期刊文献+
共找到449篇文章
< 1 2 23 >
每页显示 20 50 100
Traffic-Aware Channelization Medium Access Control for Wireless Ad Hoc Networks 被引量:2
1
作者 史春光 赵海涛 +2 位作者 张少杰 马东堂 魏急波 《China Communications》 SCIE CSCD 2013年第4期88-100,共13页
Existing multi-channel Medium Access Control (MAC) protocols have been demonstrated to significantly increase wireless network performance compared to single channel MAC protocols. Traditionally, the channelization st... Existing multi-channel Medium Access Control (MAC) protocols have been demonstrated to significantly increase wireless network performance compared to single channel MAC protocols. Traditionally, the channelization structure in IEEE 802.11 based wireless networks is pre-configured, and the entire available spectrum is divided into subchannels and equal channel widths. In contrast, this paper presents a Traffic-Aware Channelization MAC (TAC-MAC) protocol for wireless ad hoc networks, where each node is equipped with a single half duplex transceiver. TAC-MAC works in a distributed, fine-grai-ned manner, which dynamically divides variable-width subchannels and allocates subchannel width based on the Orthogonal Frequency Division Multiplexing (OFDM) technique according to the traffic demands of nodes. Simulations show that the TAC-MAC can significantly improve network throughput and reduce packet delay compared with both fixed-width multi-channel MAC and single channel 802.11 protocols, which illustrates a new paradigm for high-efficient multi-channel MAC design in wireless ad hoc networks. 展开更多
关键词 wireless ad hoc networks multi-channel MAC TAC IEEE 802.11
在线阅读 下载PDF
Delay-Based Cross-Layer QoS Scheme for Video Streaming in Wireless Ad Hoc Networks 被引量:2
2
作者 Shu Fan Honglin Zhao 《China Communications》 SCIE CSCD 2018年第9期215-234,共20页
With correlating with human perception, quality of experience(Qo E) is also an important measurement in evaluation of video quality in addition to quality of service(Qo S). A cross-layer scheme based on Lyapunov optim... With correlating with human perception, quality of experience(Qo E) is also an important measurement in evaluation of video quality in addition to quality of service(Qo S). A cross-layer scheme based on Lyapunov optimization framework for H.264/AVC video streaming over wireless Ad hoc networks is proposed, with increasing both Qo E and Qo S performances. Different from existing works, this scheme routes and schedules video packets according to the statuses of the frame buffers at the destination nodes to reduce buffer underflows and to increase video playout continuity. The waiting time of head-ofline packets of data queues are considered in routing and scheduling to reduce the average end-to-end delay of video sessions. Different types of packets are allocated with different priorities according to their generated rates under H.264/AVC. To reduce the computational complexity, a distributed media access control policy and a power control algorithm cooperating with the media access policy are proposed. Simulation results show that, compared with existing schemes, this scheme can improve both the Qo S and Qo E performances. The average peak signal-to-noise ratio(PSNR) of the received video streams is also increased. 展开更多
关键词 cross-layer control Lyapunov optimization wireless ad hoc networks video streaming
在线阅读 下载PDF
Linear Network Coding Based Fast Data Synchronization for Wireless Ad Hoc Networks with Controlled Topology
3
作者 Die Hu Xuejun Zhu +1 位作者 Min Gong Shaoshi Yang 《China Communications》 SCIE CSCD 2022年第5期46-53,共8页
Fast data synchronization in wireless ad hoc networks is a challenging and critical problem.It is fundamental for efficient information fusion,control and decision in distributed systems.Previously,distributed data sy... Fast data synchronization in wireless ad hoc networks is a challenging and critical problem.It is fundamental for efficient information fusion,control and decision in distributed systems.Previously,distributed data synchronization was mainly studied in the latency-tolerant distributed databases,or assuming the general model of wireless ad hoc networks.In this paper,we propose a pair of linear network coding(NC)and all-to-all broadcast based fast data synchronization algorithms for wireless ad hoc networks whose topology is under operator’s control.We consider both data block selection and transmitting node selection for exploiting the benefits of NC.Instead of using the store-and-forward protocol as in the conventional uncoded approach,a compute-and-forward protocol is used in our scheme,which improves the transmission efficiency.The performance of the proposed algorithms is studied under different values of network size,network connection degree,and per-hop packet error rate.Simulation results demonstrate that our algorithms significantly reduce the times slots used for data synchronization compared with the baseline that does not use NC. 展开更多
关键词 all-to-all broadcast data synchronization distributed system network coding wireless ad hoc network UAV
在线阅读 下载PDF
Security of Ad Hoc Network
4
作者 Zhou Yajian Yang Yixian(Beijing University of Posts and Telecommunications,Beijing 100876,China) 《ZTE Communications》 2007年第4期24-26,共3页
An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),h... An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management. 展开更多
关键词 hoc WORK NODE security of ad hoc network OSPF
在线阅读 下载PDF
Security Model Research Based on Trusted Computing in Ad Hoc Network 被引量:2
5
作者 林筑英 刘晓杰 +2 位作者 卢林 师蕾 谢刚 《China Communications》 SCIE CSCD 2011年第4期1-10,共10页
With the rapid development of wireless networks,the Ad Hoc networks are widely used in many fields,but the current network security solutions for the Ad Hoc network are not competitive enough.So the critical technolog... With the rapid development of wireless networks,the Ad Hoc networks are widely used in many fields,but the current network security solutions for the Ad Hoc network are not competitive enough.So the critical technology of Ad Hoc network applications shall be how to implement the security scheme.Here the discussions are focused on the specific solution against the security threats which the Ad Hoc networks will face,the methodology of a management model which uses trusted computing technology to solve Ad Hoc network security problems,and the analysis and verification for the security of this model. 展开更多
关键词 ad hoc network trusted computing network security
在线阅读 下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
6
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
在线阅读 下载PDF
Towards an Artificial Immune System for Detecting Anomalies in Wireless Mesh Networks 被引量:3
7
作者 易平 吴越 陈佳霖 《China Communications》 SCIE CSCD 2011年第3期107-117,共11页
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents m... This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently. 展开更多
关键词 immune system intrusion detection mobile agent wireless mesh network network security
在线阅读 下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
8
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks security intrusion detection finite state machine
在线阅读 下载PDF
Integrating Mobile Ad Hoc Network to the Internet
9
作者 王茂宁 《Journal of Electronic Science and Technology of China》 CAS 2005年第4期304-309,共6页
A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, emplo... A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, employ the optimize d link state routing (OLSR) protocol for routing within the MANET. Mobility management across WLANs and MANETs is achieved through the hierarchical mobile IPv6 (HMIPv6) protocol. The performance is evaluated on a HMIPv6 based test-bed composed of WLANs and MANETs. The efficiency gain obtained from using HMIPv6 in such a hybrid network is investigated. The investigation result shows that the use of HMIPv6 can achieve up to 27% gain on reducing the handoff latency when a mobile roams within a domain. Concerning the reduction of the signaling load on the lnternet, the use of HMIPv6 can achieve at least a 54% gain and converges to 69%. 展开更多
关键词 mobile ad hoc network (MANET) optimized link state routing (OLSR) wireless networks mobile IPv6 hierarchical mobile 1Pv6
在线阅读 下载PDF
Cooperative Layer-2 Based Routing Approach for Hybrid Wireless Mesh Networks
10
作者 Alicia Trivino Alfonso Ariza +1 位作者 Eduardo Casilari Juan C.Cano 《China Communications》 SCIE CSCD 2013年第8期88-99,共12页
In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing ... In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay. 展开更多
关键词 hybrid mesh networks mobile ad hoc network hybrid routing protocols Layer-2 routing Layer-2 forwarding
在线阅读 下载PDF
Secure and efficient multi-message and multi-receiver ID-based signcryption for rekeying in ad hoc networks 被引量:5
11
作者 邱婧 BAI Jun +1 位作者 SONG Xin-chuan HOU Su-mei 《Journal of Chongqing University》 CAS 2013年第2期91-96,共6页
In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc... In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given. 展开更多
关键词 SIGNCRYPTION multi-receiver multi-message bilinear pairings provable security ad hoc networks introduction
在线阅读 下载PDF
Incentive Schemes of Nodes for Ad Hoc and Multi-hop Cellular Networks
12
作者 Wang Kun Wu Meng 《China Communications》 SCIE CSCD 2007年第4期79-88,共10页
Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des... Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes. 展开更多
关键词 node cooperation INCENTIVE scheme in-depth SUMMARY MULTI-HOP cellular networks ad hoc security
在线阅读 下载PDF
A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks
13
作者 B.Moussakhani S.M.Safavi H.Ebrahimzad 《China Communications》 SCIE CSCD 2007年第1期40-47,共8页
Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malic... Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malicious behaviors can disturb routing process.We present the design and performance evaluation of a new secure on-demand routing protocol for ad hoc networks, called CASR.CASR is robust against attackers from outside of the network and even it prevents compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes.Because of using symmetric cryptography in its structure,CASR is robust against large number of types of Denial-of -Service attacks.However,due to the applying of the random key predistributions method to the routing process our proposed scheme reaches a trade-off between the degree of security and complexity. 展开更多
关键词 ad hoc networks routing security CRYPTOGRAPHY random key predistributions
在线阅读 下载PDF
A Secure Multi-Routing Platform for Ad Hoc Network
14
作者 卢社阶 陈晶 熊再红 《Journal of Southwest Jiaotong University(English Edition)》 2008年第3期205-213,共9页
In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribu... In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose, a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications. 展开更多
关键词 ad hoc network Multi-routing platform Routing protocols security mechanism Routing performance Simulation
在线阅读 下载PDF
A Review on Wireless Mesh Networks
15
作者 TAN Ling ZHANG Shun-yi 《南京邮电大学学报(自然科学版)》 2010年第1期48-58,共11页
Wireless mesh networks (WMNs) are new kind of networking technology which facilitate the extension of wireless local area networks into wide areas and have emerged as a key technology for next-generation wireless netw... Wireless mesh networks (WMNs) are new kind of networking technology which facilitate the extension of wireless local area networks into wide areas and have emerged as a key technology for next-generation wireless networking.Due to the advantages of WMNs over other wireless networks,they are now a promising approach for future network access.Typical applications range from home broadband Internet access and community networking to wireless metropolitan area networks.Meanwhile,the considerable efforts in academic range from network architecture,network capacity,layered communication protocols,security,cross-layer design,etc.Still many technical challenges exist in designing affordable,reliable,and sustainable WMNs infrastructures.In order to provide a better understanding of these challenges,this paper presents a detailed investigation of current technologies for WMNs,and it will help to guide and refocus future works in this area. 展开更多
关键词 计算机网络 WMNS 网络安全 网络协议
在线阅读 下载PDF
Security in Wireless Mesh Neworks: Challenges and Solutions 被引量:3
16
作者 Yi Ping Xing Hongkai +1 位作者 Wu Yue Li Jianhua 《China Communications》 SCIE CSCD 2009年第3期134-143,共10页
Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changi... Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changing topology, cooperative routing algorithms.The article surveys the state of the art in security for wireless mesh networks.Firstly,we analyze various possible threats to security in wireless mesh networks.Secondly,we introduce some representative solutions to these threats,including solutions to the problems of key management,secure network routing,and intrusion detection.We also provide a comparison and discussion of their respective merits and drawbacks,and propose some improvements for these drawbacks.Finally,we also discuss the remaining challenges in the area. 展开更多
关键词 network security wireless mesh networks key management secure network routing intrusion detection
在线阅读 下载PDF
基于TD-OFDM的MESH自组网络广播信道设计方法
17
作者 黄坚 黄波 《移动通信》 2025年第2期115-119,共5页
针对Wi-Fi MESH各节点发送数据时会发生丢包的现象,导致通信传输可靠性不高的问题,提出了一种基于TDOFDM的MESH自组网络广播信道设计方法。首先,进行帧结构设计,设计广播子帧和数据子帧的结构。接着,进行时间同步,同步完成后数据在物理... 针对Wi-Fi MESH各节点发送数据时会发生丢包的现象,导致通信传输可靠性不高的问题,提出了一种基于TDOFDM的MESH自组网络广播信道设计方法。首先,进行帧结构设计,设计广播子帧和数据子帧的结构。接着,进行时间同步,同步完成后数据在物理层进行一系列流程,完成整个广播信道的设计。经过仿真,实验结果表明将物理广播信道加入MESH组网后对比基于Wi-Fi的MESH组网,自组网碰撞和重传大大减少,正确接收码字的概率提升了18.6%,提高了通信传输的可靠性。 展开更多
关键词 mesh自组网 物理广播信道 帧结构 物理层
在线阅读 下载PDF
Authentication Methods for 802.11s Mesh Networks
18
作者 SangJae Moon 《China Communications》 SCIE CSCD 2007年第1期56-65,共10页
With the rapid development of the WLAN,the 802. 11 s mesh network is emerging.Reliability,adaptability and scalability are the most important attributes of a mesh network.However,the security in an 802.11s mesh networ... With the rapid development of the WLAN,the 802. 11 s mesh network is emerging.Reliability,adaptability and scalability are the most important attributes of a mesh network.However,the security in an 802.11s mesh network is not well defined or specified,and there is no standard method to authenticate a mesh point that is creating a mesh link.In this paper,we propose solutions for the authentication of mesh points.For the Basic Infrastructure Security Mode,we combine the 802.1X/EAP and neighbor graph to realize the fast mutual authentication between a new mesh point and every its mesh link.We prove that our scheme maintains the security of the standardized EAP authentication algorithm.At the same time,the simulation result shows that the authentication latency of our scheme is much lower than that of the scheme in[2].In the Basic Decentralized Security Mode(BDSM),802.11s mesh networks are very similar to ad hoc networks,but they are different in several aspects.We first analyze the differences between them.Based on this analysis, we investigate the main authentication methods used in ad hoc networks and select the pairwise key pre-distribution model and identity-based model for the WLAN mesh network. 展开更多
关键词 AUTHENTICATION 802.11s mesh networkS ad hoc networkS
在线阅读 下载PDF
移动ad hoc网络安全综述 被引量:63
19
作者 易平 蒋嶷川 +1 位作者 张世永 钟亦平 《电子学报》 EI CAS CSCD 北大核心 2005年第5期893-899,共7页
 移动adhoc网络是由移动节点自组织形成的网络,由于其动态拓扑、无线通信的特点,容易遭受各种安全威胁.该文介绍了移动adhoc网络安全研究的最新研究进展.首先从传输信道、移动节点、动态拓扑、安全机制、路由协议几方面,分析了移动adho...  移动adhoc网络是由移动节点自组织形成的网络,由于其动态拓扑、无线通信的特点,容易遭受各种安全威胁.该文介绍了移动adhoc网络安全研究的最新研究进展.首先从传输信道、移动节点、动态拓扑、安全机制、路由协议几方面,分析了移动adhoc网络的安全弱点,然后将移动adhoc网络安全方面的研究分为三个方向:密钥分配与管理、入侵检测、增强合作.对每个方向内一些典型安全方案也进行了分类论述,同时分析了各种方案的优点和缺点,并进行了综合比较.文中阐明了目前协议存在的一些问题并提出了相应的改进方法,最后指出了下一步研究方向. 展开更多
关键词 计算机网络 信息安全 移动 ad hoc 网络 密钥管理 入侵检测 增强合作
在线阅读 下载PDF
无线Ad hoc网络及其研究难点 被引量:34
20
作者 肖永康 山秀明 任勇 《电信科学》 北大核心 2002年第6期12-14,共3页
无线Adhoc网络作为没有基础设施的网络 ,在军事和民用方面具有广阔的应用前景 ,是目前网络研究中的热点问题。本文对无线Adhoc网络进行了详细的论述 。
关键词 无线ad hoc网络 通信网 传感器网络 路由协议 MAC协议
在线阅读 下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部