期刊文献+
共找到3,165篇文章
< 1 2 159 >
每页显示 20 50 100
The intelligent leap of wireless short-range connection
1
作者 Wan Lei 《China Standardization》 2026年第1期47-47,共1页
Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSL... Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSLA has established a technical standards system for wireless short-range communication covering full-stack standards such as the end-to-end protocol system. 展开更多
关键词 wireless short range communication end end protocol system technical standards system full stack standards international sparklink alliance isla now wireless short range connection standards system ISLA
原文传递
Hybrid IRS and Relay Network for Enhanced Wireless Communication:Analysis and Optimization
2
作者 Zhu Xusheng Wu Qingqing +4 位作者 Chen Wen Zhou Yufeng Hou Yanzhao Liu Ruiqi Jian Mengnan 《China Communications》 2025年第11期17-27,共11页
This paper proposes a hybrid wireless communication framework that integrates an active intelligent reflecting surface(IRS)with a decode-andforward(DF)relay to enhance spectral efficiency in extended-range scenarios.B... This paper proposes a hybrid wireless communication framework that integrates an active intelligent reflecting surface(IRS)with a decode-andforward(DF)relay to enhance spectral efficiency in extended-range scenarios.By combining the amplification capability of the active IRS and the signal regeneration function of the DF relay,the proposed system effectively mitigates path loss and fading.We derive closed-form upper bounds on the achievable rate and develop an optimal power allocation strategy under a total power constraint.Numerical results demonstrate that the hybrid scheme significantly outperforms conventional passive IRS-assisted or active IRS-only configurations,particularly under conditions of limited reflecting elements or moderate signal-to-noise ratios. 展开更多
关键词 achievable rate active IRS DF relay power allocation optimization
在线阅读 下载PDF
UAV-enabled aerial active RIS with learning deployment for secured wireless communications
3
作者 Xiao TANG Zhihao XIONG +2 位作者 Limeng DONG Ruonan ZHANG Qinghe DU 《Chinese Journal of Aeronautics》 2025年第10期107-119,共13页
Reconfigurable Intelligent Surfaces(RISs)enable programmable wireless environments and thus have great potential for enhancing physical layer security.However,the security gain of conventional passive RISs is often li... Reconfigurable Intelligent Surfaces(RISs)enable programmable wireless environments and thus have great potential for enhancing physical layer security.However,the security gain of conventional passive RISs is often limited by the“multiplicative fading”effect through reflection links,which becomes severe in the case of double reflections and significantly degrades the security performance.In this paper,we consider a wireless system that consists of a fixed passive RIS and an Unmanned Aerial Vehicle(UAV)-mounted active RIS,where the UAV-enabled aerial amplification and reflection are exploited to compensate for the multiplicative fading effect.We formulate the problem to maximize the secrecy rate by jointly considering the optimal deployment of the UAV-based active RIS and the reflection coefficients at both the passive and active RISs.To enable efficient algorithm design,we decompose the problem into two layers:the outer layer optimizes the UAV deployment through deep reinforcement learning,while the inner layer solves the beamforming and reflection design using a block coordinate descent framework.Simulation results demonstrate the convergence of the proposed learning procedure,and indicate that the active RIS with learned deployment can effectively enhance the reflection and significantly improve the secrecy rate. 展开更多
关键词 Physical layer security Reconfigurable intelligent surface Unmanned aerial vehicle Block coordinate descent Deep reinforcement learning
原文传递
Cooperative Relaying and Jamming Design for Secure LPWAN Wireless Communication
4
作者 Chen Dianxia Ma Xiaoshan +2 位作者 Yang Lin Yu Kan Feng Zhiyong 《China Communications》 2025年第4期100-116,共17页
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th... Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance. 展开更多
关键词 joint relay and jammer selection physical layer security secrecy outage probability
在线阅读 下载PDF
Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
5
作者 Weidong Fang Wuxiong Zhang +3 位作者 QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《Computers, Materials & Continua》 SCIE EI 2019年第8期583-599,共17页
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protoco... As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN. 展开更多
关键词 Industrial wireless sensor network wireless sensor network cyber security secure data aggregation protocol
在线阅读 下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
6
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY PROTECTION SLICE TECHNOLOGY PRIVACY HOMOMORPHISM collection tree protocol
在线阅读 下载PDF
Channel Estimation and Throughput Evaluation for 5G Wireless Communication Systems in Various Scenarios on High Speed Railways 被引量:7
7
作者 yanrong zhao xiyu wang +3 位作者 gongpu wang ruisi he yulong zou zhuyan zhao 《China Communications》 SCIE CSCD 2018年第4期86-97,共12页
The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies ... The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies about 5G wireless systems on high speed railways (HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the down- link throughput of 5G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line (TDL) models through ray-tracing sim- ulations, which can be considered as a good match to practical situations. The channel estimators including least square (LS), linear minimum mean square error (LMMSE), and our proposed historical information based ba- sis expansion model (HiBEM). We analyze the performance of the HiBEM estimator in terms of mean square error (MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our HiBEM estimator outperforms other estimators and that the sys-tem throughput can reach the highest point in the viaduct scenario. 展开更多
关键词 5G channel estimation HSR tapped delay line throughput pertbrmanceanalysis wireless communication.
在线阅读 下载PDF
Online Computation Offloading and Trajectory Scheduling for UAV-Enabled Wireless Powered Mobile Edge Computing 被引量:6
8
作者 Han Hu Xiang Zhou +1 位作者 Qun Wang Rose Qingyang Hu 《China Communications》 SCIE CSCD 2022年第4期257-273,共17页
The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications a... The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications and services, anytime and anywhere. Wireless power transfer(WPT) is another promising technology to prolong the operation time of low-power wireless devices in the era of Internet of Things(IoT). However, the integration of WPT and UAV-enabled MEC systems is far from being well studied, especially in dynamic environments. In order to tackle this issue, this paper aims to investigate the stochastic computation offloading and trajectory scheduling for the UAV-enabled wireless powered MEC system. A UAV offers both RF wireless power transmission and computation services for IoT devices. Considering the stochastic task arrivals and random channel conditions, a long-term average energyefficiency(EE) minimization problem is formulated.Due to non-convexity and the time domain coupling of the variables in the formulated problem, a lowcomplexity online computation offloading and trajectory scheduling algorithm(OCOTSA) is proposed by exploiting Lyapunov optimization. Simulation results verify that there exists a balance between EE and the service delay, and demonstrate that the system EE performance obtained by the proposed scheme outperforms other benchmark schemes. 展开更多
关键词 energy efficiency mobile edge computing UAV-enabled wireless power transfer trajectorys cheduling
在线阅读 下载PDF
Traffic Characteristics Based Dynamic Radio Resource Management in Heterogeneous Wireless Networks 被引量:4
9
作者 WEN Juan SHENG Min +2 位作者 ZHANG Yan WANG Xijun LI Yuzhou 《China Communications》 SCIE CSCD 2014年第1期1-11,共11页
The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy R... The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization. 展开更多
关键词 heterogeneous wireless networks radio resource management multidimensional Markov analysis tidal traffic performance analysis
在线阅读 下载PDF
The Way to Apply Machine Learning to IoT Driven Wireless Network from Channel Perspective 被引量:6
10
作者 Wei Li Jianhua Zhang +3 位作者 Xiaochuan Ma Yuxiang Zhang Hua Huang Yongmei Cheng 《China Communications》 SCIE CSCD 2019年第1期148-164,共17页
Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning... Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly. 展开更多
关键词 5G Internet of THINGS MACHINE learning WIRELESS CHANNEL
在线阅读 下载PDF
Compressive Sensing Based Wireless Localization in Indoor Scenarios 被引量:3
11
作者 Cui Qimei Deng Jingang Zhang Xuefei 《China Communications》 SCIE CSCD 2012年第4期1-12,共12页
The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online me... The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online measurements while achieving a high level of localization accuracy,which makes the CS-based solution very attractive for indoor positioning.However,CS theory offers exact deterministic recovery of the sparse or compressible signals under two basic restriction conditions of sparsity and incoherence.In order to achieve a good recovery performance of sparse signals,CS-based solution needs to construct an efficient CS model.The model must satisfy the practical application requirements as well as following theoretical restrictions.In this paper,we propose two novel CS-based location solutions based on two different points of view:the CS-based algorithm with raising-dimension pre-processing and the CS-based algorithm with Minor Component Analysis (MCA).Analytical studies and simulations indicate that the proposed novel schemes achieve much higher localization accuracy. 展开更多
关键词 wireless localization fingerprinting compressive sensing minor component analysis received signal strength
在线阅读 下载PDF
RESEARCH ON ADAPTIVE COMPRESSION CODING FOR NETWORK CODING IN WIRELESS SENSOR NETWORK 被引量:4
12
作者 Liu Ying Yang Zhen +1 位作者 Mei Zhonghui Kong Yuanyuan 《Journal of Electronics(China)》 2012年第5期415-421,共7页
Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences ... Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle. 展开更多
关键词 Network coding Wireless Sensor Network (WSN) Sequence similarity Sequence entropy
在线阅读 下载PDF
Directional neighbor discovery in mmWave wireless networks 被引量:3
13
作者 Yu Wang Ticao Zhang +1 位作者 Shiwen Mao Theodore(Ted)S.Rappaport 《Digital Communications and Networks》 SCIE CSCD 2021年第1期1-15,共15页
The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The chal... The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The challenge is how to let the transmitter and the receiver beams meet in space under deafness caused by directional transmission and reception,where no control channel,prior information,and coordination are available.In this paper,we present a Hunting based Directional Neighbor Discovery(HDND)scheme for ad hoc mmWave networks,where a node follows a unique sequence to determine its transmission or reception mode,and continuously r0-tates its directional beam to scan the neighborhood for other mmWave nodes.Through a rigorous analysis,we derive the conditions for ensured neighbor discovery,as well as a bound for the worst-case discovery time and the impact of sidelobes.We validate the analysis with extensive simulations and demonstrate the superior perfor-mance of the proposed scheme over several baseline schemes. 展开更多
关键词 Fifth generation(5G)wireless BEAMFORMING Spatial fltering Directional antenna Directional neighbor discovery Initial access Milimeter wave(mmWave)networks Spatial rendezvous
在线阅读 下载PDF
POWER CONTROL BASED COOPERATIVE OPPORTUNISTIC ROUTING IN WIRELESS SENSOR NETWORKS 被引量:4
14
作者 Hu Haifeng Zhu Qi 《Journal of Electronics(China)》 2009年第1期52-63,共12页
This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity... This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity while ensuring better data forwarding efficiency in an energy efficient manner. Based on the realistic radio model, we combine the region-based routing, rendezvous scheme, sleep discipline and cooperative communication together to model data forwarding by cross layer design in WSN. At the same time, a lightweight transmission power control algorithm called PC-AIMD (Power Control Additive Increase Multiplicative Decrease) is introduced to utilize the co- operation of relay nodes to improve the forwarding efficiency performance and increase the robustness of the routing protocol. In the simulation, the performance of PC-COPR is investigated in terms of the adaptation of variations in network connectivity and satisfying the QoS requirements of application. 展开更多
关键词 COOPERATIVE Opportunistic routing Power control Wireless Sensor Networks (WSN)
在线阅读 下载PDF
A Cooperative MIMO Transmission Scheme for Cluster-based Wireless Sensor Networks 被引量:3
15
作者 Ding Jie Liu Danpu Wu Huari 《China Communications》 SCIE CSCD 2010年第5期14-22,共9页
Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a ... Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a cluster-based virtual VBLAST transmission scheme is proposed to achieve energy savings for energy-constrained wireless sensor networks. In the proposed scheme, instead of using cluster member as cooperative nodes, multiple cluster heads cooperate to form virtual antenna array so that V-BLAST based virtual MIMO transmission can be implemented. Based on the communication energy consumption model, a way to optimize the parameters for the scheme is given. In addition, detailed simulation is performed to evaluate the performance of the proposed scheme for both densely and sparsely deployed sensor networks. Theoretical analysis and simulation results verify the energy efficiency of the proposed scheme. 展开更多
关键词 energy efficiency virtual MIMO VBLAST CLUSTER wireless sensor networks
在线阅读 下载PDF
A SDN-Based Energy Saving Strategy in Wireless Access Networks 被引量:2
16
作者 PENG Hongyu WANG Weidong +2 位作者 WANG Chaowei CHEN Gang ZHANG Yinghai 《China Communications》 SCIE CSCD 2015年第8期132-145,共14页
This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption a... This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption and average video's quality. On the Software Defined Network(SDN) access network architecture, a type of sleeping control and active BSs' optimal transmitting time strategy is considered, the BS sleeps when there is no active users, and wakes up after a period of vacation time. In this paper, we study the active users grouping strategy, In order to spare more BSs into sleeping mode. Then this paper proposes an active BS transmitting time optimal strategy according to the users' Qo S. In the proposed strategy, the active BSs' transmitting time is minimized in order to save energy. This paper employs the mixed integer-programming model to present this optimization problem. Then we utilized a novel algorithm to save the energy in access networks and also meet the Qo S requirements. Both the analytical and simulation results show that the algorithm can effectively save energy in the access network BSs. 展开更多
关键词 SDN wireless access network energy efficiency MOBILITY
在线阅读 下载PDF
State estimation with quantized innovations in wireless sensor networks: Gaussian mixture estimator and posterior Cramér–Rao lower bound 被引量:2
17
作者 Zhang Zhi Li Jianxun +2 位作者 Liu Liu Liu Zhaolei Han Shan 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第6期1735-1746,共12页
Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investiga... Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investigated in this paper. In the first place, the assumptions of prior and posterior probability density function (PDF) with quantized innovations in the previous papers are analyzed. After that, an innovative Gaussian mixture estimator is proposed. On this basis, this paper presents a Gaussian mixture state estimation algorithm based on quantized innovations for WSNs. In order to evaluate and compare the performance of this kind of state estimation algo- rithms for WSNs, the posterior Cram6r-Rao lower bound (CRLB) with quantized innovations is put forward. Performance analysis and simulations show that the proposed Gaussian mixture state estimation algorithm is efficient than the others under the same number of quantization levels and the performance of these algorithms can be benchmarked by the theoretical lower bound. 展开更多
关键词 Posterior Cramer-Rao lower bounds Quantiation State estimation Target tracking Wireless sensor network
原文传递
Efficient Scheduling with Random Network Coding in Multi-Relay Wireless Network 被引量:1
18
作者 丁良辉 毕琰 +2 位作者 孙大佳 杨峰 钱良 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第1期59-64,共6页
In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(... In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost. 展开更多
关键词 random network coding SCHEDULING automatic repeat request (ARQ) multi-relay wireless networks
原文传递
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR NETWORKS 被引量:1
19
作者 Lin Qiaomin Wang Ruchuan +1 位作者 Ye Ning Wang Zhongqin 《Journal of Electronics(China)》 2013年第1期9-16,共8页
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously. 展开更多
关键词 Discrete Wavelet Transform (DWT) Distributed steganography Energy efficiency Perfect hash Wireless Multimedia Sensor Networks (WMSNs)
在线阅读 下载PDF
Research on Time Synchronization Method Under Arbitrary Network Delay in Wireless Sensor Networks 被引量:4
20
作者 Bing Hu Feng Xiang +3 位作者 Fan Wu Jian Liu Zhe Sun Zhixin Sun 《Computers, Materials & Continua》 SCIE EI 2019年第9期1323-1344,共22页
To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock o... To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock offset in wireless sensor networks.VB-CPF is an improvement of the Gaussian mixture kalman particle filter(GMKPF)algorithm.In GMKPF,Expectation-Maximization(EM)algorithm needs to determine the number of mixture components in advance,and it is easy to generate overfitting and underfitting.Variational Bayesian EM(VB-EM)algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations.Moreover,to solve the problem of data packet loss caused by unreliable links,we propose a robust time synchronization(RTS)method in this paper.RTS establishes an autoregressive model for clock skew,and calculates the clock parameters based on the established autoregressive model in case of packet loss.The final simulation results illustrate that VB-CPF yields much more accurate results relative to GMKPF when the network delays are modeled in terms of an asymmetric Gaussian distribution.Moreover,RTS shows good robustness to the continuous and random dropout of time messages. 展开更多
关键词 Time synchronization particle filter expectation maximization wireless sensor networks(WSNs)
在线阅读 下载PDF
上一页 1 2 159 下一页 到第
使用帮助 返回顶部