期刊文献+

移动自组网中抗毁性定量评估模型 被引量:2

Quantitative Evaluation Model for Survivability in MANETs
原文传递
导出
摘要 根据移动自组网对抗毁性的要求,提出了一个更为全面的抗毁性定量评估模型。该模型考虑多种故障类型和移动终端的连接状态,并利用连续时间马尔可夫链来精确地刻画移动自组网的抗毁性。在MAT-LAB环境中对稳态的可用性、连通概率、失效频率和平均失效节点数进行模拟仿真。 Survivability refers to the ability for a network system to provide essential services to end users in the presence of failures and/or attacks, and recover full services in a timely manner. According to the requirement of the survivability of MANETs, a more comprehensive model for quantitative evaluation of survivability is proposed. The proposed model considers various types of faults and connection states of mobile hosts, and uses the continuous time Markov chain (CTMC) to describe the survivability of MANETs in a precise manner. Finally, the availability of steady state, connectivity probability, failure frequency and average number of faulty nodes are simulated in MATLAB.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2008年第10期1095-1098,共4页 Geomatics and Information Science of Wuhan University
基金 国家863计划资助项目(2006AA01Z202) 国家973计划资助项目(2003CB317003) 香港城市大学应用研究与发展基金资助项目(9668009)
关键词 移动自组网 定量评估 连续时间的马尔可夫链 抗毁性 可用性 mobile Ad-Hoc networks quantitative evaluation continuous time Markov chain survivability availability
作者简介 彭三城,博士生,主要研究方向:计算机网络、抗毁性、可信计算。Email:psc346@gmail.com.
  • 相关文献

参考文献10

  • 1Cao Jianlong, Zhang Lifan, Wang Guojun, et al. SSR: Segment-by-Segment Routing in Large-Scale MANETs[C]. The IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2006), Vancouver, Canada, 2006
  • 2Wang G, Zhang L, Cao J. Logical Location-Based Routing with Hole-Shadowing in Large-Scale MANETs [C]. The 2006 IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, 2006
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4Ellison R, Linger R. Survivable Network System Analysis: a Case Study [J]. Software, 1999, 16 (4) : 70-77
  • 5Jha S, Wing M. Survivability Analysis of Networked Systems [C]. ICSE 2001, Toronto, 2001
  • 6Krings A W, Azadmanesh A. A Graph Based Model for Survivability Applications [J]. European Journal of Operational Research, 2005, 164 (3) : 680-689
  • 7Chen Dongyan, Garg S, Trivedi K S. Network Survivability Performance Evaluation: A Quantitative Approach with Applications in Wireless Ad-Hoc Networks[C]. The 5th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, New York, 2002
  • 8Koroma J, Li W. A Generalized Model for Network Survivability[C]. The 2003 Conference on Diversity in Computing (TAPIA' 03), Atlanta, Georgia, USA, 2003
  • 9Louca S, Pitsillides A, Samaras G. On Network Survivability Algorithms Based on Trellis Graph Transformations[C]. The Fourth IEEE Symposium on Computers and Communications (ISCC '99), Sharm El Sheik, Red Sea, Egypt, 1999
  • 10Knight J, Sullivan K. On the Definition of Survivability[R]. Department of Computer Science, Technical Report CS-00-33, Virginia: University of Virginia, 2000

二级参考文献17

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16

共引文献252

同被引文献13

  • 1潘丽君,范锐,王精业.基于作战仿真的军用通信网络战时抗毁性研究[J].计算机工程,2006,32(22):111-113. 被引量:7
  • 2刘啸林.网络抗毁性研究介绍[J].计算机应用与软件,2007,24(6):135-136. 被引量:9
  • 3Wang C Y,Logothetis D,Trivedi K S,et al.Transient behavior of ATM networks under overloads[C]//Proceedings of the IEEE INFOCOM' 96.1996:978-985.
  • 4Chen Dongyan,Garg S,Trivedi K S.Network Survivability Performance Evaluation:A Quantitative Approach with Applications in Wireless Ad Hoc Networks[C]//The 5th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems.2002:61-68.
  • 5Knight J C,Sullivan K J.On the Definition of Survivability[R].Technical Report CS-TR-33-00,University of Virginia,Department of Computer Science,2000.
  • 6Technical report on enhanced network survivability performance[R].T1A1.2 Working Group on Network Survivability Performance,2001.
  • 7Logothesis D,K S Trivedi.A Puliato.Markov regenerative models[C]//Proc.Computer Performance and Dependability Syrup.1995:134-143.
  • 8Albert R,Jeong H,Barabasi A L.Internet:Diameter of the World-Wide Web[J].Nature,1999,401(6749):130-131.
  • 9Marina M K,Das S R.On Demand Multi-path Distance Vector Routing in Ad Hoc Networks[C] //Proc.of IEEE International Conference on Network Protocols.Riverside,California,USA:IEEE Press,2001.
  • 10J(o)rg O,Kutscher D,Dwertmann C.Integrating DTN and MANET Routing[C] //Proc.of CHANTS'06.New York,USA:ACM Press,2006:221-228.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部