期刊文献+

基于二进前向神经网络的Ad Hoc网络节点识别方法

A BFANN-based node recognition method in Ad Hoc wireless networks
下载PDF
导出
摘要 提出了一种基于二进前向神经网络的无线移动Ad Hoc网络节点识别方法。安全问题是无线移动Ad Hoc网络的一个关键性问题,路由协议的安全尤为重要,本文针对恶意节点的主动攻击提出了一种基于二进前向神经网络的无线移动Ad Hoc网络节点识别方法,该方法可以有效的避免恶意节点接入网络,从而提高了网络路由的安全性。 In this paper, we propose a node recognition method based on the Binary Feedforward Artificial Neural Networks (BFANN) in Ad Hoc Wireless Networks. The security is one of the key issues in wireless mobile ad hoc networking and a secure routing protocol is very important in some applications. It is a good way to protect routing against attacks from malicious ad hoc nodes by recognizing nodes periodically. Through node recognizing, the malicious nodes are prevented from accessing the networking in that the security of routing and network is improved.
作者 陈晋伦 周正
机构地区 中国传媒大学
出处 《电路与系统学报》 CSCD 北大核心 2007年第6期104-107,共4页 Journal of Circuits and Systems
关键词 AD HOC网络 路由安全 二进前向神经网络 节点识别 Ad Hoc Network securing routing BFANN node recognition
  • 相关文献

参考文献7

  • 1Magnus Frodigh, Per Johansson and Peter Larsson. Wireless ad hoc networking--The art of networking without a network [J]. Ericsson Review, 2000, (4): 248-263.
  • 2S Corson, J Macker. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations [Z]. RFC2501, January 1999.
  • 3Zhou L, Zygmunt J H. Securing Ad Hoc networks [J]. IEEE Network, 1999, 13(6): 24-30.
  • 4Wengjing Lou, Yuguang Fang. A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions. Ad Hoc Wireless Networking [M]. Kluwer Academic Publisher, 2003.319-364.
  • 5Funahashi K. On the Approximate Realization of Continuous Mappings by Neural Networks [J]. Neural Networks, 1989, (2): 182-192.
  • 6Jagesh V Shah, Chi-Sang Poon, Linear Independence of Internal Representations in Multilayer Perceptrons [J]. IEEE Trans. On Neural Networks, 1999, 10(1): 10-18.
  • 7Eldredge J G, B L Hutchings. Density enhancement of a neural network using FPGAs and run-time reconfiguration [A]. in Proceedings of IEEE Workshop on Field-Programmable Custom Computing Machines [C], 1994. 180-188.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部