲国产成人精品v| 亚洲av成人av| 欧美一级a爱片免费观看看| av国产免费在线观看| 国内精品宾馆在线| 亚洲国产高清在线一区二区三| av在线天堂中文字幕| 国产色婷婷99| 久久精品夜夜夜夜夜久久蜜豆| 国产黄色视频一区二区在线观看 | 国产私拍福利视频在线观看| 99热这里只有精品一区| 国产一区二区三区av在线 | www日本黄色视频网| 人妻少妇偷人精品九色| 成年女人看的毛片在线观看| 午夜亚洲福利在线播放| 伦精品一区二区三区| 亚洲欧洲日产国产| 国内精品久久久久精免费| 日韩制服骚丝袜av| 九九爱精品视频在线观看| 国产真实伦视频高清在线观看| 最近的中文字幕免费完整| 亚洲第一区二区三区不卡| 免费搜索国产男女视频| 久久亚洲国产成人精品v| 国产成人福利小说| 国产大屁股一区二区在线视频| 免费观看a级毛片全部| 久久久久性生活片| 99视频精品全部免费 在线| 偷拍熟女少妇极品色| 日韩大尺度精品在线看网址| 国产精品免费一区二区三区在线| 国产av一区在线观看免费| 婷婷色综合大香蕉| 91精品国产九色| 2021天堂中文幕一二区在线观| 最近手机中文字幕大全| 日本黄色视频三级网站网址| 99riav亚洲国产免费| 国产黄片美女视频| 女人十人毛片免费观看3o分钟| 看黄色毛片网站| 久久久久久久久久黄片| 免费黄网站久久成人精品| 欧美日本亚洲视频在线播放| 成年免费大片在线观看| 午夜福利在线在线| 国产精品嫩草影院av在线观看| 变态另类成人亚洲欧美熟女| 99热全是精品| 国内少妇人妻偷人精品xxx网站| 一个人观看的视频www高清免费观看| 赤兔流量卡办理| 国产黄a三级三级三级人| 国产成人a区在线观看| 亚洲欧美成人综合另类久久久 | 国产探花极品一区二区| 欧美一区二区国产精品久久精品| 欧美最黄视频在线播放免费| 精品久久国产蜜桃| 国内精品久久久久精免费| 久久久久久伊人网av| 亚洲久久久久久中文字幕| 蜜臀久久99精品久久宅男| 久久久久网色| 男的添女的下面高潮视频| 精品欧美国产一区二区三| 在线天堂最新版资源| 91久久精品国产一区二区成人| 欧美人与善性xxx| 国产精品精品国产色婷婷| 国产激情偷乱视频一区二区| 亚洲av免费在线观看| a级毛色黄片| 99国产极品粉嫩在线观看| 午夜爱爱视频在线播放| 亚洲精品亚洲一区二区| 久久久久网色| 日韩人妻高清精品专区| 熟女人妻精品中文字幕| 国产高潮美女av| 夜夜爽天天搞| 在线观看免费视频日本深夜| 给我免费播放毛片高清在线观看| 亚洲成人久久性| 99在线视频只有这里精品首页| 精品一区二区三区人妻视频| 老司机影院成人| 成人特级黄色片久久久久久久| 久久久久九九精品影院| 夜夜看夜夜爽夜夜摸| 美女cb高潮喷水在线观看| 一级黄色大片毛片| 亚洲va在线va天堂va国产| 亚洲人成网站在线播放欧美日韩| 性色avwww在线观看| 亚洲欧美日韩东京热| 国产精品女同一区二区软件| 内射极品少妇av片p| 中国国产av一级| 在线国产一区二区在线| 欧美性猛交╳xxx乱大交人| 国产av麻豆久久久久久久| 国产精品一区二区三区四区久久| 成人美女网站在线观看视频| 国产一区二区激情短视频| 精品久久久久久久人妻蜜臀av| 天堂√8在线中文| 欧美潮喷喷水| or卡值多少钱| 久久精品国产亚洲av涩爱 | 国内精品美女久久久久久| 成人无遮挡网站| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲无线在线观看| 国产成人一区二区在线| 我要看日韩黄色一级片| 亚洲欧美日韩东京热| 床上黄色一级片| 人妻系列 视频| www.av在线官网国产| 亚洲欧美成人综合另类久久久 | 搡老妇女老女人老熟妇| 国产大屁股一区二区在线视频| 亚洲精品亚洲一区二区| 欧美zozozo另类| 免费人成在线观看视频色| 男女下面进入的视频免费午夜| 一进一出抽搐动态| 欧美区成人在线视频| 国产一区二区三区在线臀色熟女| 又黄又爽又刺激的免费视频.| 五月伊人婷婷丁香| 在线免费十八禁| 亚洲成人av在线免费| 午夜亚洲福利在线播放| 看片在线看免费视频| 国产精品国产三级国产av玫瑰| 老司机福利观看| av在线观看视频网站免费| 亚洲四区av| 夫妻性生交免费视频一级片| 国产精品女同一区二区软件| 欧美不卡视频在线免费观看| 精品久久久久久久末码| 国产老妇女一区| 亚洲精品久久国产高清桃花| 悠悠久久av| 在线免费观看不下载黄p国产| 中文欧美无线码| 亚洲av电影不卡..在线观看| 国产精品免费一区二区三区在线| 国产激情偷乱视频一区二区| 久久久久久国产a免费观看| 中国美白少妇内射xxxbb| 91在线精品国自产拍蜜月| 看十八女毛片水多多多| 99久久精品国产国产毛片| 两个人的视频大全免费| 午夜爱爱视频在线播放| 91aial.com中文字幕在线观看| 校园春色视频在线观看| 亚洲av免费在线观看| 亚洲欧美日韩高清在线视频| 噜噜噜噜噜久久久久久91| 久久久久免费精品人妻一区二区| 天堂av国产一区二区熟女人妻| 又粗又硬又长又爽又黄的视频 | 亚洲精品色激情综合| 国产色爽女视频免费观看| 精品午夜福利在线看| 少妇的逼水好多| 欧美性猛交╳xxx乱大交人| 国产伦在线观看视频一区| 国产黄片视频在线免费观看| 国产老妇女一区| 99久国产av精品国产电影| 国产乱人视频| 国产麻豆成人av免费视频| 精品人妻视频免费看| 日本在线视频免费播放| 亚洲内射少妇av| 午夜免费男女啪啪视频观看| а√天堂www在线а√下载| 看十八女毛片水多多多| 精品一区二区三区视频在线| 91aial.com中文字幕在线观看| 亚洲精品乱码久久久v下载方式| 国产私拍福利视频在线观看| 中文字幕av在线有码专区| or卡值多少钱| 三级经典国产精品| 久久午夜亚洲精品久久| 久久人人精品亚洲av| 久久精品国产亚洲av天美| 欧美精品国产亚洲| 尾随美女入室| 好男人视频免费观看在线| 日本黄大片高清| 精品一区二区三区视频在线| 日韩欧美精品v在线| 国产91av在线免费观看| 亚洲av免费在线观看| 日韩一区二区视频免费看| 日韩成人av中文字幕在线观看| 一级黄色大片毛片| 三级毛片av免费| 少妇被粗大猛烈的视频| 成人综合一区亚洲| 校园人妻丝袜中文字幕| 亚洲第一区二区三区不卡| 免费在线观看成人毛片| av免费观看日本| 最近最新中文字幕大全电影3| 亚洲国产欧美在线一区| 国产成人一区二区在线| 久久久久九九精品影院| 国产极品天堂在线| 国产av一区在线观看免费| 国产一区二区激情短视频| 天天一区二区日本电影三级| 六月丁香七月| 日韩av不卡免费在线播放| 蜜桃亚洲精品一区二区三区| 国产蜜桃级精品一区二区三区| av专区在线播放| 免费观看人在逋| 熟女电影av网| 少妇人妻精品综合一区二区 | 成人鲁丝片一二三区免费| 国产av在哪里看| 晚上一个人看的免费电影| 五月玫瑰六月丁香| 日韩成人伦理影院| 插阴视频在线观看视频| 久久久午夜欧美精品| 99久久人妻综合| 亚洲精品粉嫩美女一区| 国产伦理片在线播放av一区 | 日韩,欧美,国产一区二区三区 | 欧美+亚洲+日韩+国产| 99久国产av精品| av免费在线看不卡| 欧美日本视频| 亚洲精品影视一区二区三区av| 人体艺术视频欧美日本| 亚洲成a人片在线一区二区| 草草在线视频免费看| 日韩大尺度精品在线看网址| 深爱激情五月婷婷| 成人亚洲欧美一区二区av| 中文字幕精品亚洲无线码一区| 国产一区二区在线观看日韩| 一级毛片aaaaaa免费看小| 最近中文字幕高清免费大全6| 成年女人看的毛片在线观看| 久99久视频精品免费| 少妇丰满av| 午夜精品一区二区三区免费看| 乱人视频在线观看| 老熟妇乱子伦视频在线观看| 国产成人aa在线观看| 亚洲精品乱码久久久久久按摩| 亚洲美女搞黄在线观看| 成年女人永久免费观看视频| 久久久久久久久久成人| 男人和女人高潮做爰伦理| 最好的美女福利视频网| 日本一本二区三区精品| 国产精品精品国产色婷婷| 高清午夜精品一区二区三区 | 99久久中文字幕三级久久日本| 中文资源天堂在线| 能在线免费看毛片的网站| 国产亚洲5aaaaa淫片| 精品人妻一区二区三区麻豆| 亚洲精品国产成人久久av| 白带黄色成豆腐渣| 好男人在线观看高清免费视频| 男人舔奶头视频| 欧美高清性xxxxhd video| 九九热线精品视视频播放| 久久精品国产亚洲av涩爱 | 91av网一区二区| 国产高清三级在线| 深爱激情五月婷婷| 熟女电影av网| 国产亚洲欧美98| 美女黄网站色视频| 91狼人影院| 在现免费观看毛片| 黄片wwwwww| 小蜜桃在线观看免费完整版高清| 国产成人a∨麻豆精品| 欧美又色又爽又黄视频| 亚洲国产精品国产精品| 国产精品女同一区二区软件| av在线蜜桃| 特大巨黑吊av在线直播| 亚洲av免费在线观看| 成人永久免费在线观看视频| 在现免费观看毛片| 国内揄拍国产精品人妻在线| 免费一级毛片在线播放高清视频| 亚洲av一区综合| 成年女人看的毛片在线观看| 女人被狂操c到高潮| 国产亚洲91精品色在线| 国产白丝娇喘喷水9色精品| 秋霞在线观看毛片| www.色视频.com| 亚洲欧美成人精品一区二区| 亚洲av免费高清在线观看| 日本色播在线视频| 一级毛片aaaaaa免费看小| 欧美xxxx黑人xx丫x性爽| 久久久午夜欧美精品| 亚洲在线自拍视频| 久久韩国三级中文字幕| 日本五十路高清| 国产精品麻豆人妻色哟哟久久 | 免费观看人在逋| 一进一出抽搐gif免费好疼| 久久精品国产鲁丝片午夜精品| 亚洲av一区综合| 寂寞人妻少妇视频99o| 精品久久久久久成人av| 听说在线观看完整版免费高清| 欧美日韩综合久久久久久| 中出人妻视频一区二区| 久久久精品94久久精品| 欧美三级亚洲精品| 久久精品国产亚洲网站| 中文精品一卡2卡3卡4更新| 免费av不卡在线播放| 国产精品美女特级片免费视频播放器| 婷婷六月久久综合丁香| 国产精品99久久久久久久久|