期刊文献+

计算机网络内部丢包节点检测修正研究 被引量:1

Research on Detection of Packet Loss Nodes in Computer Network
下载PDF
导出
摘要 检测计算机网络内部的丢包节点需要获取邻居节点状态,只有在此基础上才能完成相应的判断,即需获取网络可信节点作为参考。文章运用相似度计算方法构建一种网络内部丢包节点检测方法,基于网络内部节点感测向量完成对此类节点的判断和检测;运用分布式方法获取网络内部可信节点,并据此判断网络内部邻居节点状态,然后根据节点间的相似值计算结果进行检测和修正。 Detecting packet loss nodes in a computer network needs to complete the corresponding judgment process on the basis of obtaining the status of neighbor nodes.Therefore,it is necessary to obtain network trusted nodes as a reference.This article mainly uses similarity calculation methods to construct a network internal packet loss node detection method.The method is based on the sensing vector of the internal nodes in the network to judge and detect such nodes.The distributed method is used to obtain the trusted nodes in the network for reference,and the status of the neighboring nodes in the network is judged accordingly.The similarity value calculation results between nodes are detected and corrected.
作者 周慧芬 ZHOU Huifen(Foundation Department, Xi’an Medical College, Xi’an 710309, China)
出处 《微型电脑应用》 2022年第6期72-74,共3页 Microcomputer Applications
基金 西安医学高等专科学校2022年度校级科研项目(22J01)。
关键词 计算机网络 内部丢包节点检测 实现路径 computer network internal packet loss node detection implementation path
  • 相关文献

参考文献7

二级参考文献170

  • 1崔慧,潘巨龙,闫丹丹.无线传感器网络中基于信誉-投票机制的恶意节点检测[J].中国计量学院学报,2013,24(4):353-359. 被引量:7
  • 2时锐,杨孝宗.自组网Random Waypoint移动模型节点空间概率分布的研究[J].计算机研究与发展,2005,42(12):2056-2062. 被引量:18
  • 3覃伯平,周贤伟,杨军,宋存义.无线传感器网络的安全路由技术研究[J].传感技术学报,2006,19(1):16-19. 被引量:18
  • 4Tsetsos V, Alyfantis G, Hasiotis T, Sekkas O, Hadjiefthymiades S. To- wards commercial wireless sensor networks: business and technology architecture. Ad Hoc & Sensor Wireless Networks, 2006, 2(1): 59-80.
  • 5Padmavathi G, Shanmugapriya D. A survey of attacks, security mecha- nisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS), 2009, 4(1): 1-9.
  • 6Jain A, Kant K, Tripathy M. Security solutions for wireless sensor net- works. In: Proceedings of the 2nd IEEE International Conference on Advanced Computing & Communication Technologies (ACCT). 2012, 430-433.
  • 7Zhou Z, Yow K C. Geographic ad hoc routing security: attacks and Ad Hoc & Sensor Wireless Networks, 2005, 1(3) 235-253.
  • 8Becher A, Benenson Z, Dornseif M. Tampering with motes: real- world physical attacks on wireless sensor networks. Technical Report. Springer Berlin Heidelberg, 2006.
  • 9He D, Gao Y, Chan S, Chela C, Bu J. An enhanced Two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 2010, 10(4): 361-371.
  • 10Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M. Reputation and trust-based systems for ad hoc and sensor networks. In: Boukerche A, ed. Algorithms and Protocols fol' Wireless, Mobile Ad Hoc Networks. Ottawa: Wiley, 2008, 375--403.

共引文献52

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部