期刊文献+
共找到1,566篇文章
< 1 2 79 >
每页显示 20 50 100
LSAP-IoHT:Lightweight Secure Authentication Protocol for the Internet of Healthcare Things
1
作者 Marwa Ahmim Nour Ouafi +3 位作者 Insaf Ullah Ahmed Ahmim Djalel Chefrour Reham Almukhlifi 《Computers, Materials & Continua》 2025年第12期5093-5116,共24页
The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’healt... The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’health conditions.However,the security of sensitive data exchanged within IoHT remains a major concern,as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities.Potential threats include unauthorized access,device compromise,data breaches,and data alteration,all of which may compromise the confidentiality and integrity of patient information.In this paper,we provide an in-depth security analysis of LAP-IoHT,an authentication scheme designed to ensure secure communication in Internet of Healthcare Things environments.This analysis reveals several vulnerabilities in the LAP-IoHT protocol,namely its inability to resist various attacks,including user impersonation and privileged insider threats.To address these issues,we introduce LSAP-IoHT,a secure and lightweight authentication protocol for the Internet of Healthcare Things(IoHT).This protocol leverages Elliptic Curve Cryptography(ECC),Physical Unclonable Functions(PUFs),and Three-Factor Authentication(3FA).Its security is validated through both informal analysis and formal verification using the Scyther tool and the Real-Or-Random(ROR)model.The results demonstrate strong resistance against man-in-the-middle(MITM)attacks,replay attacks,identity spoofing,stolen smart device attacks,and insider threats,while maintaining low computational and communication costs. 展开更多
关键词 internet of healthcare things(IoHT) authentication protocol CRYPTANALYSIS ATTACKS
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
2
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection internet of Things energyefficient communication protocols
在线阅读 下载PDF
MADCR:Mobility Aware Dynamic Clustering-Based Routing Protocol in Internet of Vehicles 被引量:9
3
作者 Sankar Sennan Somula Ramasubbareddy +3 位作者 Sathiyabhama Balasubramaniyam Anand Nayyar Chaker Abdelaziz Kerrache Muhammad Bilal 《China Communications》 SCIE CSCD 2021年第7期69-85,共17页
Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly d... Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly dynamic.Clustering is one of the promising solutions to maintain the route stability in the dynamic network.However,existing algorithms consume a considerable amount of time in the cluster head(CH)selection process.Thus,this study proposes a mobility aware dynamic clustering-based routing(MADCR)protocol in IoV to maximize the lifespan of networks and reduce the end-to-end delay of vehicles.The MADCR protocol consists of cluster formation and CH selection processes.A cluster is formed on the basis of Euclidean distance.The CH is then chosen using the mayfly optimization algorithm(MOA).The CH subsequently receives vehicle data and forwards such data to the Road Side Unit(RSU).The performance of the MADCR protocol is compared with that ofAnt Colony Optimization(ACO),Comprehensive Learning Particle Swarm Optimization(CLPSO),and Clustering Algorithm for Internet of Vehicles based on Dragonfly Optimizer(CAVDO).The proposed MADCR protocol decreases the end-toend delay by 5–80 ms and increases the packet delivery ratio by 5%–15%. 展开更多
关键词 clustering protocol internet of things internet of vehicles optimization algorithm Mayfly algorithm
在线阅读 下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:3
4
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching internet protocol Security Virtual Private Network Video Conferencing Voice over internet protocol JITTER End to End Delay
在线阅读 下载PDF
Implementation of Machine-to-Machine Solutions Using MQTT Protocol in Internet of Things (IoT) Environment to Improve Automation Process for Electrical Distribution Substations in Colombia 被引量:2
5
作者 Hermes Eslava Luis Alejandro Rojas Ramón Pereira 《Journal of Power and Energy Engineering》 2015年第4期92-96,共5页
In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost e... In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost electrical fault location, which contributes to improving quality of service, particularly by shortening interruption time spans in mid-voltage grids. The implementation makes use of MQTT protocol with an intensive use of Internet of things (IoT) environment which guarantees the following properties within the automation process: Advanced reports and statistics, remote command execution on one or more units (groups of units), detailed monitoring of remote units and custom alarm mechanism and firmware upgrade on one or more units (groups of units). This kind of implementation is the first one in Colombia and it is able to automatically recover from an N-1 fault. 展开更多
关键词 MACHINE to MACHINE Quality of Service Distribution Grids MQTT protocol internet of THINGS (IoT) ENVIRONMENT ELECTRICAL Energy
在线阅读 下载PDF
A survey on communication protocols and performance evaluations for Internet of Things 被引量:2
6
作者 Cüneyt Bayılmış MAli Ebleme +2 位作者 ÜnalÇavuşoğlu Kerem Küçük Abdullah Sevin 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1094-1104,共11页
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, I... The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT. 展开更多
关键词 internet of Things IoT application layer protocols IoT communicati on pr otocols Performance evaluation
在线阅读 下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
7
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
在线阅读 下载PDF
Testing and Analysis of VoIPv6 (Voice over Internet Protocol V6) Performance Using FreeBSD
8
作者 Asaad A. Abusin M. D. Jahangir Alam Junaidi Abdullah 《International Journal of Communications, Network and System Sciences》 2012年第5期298-302,共5页
This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current... This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current internet in order for it to cope with IPv6 traffic transmission requirements in general and specifically voice traffic, which is being attracting the efforts of research, bodes currently. These tests were conducted in the application level without looking into the network level of the network. VoIPv6 performance tests were conducted in the current tunneled and native IPv6 aiming for better end-to-end VoIPv6 performance. The results obtained in this study were shown in deferent codec's for different bit rates in Kilo bits per second, which act as an indicator for the better performance of G.711 compared with the rest of the tested codes. 展开更多
关键词 VoIPv6 (Voice over internet protocol V6) PERFORMANCE VOICE over internet protocol V6 PERFORMANCE TESTING VOICE over internet protocol V6 PERFORMANCE Analysis VoIPv6 Quality TESTING in the Application Level
在线阅读 下载PDF
LOA-RPL:Novel Energy-Efficient Routing Protocol for the Internet of Things Using Lion Optimization Algorithm to Maximize Network Lifetime
9
作者 Sankar Sennan Somula Ramasubbareddy +2 位作者 Anand Nayyar Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2021年第10期351-371,共21页
Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a c... Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a clustering protocol,the selection of a cluster head(CH)plays a key role in prolonging the lifetime of a network.However,most cluster-based protocols,including routing protocols for low-power and lossy networks(RPLs),have used fuzzy logic and probabilistic approaches to select the CH node.Consequently,early battery depletion is produced near the sink.To overcome this issue,a lion optimization algorithm(LOA)for selecting CH in RPL is proposed in this study.LOA-RPL comprises three processes:cluster formation,CH selection,and route establishment.A cluster is formed using the Euclidean distance.CH selection is performed using LOA.Route establishment is implemented using residual energy information.An extensive simulation is conducted in the network simulator ns-3 on various parameters,such as network lifetime,power consumption,packet delivery ratio(PDR),and throughput.The performance of LOA-RPL is also compared with those of RPL,fuzzy rule-based energyefficient clustering and immune-inspired routing(FEEC-IIR),and the routing scheme for IoT that uses shuffled frog-leaping optimization algorithm(RISARPL).The performance evaluation metrics used in this study are network lifetime,power consumption,PDR,and throughput.The proposed LOARPL increases network lifetime by 20%and PDR by 5%–10%compared with RPL,FEEC-IIR,and RISA-RPL.LOA-RPL is also highly energy-efficient compared with other similar routing protocols. 展开更多
关键词 internet of things cluster head clustering protocol optimization algorithm lion optimization algorithm network lifetime routing protocol wireless sensor networks energy consumption low-power and lossy networks
在线阅读 下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
10
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 internet control message protocol support vector machine covert tunnel network analysis
在线阅读 下载PDF
Internet Print Protocol——Internet也可共享打印机
11
作者 谢静 《在线》 2004年第3期49-51,共3页
在公司的局域网环境下办公,基于“网上邻居”的打印机共享解决方案应该每一个朋友都接触过。可是这种打印机的共享只能在“局域网”中实现,如果你想共享在Internet上的打印机,难道还必须通过VPN设备连接到公司网络再进行打印?答案是... 在公司的局域网环境下办公,基于“网上邻居”的打印机共享解决方案应该每一个朋友都接触过。可是这种打印机的共享只能在“局域网”中实现,如果你想共享在Internet上的打印机,难道还必须通过VPN设备连接到公司网络再进行打印?答案是否定的。 展开更多
关键词 internet PRINT protocol internet打印服务器 远程管理 客户端配置 服务器配置 IPP共享打印
在线阅读 下载PDF
Proposal for Energy Consumption Reduction between Connected Objects in a Network Running on MQTT Protocol
12
作者 Saidou Haman Djorwe Temoa +1 位作者 Eric Michel Deussom Djomadji Kolyang   《Journal of Computer and Communications》 2024年第10期177-188,共12页
The “Internet of Things” (IoT) refers to a set of intelligent “objects” that can communicate with each other directly or through a network. The IoT is the embodiment of the idea that everything can be connected an... The “Internet of Things” (IoT) refers to a set of intelligent “objects” that can communicate with each other directly or through a network. The IoT is the embodiment of the idea that everything can be connected anywhere and at any time. The concept can be applied to sectors such as e-health, e-government, automotive, geographic information systems, remote sensing, home networking, e-commerce and climate change mitigation. Unlike the Internet, the IoT has its own constraints, notably those linked to heterogeneity. This divergence is linked to different protocols, technologies and algorithms implemented in these connected objects for their interconnection. It should be noted that IoT devices can communicate with each other using different protocols and dedicated M2M (Machine to Machine) communication technologies. The aim of this work is to find solutions for optimising energy consumption during data exchanges between connected objects, with respect to certain constraints by using firstly this exchange for only Message Queuing Telemetry Transport (MQTT) and secondly the combination of the MQTT protocol and the Constrained Application Protocol (CoAP) protocol to check the quantity of the energy optimized. The MQTT protocol, for example, is one of the most widely used protocols for connected objects. Admittedly, this protocol consumes less energy, but in the situation of a very large number of users, the problem of saturation inevitably arises. In this article, we propose a solution of optimising energy consumption by combining the MQTT protocol with the CoAP protocol which can allow to use the standby mode contrary to the use of MQTT where the broker is always being turning. This solution has not yet been implemented but is being discussed. In this article, we’re going to use the joulemeter which is an application developed by Microsoft to measure and estimate the energy consumption of computers and applications. In our case, we take the example of the “Service Broker for network connections” of the Windows’s 10 Operating System, in my own computer to show the difference between the consumption of energy without the standby mode and with standby mode, because with the MQTT, the Broker’s MQTT is always on. Now, with the combination MQTT and CoAP, it is possible that we have standby mode and to compare these two cases in term of consumption of an energy. And to do it, we must use the joulemeter that we installed in our computer to simulate it. This is achieved by using the CoAP protocol combined with the MQTT protocol. The aim of our work is to reduce energy consumption in order to solve the problem of saturation of the MQTT by linking it to CoAP protocol by using Joulemeter mentioned above. 展开更多
关键词 internet of Things HETEROGENEITY Message Queuing Telemetry Transport Constrained Application protocol Application-Layer Semantic Gateway GATEWAY
在线阅读 下载PDF
基于量子密钥分发技术的物联网信息端到端加密传输算法 被引量:2
13
作者 张继飞 张春红 林超 《黑龙江工程学院学报》 2025年第1期22-28,共7页
根据量子不可克隆定理,未经授权的第三方无法复制或准确测量正在传输的量子态,因为任何测量操作都会不可避免地改变量子态,从而被合法的通信双方检测到。因此,提出一种基于量子密钥分发技术的物联网信息端到端加密传输算法。利用量子密... 根据量子不可克隆定理,未经授权的第三方无法复制或准确测量正在传输的量子态,因为任何测量操作都会不可避免地改变量子态,从而被合法的通信双方检测到。因此,提出一种基于量子密钥分发技术的物联网信息端到端加密传输算法。利用量子密钥分发技术生成安全初始密钥,并通过量子密码传输协议进行密钥分发,量子密码传输协议通过单向量子信息通道和双向公共信息通道,确保用户与传感节点间信息加密传输。在握手过程中,完成用户与传感节点的双向认证,建立安全连接,进行数据加密与完整性封装,实现端到端加密传输。实验结果显示,该算法在物联网端到端数据传输的完整性与安全性方面表现出色,且在传输延时控制方面具有显著优势。 展开更多
关键词 量子密钥分发技术 物联网信息 端到端 加密传输 量子密码传输协议 安全认证
在线阅读 下载PDF
面向车联网的轻量级认证密钥协商协议
14
作者 刘亚丽 庞小辉 +2 位作者 陈东东 王鹏超 周毅 《通信学报》 北大核心 2025年第8期152-164,共13页
针对张等提出的面向车联网通勤的双阶段认证密钥协商协议进行分析,发现其不能抵抗秘密泄露攻击、中间人攻击等多种攻击。为解决协议面临的安全隐患问题,提出一种面向车联网的轻量级认证密钥协商(LAKA)协议。首先,通过异或和对称加密算... 针对张等提出的面向车联网通勤的双阶段认证密钥协商协议进行分析,发现其不能抵抗秘密泄露攻击、中间人攻击等多种攻击。为解决协议面临的安全隐患问题,提出一种面向车联网的轻量级认证密钥协商(LAKA)协议。首先,通过异或和对称加密算法对私密值加密,保证私密值的隐私性;其次,利用车辆和路边单元的私密值生成认证请求,确保协议的安全性;再次,性能分析表明,与同类方案相比,在计算代价上具有明显优势;最后,利用BAN逻辑和ProVerif工具进行形式化分析与验证,证明其具有更强的安全性和隐私保护性。 展开更多
关键词 车联网 轻量级 认证协议 密钥协商 隐私保护
在线阅读 下载PDF
嵌入式物联网融合通讯协议实践教学设计
15
作者 邓招奇 郝亚茹 《福建电脑》 2025年第1期99-102,共4页
为使学生能够融会贯通嵌入式物联网分散在各门专业课的知识,本文提出一个以通讯协议为纽带的综合实践课程设计方法。该方法应用Zigbee无线协议,串口协议和网络协议,整合现有的专业课知识。通过设计基于硬件和软件的实践项目,同时以嵌入... 为使学生能够融会贯通嵌入式物联网分散在各门专业课的知识,本文提出一个以通讯协议为纽带的综合实践课程设计方法。该方法应用Zigbee无线协议,串口协议和网络协议,整合现有的专业课知识。通过设计基于硬件和软件的实践项目,同时以嵌入式物联网的典型问题为导向,引导学生加深理解专业知识。实践的结果表明,采用该教学方法的嵌入式物联网综合实践课程能够在一定程度上提高学生对专业知识的综合理解和应用。 展开更多
关键词 嵌入式 物联网 通讯协议 教学设计
在线阅读 下载PDF
基于嵌入式Internet的工业控制 被引量:45
16
作者 陶波 丁汉 熊有伦 《测控技术》 CSCD 2001年第8期5-9,共5页
嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本... 嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本文综述了现场总线控制网络、以太网和现场总线混合控制网络 ,提出了基于嵌入式Internet的控制网络模型 ,并从开放性、互连性、分散性的角度探讨了控制网络与Internet集成的发展趋势 。 展开更多
关键词 工业控制 嵌入式internet 远程监控 现场总线 传感器
在线阅读 下载PDF
一种Internet的网络用户行为分析方法的研究 被引量:22
17
作者 马力 焦李成 董富强 《微电子学与计算机》 CSCD 北大核心 2005年第7期124-126,共3页
文章在系统研究Internet的用户行为特征的基础上,从监测和分析的角度,给出了因特网用户行为的一种分类方式及表示方式。讨论了正常行为聚类研究的常用方法和异常行为的监测方法,设计了分布式的网络用户行为分析模型的体系结构,为网络用... 文章在系统研究Internet的用户行为特征的基础上,从监测和分析的角度,给出了因特网用户行为的一种分类方式及表示方式。讨论了正常行为聚类研究的常用方法和异常行为的监测方法,设计了分布式的网络用户行为分析模型的体系结构,为网络用户行为的自动发现提出了一种有效的解决途径。 展开更多
关键词 网络用户行为 行为分析模型 聚类 IP地址 WEB
在线阅读 下载PDF
Embedded Internet环境下TCP/IP协议簇的约简 被引量:6
18
作者 韩光洁 赵海 +2 位作者 王金东 林涛 王济勇 《小型微型计算机系统》 CSCD 北大核心 2004年第9期1602-1606,共5页
基于 Em bedded Internet技术下 ,为了实现非 Internet设备信息的共享和访问 ,作者对 TCP/ IP协议簇进行系统的研究 ,提出在设备中嵌入 thin TCP/ IP协议栈并使其能够实现与网络的透明互联 .对 TCP/ IP协议簇进行尽最大可能的约简而不... 基于 Em bedded Internet技术下 ,为了实现非 Internet设备信息的共享和访问 ,作者对 TCP/ IP协议簇进行系统的研究 ,提出在设备中嵌入 thin TCP/ IP协议栈并使其能够实现与网络的透明互联 .对 TCP/ IP协议簇进行尽最大可能的约简而不使其失去标准和相应的机制 ,从而可以利用 TCP/ IP协议在设备与 Internet之间建立通讯联系 ,真正把设备纳入到网络的管理范围 ,实现设备的网络化和智能化管理 .设备中嵌入 TCP/ 展开更多
关键词 EMBEDDED internet TCP/IP协议栈 嵌入式 约简
在线阅读 下载PDF
基于Internet/Intranet的电网继电保护及故障信息管理系统 被引量:55
19
作者 袁宇波 丁俊健 +3 位作者 陆于平 唐国庆 郭家银 浦南祯 《电力系统自动化》 EI CSCD 北大核心 2001年第17期39-42,共4页
为提高电网事故分析的水平及继电保护和故障录波器等设备的管理水平 ,提出了基于Internet/Intranet的电网继电保护及故障信息管理系统。该方案采用标准的保护通信协议及基于消息队列的传输平台 ,采用 Web的发布形式。最后对继电保护信... 为提高电网事故分析的水平及继电保护和故障录波器等设备的管理水平 ,提出了基于Internet/Intranet的电网继电保护及故障信息管理系统。该方案采用标准的保护通信协议及基于消息队列的传输平台 ,采用 Web的发布形式。最后对继电保护信息系统中的常规应用和高级应用如定值核对。 展开更多
关键词 继电保护 故障录波 internet 管理信息系统 INTRANET 电网 电力系统
在线阅读 下载PDF
Internet综合服务模型和分类服务模型 被引量:4
20
作者 张占军 韩承德 杨学良 《计算机工程与应用》 CSCD 北大核心 2001年第4期21-22,111,共3页
文章介绍了未来Internet中存在的两种服务模型,综合服务(Int-Serv)和分类服务(Diff—Serv),并对它们进行了评价。
关键词 internet 综合服务 分类服务 多媒体 路由器
在线阅读 下载PDF
上一页 1 2 79 下一页 到第
使用帮助 返回顶部