期刊文献+
共找到2,249篇文章
< 1 2 113 >
每页显示 20 50 100
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
1
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
2
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FAnet protocol machine learning
在线阅读 下载PDF
LSAP-IoHT:Lightweight Secure Authentication Protocol for the Internet of Healthcare Things
3
作者 Marwa Ahmim Nour Ouafi +3 位作者 Insaf Ullah Ahmed Ahmim Djalel Chefrour Reham Almukhlifi 《Computers, Materials & Continua》 2025年第12期5093-5116,共24页
The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’healt... The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’health conditions.However,the security of sensitive data exchanged within IoHT remains a major concern,as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities.Potential threats include unauthorized access,device compromise,data breaches,and data alteration,all of which may compromise the confidentiality and integrity of patient information.In this paper,we provide an in-depth security analysis of LAP-IoHT,an authentication scheme designed to ensure secure communication in Internet of Healthcare Things environments.This analysis reveals several vulnerabilities in the LAP-IoHT protocol,namely its inability to resist various attacks,including user impersonation and privileged insider threats.To address these issues,we introduce LSAP-IoHT,a secure and lightweight authentication protocol for the Internet of Healthcare Things(IoHT).This protocol leverages Elliptic Curve Cryptography(ECC),Physical Unclonable Functions(PUFs),and Three-Factor Authentication(3FA).Its security is validated through both informal analysis and formal verification using the Scyther tool and the Real-Or-Random(ROR)model.The results demonstrate strong resistance against man-in-the-middle(MITM)attacks,replay attacks,identity spoofing,stolen smart device attacks,and insider threats,while maintaining low computational and communication costs. 展开更多
关键词 Internet of healthcare things(IoHT) authentication protocol CRYPTANALYSIS ATTACKS
在线阅读 下载PDF
Flex-QUIC:AI for QUIC Transport Protocol with High-Efficiency in Future Wireless Networks
4
作者 Jiang Tao Liu Yang +2 位作者 Zhang Yu Peng Miaoran Wang Haoyu 《China Communications》 2025年第12期1-14,共14页
This paper proposes Flex-QUIC,an AIempowered quick UDP Internet connections(QUIC)enhancement framework that addresses the challenge of degraded transmission efficiency caused by the static parameterization of acknowle... This paper proposes Flex-QUIC,an AIempowered quick UDP Internet connections(QUIC)enhancement framework that addresses the challenge of degraded transmission efficiency caused by the static parameterization of acknowledgment(ACK)mechanisms,loss detection,and forward error correction(FEC)in dynamic wireless networks.Unlike the standard QUIC protocol,Flex-QUIC systematically integrates machine learning across three critical modules to achieve high-efficiency operation.First,a contextual multi-armed bandit-based ACK adaptation mechanism optimizes the ACK ratio to reduce wireless channel contention.Second,the adaptive loss detection module utilizes a long short-term memory(LSTM)model to predict the reordering displacement for optimizing the packet reordering tolerance.Third,the FEC transmission scheme jointly adjusts the redundancy level based on the LSTM-predicted loss rate and congestion window state.Extensive evaluations across Wi-Fi,5G,and satellite network scenarios demonstrate that Flex-QUIC significantly improves throughput and latency reduction compared to the standard QUIC and other enhanced QUIC variants,highlighting its adaptability to diverse and dynamic network conditions.Finally,we further discuss open issues in deploying AI-native transport protocols. 展开更多
关键词 contextual multi-armed bandit long shortterm memory QUIC transport protocol wireless networks
在线阅读 下载PDF
DoS Attack Schedules for Remote State Estimation in CPSs With Two-hop Relay Networks Under Round-Robin Protocol
5
作者 Shuo Zhang Lei Miao Xudong Zhao 《IEEE/CAA Journal of Automatica Sinica》 2025年第7期1513-1515,共3页
Dear Editor,This letter investigates the optimal denial-of-service(DoS)attack scheduling targeting state estimation in cyber-Physical systems(CPSs)with the two-hop multi-channel network.CPSs are designed to achieve ef... Dear Editor,This letter investigates the optimal denial-of-service(DoS)attack scheduling targeting state estimation in cyber-Physical systems(CPSs)with the two-hop multi-channel network.CPSs are designed to achieve efficient,secure and adaptive operation by embedding intelligent and autonomous decision-making capabilities in the physical world.As a key component of the CPSs,the wireless network is vulnerable to various malicious attacks due to its openness[1].DoS attack is one of the most common attacks,characterized of simple execution and significant destructiveness[2].To mitigate the economic losses and environmental damage caused by DoS attacks,it is crucial to model and investigate data transmissions in CPSs. 展开更多
关键词 round robin protocol malicious attacks denial service attack two hop relay networks state estimation dos attack wireless network cyber physical systems
在线阅读 下载PDF
Optimizing RPL Routing Using Tabu Search to Improve Link Stability and Energy Consumption in IoT Networks
6
作者 Mehran Tarif Mohammadhossein Homaei +1 位作者 Abbas Mirzaei Babak Nouri-Moghaddam 《Computers, Materials & Continua》 2026年第4期2095-2126,共32页
The Routing Protocol for Low-power and Lossy Networks(RPL)is widely used in Internet of Things(IoT)systems,where devices usually have very limited resources.However,RPL still faces several problems,such as high energy... The Routing Protocol for Low-power and Lossy Networks(RPL)is widely used in Internet of Things(IoT)systems,where devices usually have very limited resources.However,RPL still faces several problems,such as high energy usage,unstable links,and inefficient routing decisions,which reduce the overall network performance and lifetime.In this work,we introduce TABURPL,an improved routing method that applies Tabu Search(TS)to optimize the parent selection process.The method uses a combined cost function that considers Residual Energy,Transmission Energy,Distance to the Sink,Hop Count,Expected Transmission Count(ETX),and Link Stability Rate(LSR).Simulation results show that TABURPL improves link stability,lowers energy consumption,and increases the packet delivery ratio compared with standard RPL and other existing approaches.These results indicate that Tabu Search can handle the complex trade-offs in IoT routing and can provide a more reliable solution for extending the network lifetime. 展开更多
关键词 Internet of things RPL protocol tabu search energy efficiency link stability multi-metric routing
在线阅读 下载PDF
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
7
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
8
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Robust Hyper-Polarization Protocol of Nuclear Spins via Magic Sequence
9
作者 Haiyang Li Yongju Li +1 位作者 Hao Liao Ping Wang 《Chinese Physics Letters》 2026年第1期105-128,共24页
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei... Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center. 展开更多
关键词 transferring polarization electrons hyperpolarization protocols quantum information technologiesas nuclear spins pulse polarization nuclear spin polarization magic sequences nuclear magnetic resonance
原文传递
High efficiency AODV routing protocol based on link availability prediction in MANETs 被引量:2
10
作者 刘超 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期489-493,共5页
To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction ba... To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction based strategy is introduced to reduce the amount of Hello messages. In this strategy, a novel wireless link availability prediction model under line-of-sight (LOS) propagation environments is proposed based on which the parameter of Hello Interval in AODV can be dynamically adjusted to achieve the goal of changing the frequency of Hello message broadcasts under different link stability degrees. Simulation results demonstrate that, compared with the standard AODV with the periodic Hello message broadcast mechanism, the proposed protocol effectively reduces unnecessary control message overhead and greatly improves the performance in terms of end-to-end delay and efficiency. 展开更多
关键词 Hello message link availability ad hoc on-demand distance vector routing protocol ad hoc
在线阅读 下载PDF
SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks 被引量:12
11
作者 WANGXiao-yun YANGLi-zhen CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期127-131,共5页
LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We ... LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensivecryplp-graphic operations to each part of the protocol functionality to create an efficient,practical protocol. Then we give security analyses of SLEACH. Our security analyses show that ourschemeis robust against any external attacker or compromised nodes in the sensor network. 展开更多
关键词 wireless sensoi network routing protocol SECURITY
在线阅读 下载PDF
MADCR:Mobility Aware Dynamic Clustering-Based Routing Protocol in Internet of Vehicles 被引量:9
12
作者 Sankar Sennan Somula Ramasubbareddy +3 位作者 Sathiyabhama Balasubramaniyam Anand Nayyar Chaker Abdelaziz Kerrache Muhammad Bilal 《China Communications》 SCIE CSCD 2021年第7期69-85,共17页
Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly d... Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly dynamic.Clustering is one of the promising solutions to maintain the route stability in the dynamic network.However,existing algorithms consume a considerable amount of time in the cluster head(CH)selection process.Thus,this study proposes a mobility aware dynamic clustering-based routing(MADCR)protocol in IoV to maximize the lifespan of networks and reduce the end-to-end delay of vehicles.The MADCR protocol consists of cluster formation and CH selection processes.A cluster is formed on the basis of Euclidean distance.The CH is then chosen using the mayfly optimization algorithm(MOA).The CH subsequently receives vehicle data and forwards such data to the Road Side Unit(RSU).The performance of the MADCR protocol is compared with that ofAnt Colony Optimization(ACO),Comprehensive Learning Particle Swarm Optimization(CLPSO),and Clustering Algorithm for Internet of Vehicles based on Dragonfly Optimizer(CAVDO).The proposed MADCR protocol decreases the end-toend delay by 5–80 ms and increases the packet delivery ratio by 5%–15%. 展开更多
关键词 clustering protocol Internet of things Internet of vehicles optimization algorithm Mayfly algorithm
在线阅读 下载PDF
A Dynamic Protocol Stack Structure for Diversified QoS Requirements in Ad Hoc Network 被引量:3
13
作者 DONG Fang Li Ou +1 位作者 RAN Xiaomin JIN Feicai 《China Communications》 SCIE CSCD 2016年第S1期43-53,共11页
A dynamic protocol stack(DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol sta... A dynamic protocol stack(DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol stack, DPS operates in a dynamic and adaptive manner and is scalable to network condition changes. In addition, a protocol construction algorithm is proposed to dynamically construct of the protocol stack each network node. Simulation results show that, the processing and forwarding performance of our scheme is close to 1 Gb/s, and the performance of our algorithm is close to that of the classical algorithms with much lower complexity. 展开更多
关键词 ad HOC network QoS GUARANTEE DYNAMIC protocol STACK protocol construction algorithm
在线阅读 下载PDF
Neural-Network-Based Control for Discrete-Time Nonlinear Systems with Input Saturation Under Stochastic Communication Protocol 被引量:10
14
作者 Xueli Wang Derui Ding +1 位作者 Hongli Dong Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期766-778,共13页
In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between th... In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between the controller and the actuators,stochastic communication protocols(SCPs)are adopted to schedule the control signal,and therefore the closed-loop system is essentially a protocol-induced switching system.A neural network(NN)-based identifier with a robust term is exploited for approximating the unknown nonlinear system,and a set of switch-based updating rules with an additional tunable parameter of NN weights are developed with the help of the gradient descent.By virtue of a novel Lyapunov function,a sufficient condition is proposed to achieve the stability of both system identification errors and the update dynamics of NN weights.Then,a value iterative ADP algorithm in an offline way is proposed to solve the optimal control of protocol-induced switching systems with saturation constraints,and the convergence is profoundly discussed in light of mathematical induction.Furthermore,an actor-critic NN scheme is developed to approximate the control law and the proposed performance index function in the framework of ADP,and the stability of the closed-loop system is analyzed in view of the Lyapunov theory.Finally,the numerical simulation results are presented to demonstrate the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive dynamic programming(ADP) constrained inputs neural network(NN) stochastic communication protocols(SCPs) suboptimal control
在线阅读 下载PDF
Network Protocol Recognition Based on Convolutional Neural Network 被引量:5
15
作者 Wenbo Feng Zheng Hong +3 位作者 Lifa Wu Menglin Fu Yihao Li Peihong Lin 《China Communications》 SCIE CSCD 2020年第4期125-139,共15页
How to correctly acquire the appropriate features is a primary problem in network protocol recognition field.Aiming to avoid the trouble of artificially extracting features in traditional methods and improve recogniti... How to correctly acquire the appropriate features is a primary problem in network protocol recognition field.Aiming to avoid the trouble of artificially extracting features in traditional methods and improve recognition accuracy,a network protocol recognition method based on Convolutional Neural Network(CNN)is proposed.The method utilizes deep learning technique,and it processes network flows automatically.Firstly,normalization is performed on the intercepted network flows and they are mapped into two-dimensional matrix which will be used as the input of CNN.Then,an improved classification model named Ptr CNN is built,which can automatically extract the appropriate features of network protocols.Finally,the classification model is trained to recognize the network protocols.The proposed approach is compared with several machine learning methods.Experimental results show that the tailored CNN can not only improve protocol recognition accuracy but also ensure the fast convergence of classification model and reduce the classification time. 展开更多
关键词 convolutional NEURAL netWORK protocol RECOGNITION netWORK FLOW CLASSIFICATION model
在线阅读 下载PDF
AeroMTP:A fountain code-based multipath transport protocol for airborne networks 被引量:4
16
作者 Li Jie Gong Erling +2 位作者 Sun Zhiqiang Liu Wei Xie Hongwei 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第4期1147-1162,共16页
Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, AN... Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, ANs have some unique attributes including high node mobility, frequent topology changes, mechanical and aerodynamic constrains, strict safety requirements and harsh communication environment.Thus, the performance of conventional transmission control protocol(TCP) will be dramatically degraded in ANs.Aircraft commonly have two or more heterogeneous network interfaces which offer an opportunity to form multiple communication paths between any two nodes in ANs.To satisfy the communication requirements in ANs, we propose aeronautical multipath transport protocol(Aero MTP) for ANs, which effectively utilizes the available bandwidth and diversity provided by heterogeneous wireless paths.Aero MTP uses fountain codes as forward error correction(FEC) codes to recover from data loss and deploys a TCP-friendly rate-based congestion control mechanism for each path.Moreover, we design a packet allocation algorithm based on optimization to minimize the delivery time of blocks.The performance of Aero MTP is evaluated through OMNe T++ simulations under a variety of test scenarios.Simulations demonstrate that Aero MTP is of great potential to be applied to ANs. 展开更多
关键词 Ad hoc networks Airborne networks Fountain code Multi-paths network protocols
原文传递
ARROW-WTCP:A fast transport protocol based on explicit congestion notification over wired/wireless networks 被引量:3
17
作者 王建新 李婧 荣亮 《Journal of Central South University》 SCIE EI CAS 2011年第3期800-808,共9页
An explicit congestion notification (ECN)-based distributed transport protocol,ARROW-WTCP (AcceleRate tRansmission towards Optimal Window size TCP for Wireless network),was proposed.The ARROW-WTCP enables feasible dep... An explicit congestion notification (ECN)-based distributed transport protocol,ARROW-WTCP (AcceleRate tRansmission towards Optimal Window size TCP for Wireless network),was proposed.The ARROW-WTCP enables feasible deployment of ARROW-TCP from wired to wireless networks by providing a joint design of source and router algorithms.The protocol obtains the actual capacity of the wireless channel by calculating the queue variation in base station (BS) and adjusts the congestion window by using the feedback from its bottleneck link.The simulation results show that the ARROW-WTCP achieves strong stability,max-min fairness in dynamic networks,fast convergence to efficiency without introducing much excess traffic,and almost full link utilization in the steady state.It outperforms the XCP-B (eXplicit Control Protocol Blind),the wireless version of XCP,in terms of stability,fairness,convergence and utilization in wireless networks. 展开更多
关键词 ARROW-WTCP transport protocol stability CONVERGENCE FAIRNESS IEEE 802.11
在线阅读 下载PDF
Quantum key distribution series network protocol with M-classical Bobs 被引量:4
18
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
原文传递
G-MER: Green Mobility Estimation- Based Routing Protocol in Wireless Sensor Network 被引量:3
19
作者 Quan Wei Guan Jianfeng +1 位作者 Xu Changqiao Zhang Hongke 《China Communications》 SCIE CSCD 2012年第5期10-21,共12页
As a core technology of Intemet of Things (loT), Wireless Sensor Network (WSN) has become a research hotspot recently. More and more WSNs are being deployed in highly mobile environments. The fast moving sensor no... As a core technology of Intemet of Things (loT), Wireless Sensor Network (WSN) has become a research hotspot recently. More and more WSNs are being deployed in highly mobile environments. The fast moving sensor nodes bring significant challenges for the routing decision. In this paper, we propose an efficient logical location method, and designe a mobility estimating metric and derive a novel Green Mobility Estirmtion- based Routing protocol (G-MER) for WSNs. We also set up a full framework to evaluate its per- formance. Simulation results illustrate that G-MER achieves a fairly better perforrmnce in terrm of broadcast times and link failures than AODV. What's more, it decreases the mean hops by about 0.25 and reduces energy consumption by about 10% during the whole experiment. All the results show that G-MER can be effectively used in fast- moving and limited resource scenarios. 展开更多
关键词 IoT WSN green routing protocol rmbility estimation dynamic window energy con-suming model
在线阅读 下载PDF
An Efcient Hop Count Routing Protocol for Wireless Ad Hoc Networks 被引量:3
20
作者 Xu Zhang Zhi-Hong Qian +1 位作者 Yu-Qi Guo Xue Wang 《International Journal of Automation and computing》 EI CSCD 2014年第1期93-99,共7页
An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networ... An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networks.During the route fnding process,the node can dynamically assign transmission power to nodes along the route.The node who has received route request message compares its power with the threshold power value,and then selects a reasonable route according to discriminating algorithms.This algorithm is an efective solution scheme to wireless ad hoc networks through reasonably selected path to reduce network consumption.Simulation results indicate that the proposed protocol can deliver better performances with respect to energy consumption and end-to-end delay. 展开更多
关键词 Wireless ad hoc networks routing protocol hop count THRESHOLD transmission power
原文传递
上一页 1 2 113 下一页 到第
使用帮助 返回顶部