期刊文献+
共找到1,911篇文章
< 1 2 96 >
每页显示 20 50 100
基于BLE Mesh的智能电器系统能量管理与QoS方法研究
1
作者 李凯程 许海波 +4 位作者 舒亮 林振权 钱卫飞 余存泰 王庚环 《机电工程技术》 2026年第2期120-126,共7页
随着“双碳”目标的实施,智能电器系统在能源电力管理中扮演着越来越重要的角色。提出了一种基于能量管理机制的低功耗蓝牙(Bluetooth Low Energy,BLE)组网(Mesh)服务质量(Quality of Service,QoS)方法,以改进智能电器系统中的数据通信... 随着“双碳”目标的实施,智能电器系统在能源电力管理中扮演着越来越重要的角色。提出了一种基于能量管理机制的低功耗蓝牙(Bluetooth Low Energy,BLE)组网(Mesh)服务质量(Quality of Service,QoS)方法,以改进智能电器系统中的数据通信性能。BLE Mesh因其低功耗和高安全性成为物联网领域的热门通信选择,但其现有规范未能满足不同业务类型的服务质量需求。为解决这一问题,引入了QoS管理机制,通过为每个数据包分配优先级,实现网络内数据的有效调度和优化。利用BLE Mesh协议的低功耗节点机制,还改进设计了直接网络管理策略,以提高非主干供电节点的能量效率。通过实验验证了此方法的有效性,不同QoS等级下的包交付时间、包交付率和设备寿命等关键性能指标均显示出良好的区分性,高优先级相比低优先级的设备寿命缩短了9.25%,但传输可靠性能提升了25.6%,而传输实时性能提高了25.1%,证明了QoS管理方法的合理性;采用直接网络管理策略后,设备寿命从2.899天提高至10.662天,证明了直接网络管理策略在高网络拥塞时能有效降低功耗。综合来看,研究结果为BLE Mesh网络的能量管理与QoS优化提供了一种新思路,增强了其在智能电器系统中的应用潜力。 展开更多
关键词 BLE mesh 智能电器系统 服务质量方法 直接网络管理
在线阅读 下载PDF
面向港口受限空间作业的多参数无线Mesh自组网系统设计
2
作者 周剑峰 《中国水运》 2026年第1期45-48,共4页
在受限空间中进行作业时,由于空间进出口限制且空气流通能力较差,容易引发中毒、缺氧窒息和燃爆等安全事故。为了便于作业监护人员实时检查确认作业内容和作业环境安全,提升应急救援的效率效果,结合国家和行业对特殊作业的管理要求,需... 在受限空间中进行作业时,由于空间进出口限制且空气流通能力较差,容易引发中毒、缺氧窒息和燃爆等安全事故。为了便于作业监护人员实时检查确认作业内容和作业环境安全,提升应急救援的效率效果,结合国家和行业对特殊作业的管理要求,需要一种有效的无线通信自组网技术,建立稳定的网络连接,持续性监测受限空间内部气体成分,传输全过程作业影像。研究设计了一种多参数无线Mesh自组网系统,利用混合式结构Mesh组网技术,采用无线Mesh和无线4G/5G网络传输,配合防爆处理后的网络连接设备,实现受限空间作业环境的远程无线监控。网络各个节点之间以动态网状方式连接,终端节点彼此平等,网络健壮性优于传统无线网络。 展开更多
关键词 受限空间 无线通信 mesh组网
在线阅读 下载PDF
Traffic-aware static channel assignment algorithm in wireless mesh networks 被引量:1
3
作者 陶军 柳津 +1 位作者 邵碧锐 刘智杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期370-374,共5页
A channel assignment algorithm with awareness of link traffic is proposed in multi-radio multi-channel wireless mesh networks. First, the physical interference model based on the signal-to-interference-plus-noise rati... A channel assignment algorithm with awareness of link traffic is proposed in multi-radio multi-channel wireless mesh networks. First, the physical interference model based on the signal-to-interference-plus-noise ratio and successful transmission condition is described. The model is more suitable for a wireless communication environment than other existing models. Secondly, a pure integer quadratic programming (PIQP) model is used to solve the channel assignment problem and improve the capacity of wireless mesh networks. Consequently, a traffic- aware static channel assignment algorithm(TASC) is designed. The algorithm adopts some network parameters, including the network connectivity, the limitation of the number of radios and the successful transmission conditions in wireless communications. The TASC algorithm can diminish network interference and increase the efficiency of channel assignment while keeping the connectivity of the network. Finally, the feasibility and effectivity of the channel assignment solution are illustrated by the simulation results. Compared witb similar algorithms, the proposed algorithm can increase the capacity of WMNs. 展开更多
关键词 multi-radio multi-channel wireless mesh network static channel assignment traffic-aware
在线阅读 下载PDF
Distribution algorithm of entangled particles for wireless quantum communication mesh networks
4
作者 王霄峻 施丽慧 +2 位作者 占海涛 项睿清 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2015年第4期450-456,共7页
With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes ... With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes selection in order to save cost and reduce complexity. A minimum spanning tree( MST)-based quantum distribution algorithm( QDMST) is presented to construct the mesh backbone network. First, the articulation points are found,and for each connected block uncovered by the articulation points, the general centers are solved. Then, both articulation points and general centers are classified as backbone nodes and an M ST is formed. The quantum path between every two neighbor nodes on the MST is calculated. The nodes on these paths are also classified as backbone nodes. Simulation results validate the advantages of QDMST in the average backbone nodes number and average quantum channel distance compared to the existing random selection algorithm under multiple network scenarios. 展开更多
关键词 wireless quantum communication networks entangled particles distribution wireless mesh networks minimum spanning tree
在线阅读 下载PDF
802.11 Mesh network中WBDMR分布式路由协议的研究
5
作者 刘伟 吴宇红 《电子科技》 2006年第3期39-42,47,共5页
提出了一种适用于中等规模的802.11Meshnetwork网络的无线分布式路由协议(WBDMR)。该协议借鉴了基于Ad-Hoc的ADOV协议并进行了改造,实现了不同BSS(基本服务集)间无线客户端通过无线中继相互通信。利用节点间交换链路损耗信息实现了动态... 提出了一种适用于中等规模的802.11Meshnetwork网络的无线分布式路由协议(WBDMR)。该协议借鉴了基于Ad-Hoc的ADOV协议并进行了改造,实现了不同BSS(基本服务集)间无线客户端通过无线中继相互通信。利用节点间交换链路损耗信息实现了动态负载平衡、有效地抑制了冗余路由信息的传播、消除了路由环路、建立了备份路由。仿真结果表明,WBDMR协议具有较好的路由特性和时延特性。 展开更多
关键词 网中网 分布式路由协议 有线接入点
在线阅读 下载PDF
Towards an Artificial Immune System for Detecting Anomalies in Wireless Mesh Networks 被引量:3
6
作者 易平 吴越 陈佳霖 《China Communications》 SCIE CSCD 2011年第3期107-117,共11页
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents m... This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently. 展开更多
关键词 immune system intrusion detection mobile agent wireless mesh network network security
在线阅读 下载PDF
Error resilient concurrent video streaming over wireless mesh networks 被引量:2
7
作者 CHUAH Chen-nee YOO Ben S.J. 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第5期684-695,共12页
In this paper, we propose a multi-source multi-path video streaming system for supporting high quality concurrent video-on-demand (VoD) services over wireless mesh networks (WMNs), and leverage forward error correctio... In this paper, we propose a multi-source multi-path video streaming system for supporting high quality concurrent video-on-demand (VoD) services over wireless mesh networks (WMNs), and leverage forward error correction to enhance the error resilience of the system. By taking wireless interference into consideration, we present a more realistic networking model to capture the characteristics of WMNs and then design a route selection scheme using a joint rate/interference-distortion optimiza- tion framework to help the system optimally select concurrent streaming paths. We mathematically formulate such a route selec- tion problem, and solve it heuristically using genetic algorithm. Simulation results demonstrate the effectiveness of our proposed scheme. 展开更多
关键词 Wireless mesh network CONCURRENT VIDEO streaming INTERFERENCE
在线阅读 下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
8
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
在线阅读 下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
9
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
在线阅读 下载PDF
Gateways Placement in Backbone Wireless Mesh Networks 被引量:2
10
作者 Maolin TANG 《International Journal of Communications, Network and System Sciences》 2009年第1期44-50,共7页
This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns m... This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns mesh routers to identified gateways. The new algorithm can guarantee to find a feasible gateway placement satisfying Quality-of-Service (QoS) constraints, including delay constraint, relay load constraint and gateway capacity constraint. Experimental results show that its performance is as good as that of the best of existing algorithms for the gateway placement problem. But, the new algorithm can be used for BWMNs that do not form one connected component, and it is easy to implement and use. 展开更多
关键词 GATEWAY PLACEMENT BACKBONE WIRELESS mesh networks
在线阅读 下载PDF
Multi-path based secure communication in wireless mesh networks 被引量:1
11
作者 Ding Xuyang Fan Mingyu Lu Xiaojun Zhu Dayong Wang Jiahao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期818-824,共7页
Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarant... Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths. 展开更多
关键词 wireless mesh network secure communication key exchange risk avoidance
在线阅读 下载PDF
Centralized Quasi-Static Channel Assignment for Multi-Radio Multi-Channel Wireless Mesh Networks 被引量:3
12
作者 Juan REN Zhengding QIU 《Wireless Sensor Network》 2009年第2期104-111,共8页
Employing multiple channels in wireless multihop networks is regarded as an effective approach to increas-ing network capacity. This paper presents a centralized quasi-static channel assignment for multi-radio multi-c... Employing multiple channels in wireless multihop networks is regarded as an effective approach to increas-ing network capacity. This paper presents a centralized quasi-static channel assignment for multi-radio multi-channel Wireless Mesh Networks (WMNs). The proposed channel assignment can efficiently utilize multiple channels with only 2 radios equipped on each mesh router. In the scheme, the network end-to-end traffics are first modeled by probing data at wireless access points, and then the traffic load between each pair of neighboring routers is further estimated using an interference-aware estimation algorithm. Having knowledge of the expected link load, the scheme assigns channels to each radio with the objective of mini-mizing network interference, which as a result greatly improves network capacity. The performance evalua-tion shows that the proposed scheme is highly responsive to varying traffic conditions, and the network per-formance under the channel assignment significantly outperforms the single-radio IEEE 802.11 network as well as the 2-radio WMN with static 2 channels. 展开更多
关键词 Wireless mesh networks MULTIHOP network Channel ASSIGNMENT MULTI-RADIO
在线阅读 下载PDF
Evaluation of Energy Consumption of Proactive, Reactive, and Hybrid Routing Protocols in Wireless Mesh Networks Using 802.11 Standards 被引量:2
13
作者 Sidoine D. Samo Jean Louis E. K. Fendji 《Journal of Computer and Communications》 2018年第4期1-30,共30页
This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics t... This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end. 展开更多
关键词 Energy CONSUMPTION Routing Protocols Wireless mesh networks e-Throughput e-PDR
在线阅读 下载PDF
A Secure and Reliable Routing Protocol for Wireless Mesh Networks 被引量:1
14
作者 黄仁俊 萧宇凯 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期466-475,共10页
This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds o... This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices(or nodes). Individual node cooperates by forwarding packets to each other,allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security. 展开更多
关键词 asymmetric link wireless mesh networks secure routing
原文传递
Tree-Based Proactive Routing Protocol for Wireless Mesh Network 被引量:2
15
作者 Ji Wenjiang Ma Jianfeng +1 位作者 Ma Zhuo Ran Youliang 《China Communications》 SCIE CSCD 2012年第1期25-33,共9页
Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by pr... Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by proactive routing protocol. Pre-proposals like Tree Based Routing (TBR) protocol and Root Driven Routing (RDR) protocol are so centralized that they make the gateway becorre a bottleneck which severely restricts the network performance. We proposed an Optimized Tree-based Routing (OTR) protocol that logically separated the proactive tree into pieces. Route is partly computed by the branches instead of root. We also discussed the operation of multipie Intemet gateways which is a main issue in WMN. The new proposal lightens the load in root, reduces the overhead and improves the throughput. Numerical analysis and simulation results confirm that the perforrmnce of WMN is improved and OTR is more suitable for large scale WMN. 展开更多
关键词 wireless mesh network 802. lls routing protocol tree-based routing
在线阅读 下载PDF
A TRUST MECHANISM-BASED CHANNEL ASSIGNMENT AND ROUTING SCHEME IN COGNITIVE WIRELESS MESH NETWORKS WITH INTRUSION DETECTION 被引量:1
16
作者 Wu Guofeng Zhang Jing He Zhaopan 《Journal of Electronics(China)》 2010年第5期728-734,共7页
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ... Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively. 展开更多
关键词 Cognitive Wireless mesh networks (CWMN) Intrusion detection Trust mechanism Channel assignment ROUTING
在线阅读 下载PDF
Incorporating Network Coding into TCP Grounded on Network Utility Maximization in Multi-Radio Multi-Channel Wireless Mesh Networks 被引量:1
17
作者 Liu Hongquan Gu Yuantao 《China Communications》 SCIE CSCD 2012年第6期28-35,共8页
A new approach, named TCP-I2NC, is proposed to improve the interaction between network coding and TCP and to maximize the network utility in interference-free multi-radio multi-channel wireless mesh networks. It is gr... A new approach, named TCP-I2NC, is proposed to improve the interaction between network coding and TCP and to maximize the network utility in interference-free multi-radio multi-channel wireless mesh networks. It is grounded on a Network Utility Maxmization (NUM) formulation which can be decomposed into a rate control problem and a packet scheduling problem. The solutions to these two problems perform resource allocation among different flows. Simulations demonstrate that TCP-I2NC results in a significant throughput gain and a small delay jitter. Network resource is fairly allocated via the solution to the NUM problem and the whole system also runs stably. Moreover, TCP-I2NC is compatible with traditional TCP variants. 展开更多
关键词 network utility maximization net-work coding wireless mesh network TCP
在线阅读 下载PDF
Survivable Routing Protocol for Green Wireless Mesh Networks Based on Energy Efficiency 被引量:1
18
作者 YU Yinpeng PENG Yuhuai +2 位作者 LIU Yejun GUO Lei SONG Meng 《China Communications》 SCIE CSCD 2014年第8期117-124,共8页
This paper proposes a new Energyefficient Survivable Routing Protocol(ESRP)based on solar energy and wind mixed for power supply in green wireless mesh networks(WMNs).The ESRP combines hop penalty strategy and floodin... This paper proposes a new Energyefficient Survivable Routing Protocol(ESRP)based on solar energy and wind mixed for power supply in green wireless mesh networks(WMNs).The ESRP combines hop penalty strategy and flooding delaying strategy to improve the performances of traditional routing protocol.This paper uses QualNet to simulate and verify the performances of proposed ESRP.Compared with the traditional routing protocol,the simulation results show that the energy utilization of ESRP is more efficient by 13%.At the same time,ESRP is more load-balanced to postpone the appearance of the first energy depletion node and reduce the number of energy depletion nodes,and thus it effectively improves network survivability. 展开更多
关键词 wireless mesh networks ROUTING ENERGY-EFFICIENT SURVIVABILITY
在线阅读 下载PDF
Design and analysis of intrusion detection systems for wireless mesh networks 被引量:1
19
作者 Fawaz S.Al-Anzi 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1068-1076,共9页
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and all... Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and allow omnipresent access to users on the Internet. A multitude of emerging public services rely on the widespread, high-speed, and inexpensive connectivity provided by such networks. The absence of a centralized network infrastructure and open shared medium makes WMNs particularly susceptible to malevolent attacks, especially in multihop networks. Hence, it is becoming increasingly important to ensure privacy, security, and resilience when designing such networks. An effective method to detect possible internal and external attack vectors is to use an intrusion detection system. Although many Intrusion Detection Systems (IDSs) were proposed for Wireless Mesh Networks (WMNs), they can only detect intrusions in a particular layer. Because WMNs are vulnerable to multilayer security attacks, a cross-layer IDS are required to detect and respond to such attacks. In this study, we analyzed cross-layer IDS options in WMN environments. The main objective was to understand how such schemes detect security attacks at several OSI layers. The suggested IDS is verified in many scenarios, and the experimental results show its efficiency. 展开更多
关键词 WIRELESS mesh network Intrusi on detection CROSS-LAYER SECURITY
在线阅读 下载PDF
A Novel Optical Burst Mesh Network with Optical Time Slot Interchange at Source Nodes 被引量:1
20
作者 熊前进 邓宁 +2 位作者 薛青松 李沫 龚国伟 《China Communications》 SCIE CSCD 2013年第4期70-78,共9页
In this paper, we propose an optical burst network architecture supporting the ge- netic mesh topology. The intermediate node architecture of the mesh network can be the same with current wavelength switching Wave- le... In this paper, we propose an optical burst network architecture supporting the ge- netic mesh topology. The intermediate node architecture of the mesh network can be the same with current wavelength switching Wave- length Division Multiplexing (WDM) net- works, and thus can reuse existing deployed infrastructure. We employ a novel Optical Time Slot Interchange (OTSI) at the source nodes for the first time to mitigate the burst conten- tion and to increase the bandwidth utilization. Time- and wavelength-domain reuse in the OTSI significantly saves optical components and red- uces blocking probability. 展开更多
关键词 SDN OTN MPLS OTSI ROADM Optical Burst mesh network WDM WSS
在线阅读 下载PDF
上一页 1 2 96 下一页 到第
使用帮助 返回顶部