期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
En-Route Transcoding缓存的优化放置和替换
1
作者 李春洪 冯国富 +2 位作者 顾铁成 陆桑璐 陈道蓄 《软件学报》 EI CSCD 北大核心 2008年第4期956-966,共11页
对en-route transcoding缓存中的缓存路由和协同放置及替换问题进行了研究.提出了CCRA(cost-aware cache routing algorithm)缓存路由算法,能以可控的探测开销来发现潜在的、具有最小访问开销的缓存对象.在此基础上,建立了en-route tran... 对en-route transcoding缓存中的缓存路由和协同放置及替换问题进行了研究.提出了CCRA(cost-aware cache routing algorithm)缓存路由算法,能以可控的探测开销来发现潜在的、具有最小访问开销的缓存对象.在此基础上,建立了en-route transcoding缓存的分析模型,将缓存放置和替换问题形式化为一个最优化问题,并利用一种基于动态规划的方法来求解最佳缓存放置策略.仿真结果表明,与已有的元算法放置策略相比,该协同放置和替换策略可以获得更好的CSR性能. 展开更多
关键词 en-route transcoding缓存 缓存路由 协同放置 缓存替换
在线阅读 下载PDF
Secure Path Cycle Selection Method Using Fuzzy Logic System for Improving Energy Efficiency in Statistical En-Route Filtering Based WSNs
2
作者 Su Man Nam Chung Il Sun Tae Ho Cho 《Wireless Sensor Network》 2011年第11期357-361,共5页
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injected attack which takes place on application layer is elected by the compromised node. If the false report arrives in ... Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injected attack which takes place on application layer is elected by the compromised node. If the false report arrives in a base station, a false alarm is occurred, and the energy of the nodes is consumed. To detect the false report, statistical en-route filtering method is proposed. In this paper, we proposed the secure path cycle selection method using fuzzy rule-based system to consume effective energy. The method makes balanced energy consumption of each node. Moreover, the lifetime of the whole network will be increased. The base station determines the path cycle using the fuzzy rule-based system. The performance of the proposed method is demonstrated using simulation studies with the three methods. 展开更多
关键词 Wireless Sensor Network SECURE PATH CYCLE SELECTION STATISTICAL en-route FILTERING PATH SELECTION Method Fuzzy System
暂未订购
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks 被引量:1
3
作者 Hyeon Myeong Choi Su Man Nam Tae Ho Cho 《Wireless Sensor Network》 2013年第3期33-40,共8页
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised secur... Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security. 展开更多
关键词 WIRELESS Sensor Network Security STATISTICAL en-route WORMHOLE SECURE ROUTING
暂未订购
Probability Control for Verification of an Event Report Using Fuzzy System
4
作者 Hyun Woo Lee Soo Young Moon Tae Ho Cho 《Wireless Sensor Network》 2011年第12期371-377,共7页
Sensor networks include numerous sensor nodes that are vulnerable to physical attacks from the outside because they operate in open environments. The sensor nodes are compromised by an attacker. The compromised nodes ... Sensor networks include numerous sensor nodes that are vulnerable to physical attacks from the outside because they operate in open environments. The sensor nodes are compromised by an attacker. The compromised nodes generate false reports and inject the reports into sensor networks. The false report injection attacks deplete energy of the sensor nodes. Ye et al. proposed Statistical En-Route Filtering (SEF) to defend sensor nodes against the false report injection attacks. In SEF, sensor nodes verify the event reports based on a fixed probability. Thus, the verification energy of a node is the same whether the report is false or valid. But when there are few false reports, energy for verifying legitimate reports may be wasted. In this paper, we propose a method in which each node controls a probability of attempts at verification of an event report to reduce the wasted energy. The probability is determined through consideration of the number of neighboring nodes, the number of hops from the node to the sink node, and the rate of false reports among the 10 most recent event reports forwarded to a node. We simulated our proposed method to prove its energy efficiency. After the simulation, we confirmed that the proposed method is more efficient than SEF for saving sensor node’s energy. 展开更多
关键词 Sensor Network STATISTICAL en-route FILTERING False REPORT Injection ATTACK
暂未订购
上一页 1 下一页 到第
使用帮助 返回顶部