期刊文献+
共找到2,025篇文章
< 1 2 102 >
每页显示 20 50 100
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
1
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 AUTHENTICATION key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
Research on Polling MAC Protocols for Flying Ad-Hoc Networks
2
作者 Shujian Wang Zhijun Yang +1 位作者 Hongwei Ding Xiong Wang 《国际计算机前沿大会会议论文集》 2025年第1期489-503,共15页
Flying ad hoc networks(FANETs),which are composed of unmanned aerial vehicles(UAVs),face severe quality-of-service(QoS)challenges because of their high mobility,rapidly changing topologies,and limited infrastructure s... Flying ad hoc networks(FANETs),which are composed of unmanned aerial vehicles(UAVs),face severe quality-of-service(QoS)challenges because of their high mobility,rapidly changing topologies,and limited infrastructure support.Conventional MAC protocols,such as contention-based CSMA/CA,often fail to guarantee low latency and high throughput under these conditions.To address these challenges,this paper investigates the MAC-layer QoS problem in FANETs and proposes a polling-based MAC protocol integrated with the IEEE 802.11 point coordination function(PCF).The protocol adopts a centralized scheduling mechanism using a master node to coordinate data transmission on the basis of a first-in-first-out(FIFO)policy.While this centralized approach simplifies coordination and reduces contention,it introduces limitations regarding scalability and robustness in decentralized or dynamic environments,which are common in FANET scenarios.To analyse protocol behavior,a polling system model is developed with three service strategies:Gated Service,Exhaustive Service,and Limited-1 Service.Analytical models are derived for queue length and delay,and MATLAB simulations validate the feasibility of the proposed scheme.The results show that despite its structural constraints,the proposed protocol can achieve a balance between throughput,delay,and fairness in specific mission-driven UAV applications,such as coordinated surveillance and real-time task distribution.Further research will explore decentralized adaptations to improve protocol flexibility and fault tolerance in dynamic UAV networks. 展开更多
关键词 Flying ad-hoc networks(FANETs) UAV Swarm Communication Polling MAC Proto cols·QualityofService(QoS)
原文传递
基于BLE Mesh的智能电器系统能量管理与QoS方法研究
3
作者 李凯程 许海波 +4 位作者 舒亮 林振权 钱卫飞 余存泰 王庚环 《机电工程技术》 2026年第2期120-126,共7页
随着“双碳”目标的实施,智能电器系统在能源电力管理中扮演着越来越重要的角色。提出了一种基于能量管理机制的低功耗蓝牙(Bluetooth Low Energy,BLE)组网(Mesh)服务质量(Quality of Service,QoS)方法,以改进智能电器系统中的数据通信... 随着“双碳”目标的实施,智能电器系统在能源电力管理中扮演着越来越重要的角色。提出了一种基于能量管理机制的低功耗蓝牙(Bluetooth Low Energy,BLE)组网(Mesh)服务质量(Quality of Service,QoS)方法,以改进智能电器系统中的数据通信性能。BLE Mesh因其低功耗和高安全性成为物联网领域的热门通信选择,但其现有规范未能满足不同业务类型的服务质量需求。为解决这一问题,引入了QoS管理机制,通过为每个数据包分配优先级,实现网络内数据的有效调度和优化。利用BLE Mesh协议的低功耗节点机制,还改进设计了直接网络管理策略,以提高非主干供电节点的能量效率。通过实验验证了此方法的有效性,不同QoS等级下的包交付时间、包交付率和设备寿命等关键性能指标均显示出良好的区分性,高优先级相比低优先级的设备寿命缩短了9.25%,但传输可靠性能提升了25.6%,而传输实时性能提高了25.1%,证明了QoS管理方法的合理性;采用直接网络管理策略后,设备寿命从2.899天提高至10.662天,证明了直接网络管理策略在高网络拥塞时能有效降低功耗。综合来看,研究结果为BLE Mesh网络的能量管理与QoS优化提供了一种新思路,增强了其在智能电器系统中的应用潜力。 展开更多
关键词 BLE mesh 智能电器系统 服务质量方法 直接网络管理
在线阅读 下载PDF
面向港口受限空间作业的多参数无线Mesh自组网系统设计
4
作者 周剑峰 《中国水运》 2026年第1期45-48,共4页
在受限空间中进行作业时,由于空间进出口限制且空气流通能力较差,容易引发中毒、缺氧窒息和燃爆等安全事故。为了便于作业监护人员实时检查确认作业内容和作业环境安全,提升应急救援的效率效果,结合国家和行业对特殊作业的管理要求,需... 在受限空间中进行作业时,由于空间进出口限制且空气流通能力较差,容易引发中毒、缺氧窒息和燃爆等安全事故。为了便于作业监护人员实时检查确认作业内容和作业环境安全,提升应急救援的效率效果,结合国家和行业对特殊作业的管理要求,需要一种有效的无线通信自组网技术,建立稳定的网络连接,持续性监测受限空间内部气体成分,传输全过程作业影像。研究设计了一种多参数无线Mesh自组网系统,利用混合式结构Mesh组网技术,采用无线Mesh和无线4G/5G网络传输,配合防爆处理后的网络连接设备,实现受限空间作业环境的远程无线监控。网络各个节点之间以动态网状方式连接,终端节点彼此平等,网络健壮性优于传统无线网络。 展开更多
关键词 受限空间 无线通信 mesh组网
在线阅读 下载PDF
基于Mesh自组网的矿井应急救援机电装备通信系统设计与实现
5
作者 李存鹏 郭德富 +2 位作者 张琦 吴中岳 付宁 《通信电源技术》 2026年第5期19-21,共3页
矿井应急救援中机电装备繁多、巷道环境复杂,而传统通信系统存在覆盖有限、协同不畅等问题,因此需构建基于Mesh自组网的通信系统。以节点适配为基础、网络构建为支撑、协同调度为核心,形成递进式协同体系,完成节点适配、网络构建与调度... 矿井应急救援中机电装备繁多、巷道环境复杂,而传统通信系统存在覆盖有限、协同不畅等问题,因此需构建基于Mesh自组网的通信系统。以节点适配为基础、网络构建为支撑、协同调度为核心,形成递进式协同体系,完成节点适配、网络构建与调度策略设计。经系统集成与仿真与现场验证证实,设计的系统可适配极端环境,解决通信碎片化难题,为矿井应急救援提供可靠的通信保障。 展开更多
关键词 mesh自组网 应急救援 节点适配
在线阅读 下载PDF
任务驱动的立体无线Mesh网络多维资源智能协同算法研究
6
作者 顾浩 李侍阳 朱晓荣 《物联网学报》 2026年第1期202-215,共14页
为应对未来应急通信场景下无线Mesh网络中资源受限、网络拓扑和用户需求动态变化带来的多维资源分配问题,提出了一种面向6G网络的动态Mesh网络切片端到端服务稳定匹配算法。首先,根据不同业务的差异化服务需求,基于Gale-Shapley匹配思想... 为应对未来应急通信场景下无线Mesh网络中资源受限、网络拓扑和用户需求动态变化带来的多维资源分配问题,提出了一种面向6G网络的动态Mesh网络切片端到端服务稳定匹配算法。首先,根据不同业务的差异化服务需求,基于Gale-Shapley匹配思想,将多业务端到端服务问题表述为层次化二分图稳定匹配问题;然后,建立服务请求方和提供方的偏好列表,在接入侧和回程侧分别进行终端-切片-基站和业务流-服务路径的稳定匹配,完成区分任务类型的端到端服务。仿真结果表明,所提稳定匹配算法在降低网络成本、提高业务服务成功率以及满足高可靠、低时延、大带宽等差异化业务需求方面,都表现出良好的性能。 展开更多
关键词 立体无线mesh网络 任务驱动 端到端切片 稳定匹配算法
在线阅读 下载PDF
配电网无线通信链路中断下的多跳Mesh应急组网恢复策略
7
作者 冯谦 杨军 +2 位作者 王晓波 江慧 方乾 《通信电源技术》 2026年第1期156-158,共3页
针对配电网无线通信链路中断问题,探索了多跳Mesh在应急组网恢复中的应用策略,旨在提升配电网通信网络的可靠性和应急响应能力。分析自然因素、设备故障、电磁干扰等主要中断原因,通过深入剖析各类中断场景的影响机制,提出具有针对性的... 针对配电网无线通信链路中断问题,探索了多跳Mesh在应急组网恢复中的应用策略,旨在提升配电网通信网络的可靠性和应急响应能力。分析自然因素、设备故障、电磁干扰等主要中断原因,通过深入剖析各类中断场景的影响机制,提出具有针对性的多跳Mesh应急组网恢复策略。研究不仅分析了Mesh在不同场景下的适应性,还结合具体操作为实际部署提供了参考。通过合理配置冗余路径和智能化调整机制,多跳Mesh有望在复杂环境下快速重建通信链路,有效保障配电网的稳定运行。 展开更多
关键词 配电网通信 链路中断 多跳mesh 应急组网
在线阅读 下载PDF
面向智能巡检机器人的电网排管内无线Mesh通信网络构建
8
作者 刘畅 《通信电源技术》 2026年第1期168-170,共3页
为解决智能巡检机器人在电网排管内通信受限的问题,设计了面向复杂地下环境的无线Mesh网络通信架构。通过构建环状拓扑结构,集成抗干扰通信模组、多频段自适应射频单元及边缘计算能力模块,建立了覆盖排管全程的多跳通信网络。现场测试... 为解决智能巡检机器人在电网排管内通信受限的问题,设计了面向复杂地下环境的无线Mesh网络通信架构。通过构建环状拓扑结构,集成抗干扰通信模组、多频段自适应射频单元及边缘计算能力模块,建立了覆盖排管全程的多跳通信网络。现场测试验证表明,该网络显著提升了排管内的通信可靠性。 展开更多
关键词 智能巡检机器人 无线mesh网络 自适应路由协议
在线阅读 下载PDF
煤矿掘进工作面抗干扰Mesh自组网通信系统设计
9
作者 杨文光 李鑫 侯祥坤 《通信电源技术》 2026年第4期185-187,共3页
为解决煤矿掘进工作面通信信号衰减严重、电磁干扰及网络拓扑动态变化等问题,设计一套抗干扰Mesh自组网通信系统。该系统采用分层架构,包括感知传输层、骨干网络层和管理控制层,集成多跳中继传输机制、自适应跳频与信道编码技术、动态... 为解决煤矿掘进工作面通信信号衰减严重、电磁干扰及网络拓扑动态变化等问题,设计一套抗干扰Mesh自组网通信系统。该系统采用分层架构,包括感知传输层、骨干网络层和管理控制层,集成多跳中继传输机制、自适应跳频与信道编码技术、动态自组网路由协议。研究结果表明,该系统能够延长信号覆盖距离,降低误码率,并快速响应网络拓扑变化。 展开更多
关键词 煤矿掘进工作面 抗干扰 mesh自组网
在线阅读 下载PDF
Traffic-aware static channel assignment algorithm in wireless mesh networks 被引量:1
10
作者 陶军 柳津 +1 位作者 邵碧锐 刘智杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期370-374,共5页
A channel assignment algorithm with awareness of link traffic is proposed in multi-radio multi-channel wireless mesh networks. First, the physical interference model based on the signal-to-interference-plus-noise rati... A channel assignment algorithm with awareness of link traffic is proposed in multi-radio multi-channel wireless mesh networks. First, the physical interference model based on the signal-to-interference-plus-noise ratio and successful transmission condition is described. The model is more suitable for a wireless communication environment than other existing models. Secondly, a pure integer quadratic programming (PIQP) model is used to solve the channel assignment problem and improve the capacity of wireless mesh networks. Consequently, a traffic- aware static channel assignment algorithm(TASC) is designed. The algorithm adopts some network parameters, including the network connectivity, the limitation of the number of radios and the successful transmission conditions in wireless communications. The TASC algorithm can diminish network interference and increase the efficiency of channel assignment while keeping the connectivity of the network. Finally, the feasibility and effectivity of the channel assignment solution are illustrated by the simulation results. Compared witb similar algorithms, the proposed algorithm can increase the capacity of WMNs. 展开更多
关键词 multi-radio multi-channel wireless mesh network static channel assignment traffic-aware
在线阅读 下载PDF
Distribution algorithm of entangled particles for wireless quantum communication mesh networks
11
作者 王霄峻 施丽慧 +2 位作者 占海涛 项睿清 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2015年第4期450-456,共7页
With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes ... With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes selection in order to save cost and reduce complexity. A minimum spanning tree( MST)-based quantum distribution algorithm( QDMST) is presented to construct the mesh backbone network. First, the articulation points are found,and for each connected block uncovered by the articulation points, the general centers are solved. Then, both articulation points and general centers are classified as backbone nodes and an M ST is formed. The quantum path between every two neighbor nodes on the MST is calculated. The nodes on these paths are also classified as backbone nodes. Simulation results validate the advantages of QDMST in the average backbone nodes number and average quantum channel distance compared to the existing random selection algorithm under multiple network scenarios. 展开更多
关键词 wireless quantum communication networks entangled particles distribution wireless mesh networks minimum spanning tree
在线阅读 下载PDF
802.11 Mesh network中WBDMR分布式路由协议的研究
12
作者 刘伟 吴宇红 《电子科技》 2006年第3期39-42,47,共5页
提出了一种适用于中等规模的802.11Meshnetwork网络的无线分布式路由协议(WBDMR)。该协议借鉴了基于Ad-Hoc的ADOV协议并进行了改造,实现了不同BSS(基本服务集)间无线客户端通过无线中继相互通信。利用节点间交换链路损耗信息实现了动态... 提出了一种适用于中等规模的802.11Meshnetwork网络的无线分布式路由协议(WBDMR)。该协议借鉴了基于Ad-Hoc的ADOV协议并进行了改造,实现了不同BSS(基本服务集)间无线客户端通过无线中继相互通信。利用节点间交换链路损耗信息实现了动态负载平衡、有效地抑制了冗余路由信息的传播、消除了路由环路、建立了备份路由。仿真结果表明,WBDMR协议具有较好的路由特性和时延特性。 展开更多
关键词 网中网 分布式路由协议 有线接入点
在线阅读 下载PDF
Dynamic Event-Triggered Scheduling and Platooning Control Co-Design for Automated Vehicles Over Vehicular Ad-Hoc Networks 被引量:35
13
作者 Xiaohua Ge Shunyuan Xiao +2 位作者 Qing-Long Han Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第1期31-46,共16页
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr... This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency. 展开更多
关键词 Automated vehicles dynamic event-triggered communication information flow topology platooning control vehicular ad-hoc networks(VANETs)
在线阅读 下载PDF
Towards an Artificial Immune System for Detecting Anomalies in Wireless Mesh Networks 被引量:3
14
作者 易平 吴越 陈佳霖 《China Communications》 SCIE CSCD 2011年第3期107-117,共11页
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents m... This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently. 展开更多
关键词 immune system intrusion detection mobile agent wireless mesh network network security
在线阅读 下载PDF
Error resilient concurrent video streaming over wireless mesh networks 被引量:2
15
作者 CHUAH Chen-nee YOO Ben S.J. 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第5期684-695,共12页
In this paper, we propose a multi-source multi-path video streaming system for supporting high quality concurrent video-on-demand (VoD) services over wireless mesh networks (WMNs), and leverage forward error correctio... In this paper, we propose a multi-source multi-path video streaming system for supporting high quality concurrent video-on-demand (VoD) services over wireless mesh networks (WMNs), and leverage forward error correction to enhance the error resilience of the system. By taking wireless interference into consideration, we present a more realistic networking model to capture the characteristics of WMNs and then design a route selection scheme using a joint rate/interference-distortion optimiza- tion framework to help the system optimally select concurrent streaming paths. We mathematically formulate such a route selec- tion problem, and solve it heuristically using genetic algorithm. Simulation results demonstrate the effectiveness of our proposed scheme. 展开更多
关键词 Wireless mesh network CONCURRENT VIDEO streaming INTERFERENCE
在线阅读 下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
16
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
在线阅读 下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
17
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
在线阅读 下载PDF
Survivability modeling and analysis on 3D mobile ad-hoc networks 被引量:2
18
作者 彭三城 王国军 +1 位作者 胡忠望 陈建平 《Journal of Central South University》 SCIE EI CAS 2011年第4期1144-1152,共9页
Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and ... Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and air defense systems.The impact on network survivability due to node behaviors was presented,and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity.Node behaviors were modeled by using a semi-Markov process.The node minimum degree of 3D MANETs was discussed.An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors,based on the model of node isolation.The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description,and the effectiveness and rationality of the proposed approach are verified through numerical analysis.The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors. 展开更多
关键词 mobile ad-hoc networks (MANETs) SURVIVABILITY node behaviors semi-Markov process network connectivity
在线阅读 下载PDF
Gateways Placement in Backbone Wireless Mesh Networks 被引量:2
19
作者 Maolin TANG 《International Journal of Communications, Network and System Sciences》 2009年第1期44-50,共7页
This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns m... This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns mesh routers to identified gateways. The new algorithm can guarantee to find a feasible gateway placement satisfying Quality-of-Service (QoS) constraints, including delay constraint, relay load constraint and gateway capacity constraint. Experimental results show that its performance is as good as that of the best of existing algorithms for the gateway placement problem. But, the new algorithm can be used for BWMNs that do not form one connected component, and it is easy to implement and use. 展开更多
关键词 GATEWAY PLACEMENT BACKBONE WIRELESS mesh networks
在线阅读 下载PDF
Multi-path based secure communication in wireless mesh networks 被引量:1
20
作者 Ding Xuyang Fan Mingyu Lu Xiaojun Zhu Dayong Wang Jiahao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期818-824,共7页
Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarant... Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths. 展开更多
关键词 wireless mesh network secure communication key exchange risk avoidance
在线阅读 下载PDF
上一页 1 2 102 下一页 到第
使用帮助 返回顶部