期刊文献+
共找到1,572篇文章
< 1 2 79 >
每页显示 20 50 100
STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL 被引量:2
1
作者 逯昭义 齐藤忠夫 《Science China Mathematics》 SCIE 1990年第9期1123-1131,共9页
The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.
关键词 local area network access control star-type LAN access control.
原文传递
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
2
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
原文传递
Fault Tolerant Control for Networked Control Systems with Access Constraints 被引量:4
3
作者 ZHAO Ming-Yue LIU He-Ping +2 位作者 LI Zhi-Jun SUN De-Hui LIU Ke-Ping 《自动化学报》 EI CSCD 北大核心 2012年第7期1119-1126,共8页
关键词 网络控制系统 容错控制器 访问限制 Lyapunov函数法 执行器故障 采样时间 设计方法 调度方法
在线阅读 下载PDF
Towards Effective Integrated Access Control Lists in Internet Networks
4
作者 Kamal A. Ahmat Ammar Elnour 《通讯和计算机(中英文版)》 2013年第10期1284-1291,共8页
关键词 访问控制列表 INTERNET网络 有效集成 启发式算法 企业网络 安全漏洞 网络性能 ACL
在线阅读 下载PDF
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
5
作者 Adeniran Ishola Oluwaranti Tayo Dorcas Obasanya 《Wireless Sensor Network》 2014年第7期129-135,共7页
Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on en... Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time. 展开更多
关键词 MOBILITY Medium access control Wireless Sensor networks GAUSS MARKOV MOBILITY Model
在线阅读 下载PDF
Performance Analysis of WLAN Medium Access Control Protocols in Simulcast Radio-Over-Fiber-Based Distributed Antenna Systems 被引量:5
6
作者 LI Jianqiang FAN Yuting CHEN Hao LU Xun XU Kun 《China Communications》 SCIE CSCD 2014年第5期37-48,共12页
The performance of three wireless local-area network(WLAN) media access control(MAC) protocols is investigated and compared in the context of simulcast radioover-fiber-based distributed antenna systems(RoF-DASs) where... The performance of three wireless local-area network(WLAN) media access control(MAC) protocols is investigated and compared in the context of simulcast radioover-fiber-based distributed antenna systems(RoF-DASs) where multiple remote antenna units(RAUs) are connected to one access point(AP) with different-length fiber links.The three WLAN MAC protocols under investigation are distributed coordination function(DCF) in basic access mode,DCF in request/clear to send(RTS/CTS) exchange mode,and point coordination function(PCF).In the analysis,the inter-RAU hidden nodes problems and fiber-length difference effect are both taken into account.Results show that adaptive PCF mechanism has better throughput performances than the other two DCF modes,especially when the inserted fiber length is short. 展开更多
关键词 radio-over-fiber wireless localarea network distributed antenna systems medium access control simulcast
在线阅读 下载PDF
Fault detection for networked systems subject to access constraints and packet dropouts 被引量:3
7
作者 Xiongbo Wan Huajing Fang Sheng Fu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第1期127-134,共8页
This paper addresses the problem of fault detection(FD) for networked systems with access constraints and packet dropouts.Two independent Markov chains are used to describe the sequences of channels which are availa... This paper addresses the problem of fault detection(FD) for networked systems with access constraints and packet dropouts.Two independent Markov chains are used to describe the sequences of channels which are available for communication at an instant and the packet dropout process,respectively.Performance indexes H∞ and H_ are introduced to describe the robustness of residual against external disturbances and sensitivity of residual to faults,respectively.By using a mode-dependent fault detection filter(FDF) as residual generator,the addressed FD problem is converted into an auxiliary filter design problem with the above index constraints.A sufficient condition for the existence of the FDF is derived in terms of certain linear matrix inequalities(LMIs).When these LMIs are feasible,the explicit expression of the desired FDF can also be characterized.A numerical example is exploited to show the usefulness of the proposed results. 展开更多
关键词 fault detection(FD) networked control system(NCS) access constraints packet dropouts linear matrix inequality(LMI).
在线阅读 下载PDF
Architectural Approaches to Network and Service Access Authentication
8
作者 Marcin Dabrowski Piotr Pacyna 《China Communications》 SCIE CSCD 2007年第3期4-16,共13页
Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wir... Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wireless world.However,the differences in the operational environment between the fixed and the wireless world,heterogeneity of the radio communications systems,new trends in service provisioning, emerging business models and performance requirements raise the need to revisit the original requirements for authentication systems and to come up with schemes that better suit current needs.In this review paper we discuss authentication in singlehop radio access networks by characterizing the current as well as the emerging authentication schemes. 展开更多
关键词 AUTHENTICATION access control wireless networks next-generation Internet
在线阅读 下载PDF
AN ADAPTIVE OPPORTUNISTIC RETRANSMISSION CONTROL SCHEME ENVIRONMENT-AWARE-BASED FOR WIRELESS MULTIMEDIA MESH NETWORKS
9
作者 Zhao Haitao Dong Yuning +1 位作者 Zhang Hui Li Yang 《Journal of Electronics(China)》 2010年第6期756-764,共9页
In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on env... In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput. 展开更多
关键词 Wireless Mesh networks (WMNs) Media access control (MAC) Retransmission control Environment-aware
在线阅读 下载PDF
The Novel MAC Protocol for Mixed-media PON Access Networks
10
作者 HO Jih-Hsin 《通讯和计算机(中英文版)》 2010年第6期71-75,共5页
关键词 MAC协议 PON 网络媒体 接入 混合 无源光网络 介质访问控制 网络带宽
在线阅读 下载PDF
A new multi-channel MAC protocol based on CDMA for ad hoc networks 被引量:1
11
作者 贾旻 陈惠民 袁玉华 《Journal of Shanghai University(English Edition)》 CAS 2007年第2期174-177,共4页
This paper proposes a novel multichannel medium access control (MAC) protocol based on CDMA that improves network performance and reduces collision probability in wireless ad hoc networks. In the scheme, the code ch... This paper proposes a novel multichannel medium access control (MAC) protocol based on CDMA that improves network performance and reduces collision probability in wireless ad hoc networks. In the scheme, the code channel is divided into common channel, broadcast channel and several data channels. Simulation results show that the proposed protocol can achieve significantly better performance than the IEEE 802.11 standard. 展开更多
关键词 ad hoc networks medium access control (MAC) protocol MULTICHANNEL CDMA
在线阅读 下载PDF
Multilevel security model for ad hoc networks 被引量:1
12
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
在线阅读 下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
13
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data Security Authentication access control In-network data sharing Information-centric network
在线阅读 下载PDF
A Survey on Underwater Acoustic Sensor Networks: Perspectives on Protocol Design for Signaling, MAC and Routing 被引量:5
14
作者 Mohammad Sharif-Yazd Mohammad Reza Khosravi Mohammad Kazem Moghimi 《Journal of Computer and Communications》 2017年第5期12-23,共12页
Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underw... Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underwater sensor networks are different from other sensor networks due to the acoustic channel used in their physical layer, thus we should discuss about the specific features of these underwater networks such as acoustic channel modeling and protocol design for different layers of open system interconnection (OSI) model. Each node of these networks as a sensor needs to exchange data with other nodes;however, complexity of the acoustic channel makes some challenges in practice, especially when we are designing the network protocols. Therefore based on the mentioned cases, we are going to review general issues of the design of an UASN in this paper. In this regard, we firstly describe the network architecture for a typical 3D UASN, then we review the characteristics of the acoustic channel and the corresponding challenges of it and finally, we discuss about the different layers e.g. MAC protocols, routing protocols, and signal processing for the application layer of UASNs. 展开更多
关键词 ACOUSTIC Communications UNDERWATER ACOUSTIC Sensor networks (UASNs) UNDERWATER Medium access control (Underwater MAC) UNDERWATER ROUTING Distributed Signal Processing
在线阅读 下载PDF
A feedback-retransmission based asynchronous frequency hopping MAC protocol for military aeronautical ad hoc networks 被引量:4
15
作者 Jinhui TANG Yequn WANG +2 位作者 Shufu DONG Qilu SUN Guoce HUANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2018年第5期1130-1140,共11页
Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control(MAC) designed for this application works well only in very light-... Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control(MAC) designed for this application works well only in very light-load scenarios; as a consequence, the performances of system throughput and channel utilization are degraded. For this problem, a feedback-retransmission based asynchronous FRequency hopping Media Access(FRMA) control protocol is proposed. Burst communication, asynchronous Frequency Hopping(FH), channel coding, and feedback retransmission are utilized in FRMA. With the mechanism of asynchronous FH, immediate packet transmission and multi-packet reception can be realized, and thus the timeliness is improved.Furthermore, reliability can be achieved via channel coding and feedback retransmission. With theories of queuing theory, Markov model, packets collision model, and discrete Laplace transformation, the formulas of packet success probability, system throughput, average packet end-to-end delay, and delay distribution are obtained. The approximation accuracy of theoretical derivation is verified by experimental results. Within a light-load network, the proposed FRMA has the ability of millisecond delay and 99% reliability as well as outperforms the non-feedback-retransmission based asynchronous frequency hopping media access control protocol. 展开更多
关键词 Ad hoc networks Aeronautical communications Frequency hopping Media access control(MAC) Time-sensitive
原文传递
Ambient Networks项目及其关键技术
16
作者 程婕 冯春燕 《中兴通讯技术》 2008年第3期38-41,共4页
随着无线通信技术的不断发展,多接入技术、不同运营商和多样化终端共存的局面使得传统的无线通信格局面临困境,异构网络融合成为未来网络发展的必然趋势。欧盟项目Ambient Networks对异构网络融合进行了深入的研究。Ambient Net-works... 随着无线通信技术的不断发展,多接入技术、不同运营商和多样化终端共存的局面使得传统的无线通信格局面临困境,异构网络融合成为未来网络发展的必然趋势。欧盟项目Ambient Networks对异构网络融合进行了深入的研究。Ambient Net-works提出了Ambient控制平面(ACS)来支持动态的、分布式的、自管理和自维护的异构网络管理;通过多无线接入结构(MRA)充分利用多种接入技术并存带来的优势,为用户提供总是处于最佳连接的服务。 展开更多
关键词 异构网络 AN项目 Ambient控制平面 多无线接入结构
在线阅读 下载PDF
A Survey on Real-Time MAC Protocols in Wireless Sensor Networks
17
作者 Zheng Teng Ki-Il Kim 《Communications and Network》 2010年第2期104-112,共9页
As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usuall... As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because most of query messages carry time information. To meet this requirement, recently several real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for end-to-end delay. In this paper, we first introduce the specific requirement of wireless sensor real-time MAC protocol. Then, a collection of recent wireless sensor real-time MAC protocols are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally we present a dis-cussion about the challenges of current wireless sensor real-time MAC protocols in the literature, and show the conclusion in the end. 展开更多
关键词 WIRELESS Sensor networks MEDIUM access control (MAC) REAL-TIME
在线阅读 下载PDF
An IEEE 802.15.4 Based Adaptive Communication Protocol in Wireless Sensor Network: Application to Monitoring the Elderly at Home
18
作者 Juan Lu Adrien Van Den Bossche Eric Campo 《Wireless Sensor Network》 2014年第9期192-204,共13页
Monitoring behaviour of the elderly and the disabled living alone has become a major public health problem in our modern societies. Among the various scientific aspects involved in the home monitoring field, we are in... Monitoring behaviour of the elderly and the disabled living alone has become a major public health problem in our modern societies. Among the various scientific aspects involved in the home monitoring field, we are interested in the study and the proposal of a solution allowing distributed sensor nodes to communicate with each other in an optimal way adapted to the specific application constraints. More precisely, we want to build a wireless network that consists of several short range sensor nodes exchanging data between them according to a communication protocol at MAC (Medium Access Control) level. This protocol must be able to optimize energy consumption, transmission time and loss of information. To achieve this objective, we have analyzed the advantages and the limitations of WSN (Wireless Sensor Network) technologies and communication protocols currently used in relation to the requirements of our application. Then we proposed a deterministic, adaptive and energy saving medium access method based on the IEEE 802.15.4 physical layer and a mesh topology. It ensures the message delivery time with strongly limited collision risk due to the spatial reuse of medium in the two-hop neighbourhood. This proposal was characterized by modelling and simulation using OPNET network simulator. Finally we implemented the proposed mechanisms on hardware devices and deployed a sensors network in real situation to verify the accuracy of the model and evaluate the proposal according to different test configurations. 展开更多
关键词 Wireless Sensor network Medium access control Quality of Service Energy SAVING Mesh Topology IEEE 802.15.4 Indoor MONITORING APPLICATION
暂未订购
Security Service Technology for Mobile Networks
19
作者 Aiqun Hu Tao Li Mingfu Xue 《ZTE Communications》 2011年第3期49-54,共6页
As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes s... As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development. 展开更多
关键词 mobile network security security service trusted computing access control
在线阅读 下载PDF
UniAccess网络准入控制技术简介
20
作者 茹正毅 《通信电源技术》 2014年第5期54-55,共2页
网络是现代企业运营和服务的基础,网络安全就是一道保护门。通过UniAccess网络准入控制技术的部署和应用,企业网络安全级别可以得到显著提升。文中介绍了UniAccess网络准入控制的功能和优势,以及部署UniAccess网络准入控制的必要性。
关键词 网络准入控制技术
在线阅读 下载PDF
上一页 1 2 79 下一页 到第
使用帮助 返回顶部