Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by pr...Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by proactive routing protocol. Pre-proposals like Tree Based Routing (TBR) protocol and Root Driven Routing (RDR) protocol are so centralized that they make the gateway becorre a bottleneck which severely restricts the network performance. We proposed an Optimized Tree-based Routing (OTR) protocol that logically separated the proactive tree into pieces. Route is partly computed by the branches instead of root. We also discussed the operation of multipie Intemet gateways which is a main issue in WMN. The new proposal lightens the load in root, reduces the overhead and improves the throughput. Numerical analysis and simulation results confirm that the perforrmnce of WMN is improved and OTR is more suitable for large scale WMN.展开更多
The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-...The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-out-of-2 rational secret sharing based on Bayesian game and considering different classes of protocol parties, we propose a 2-out-of-2 secret sharing scheme to solve cooperative problem of a rational secret sharing scheme being played only once. Moreover, we prove that the strategy is a perfect Bayesian equilibrium, adopted only by the parties in their decision-making according to their belief system (denoted by the probability distribution) and Bayes rule, without requiring simultaneous channels.展开更多
Integration of the IoT(Internet of Things)with Cloud Computing,termed as the CoT(Cloud of Things)can help achieve the goals of the envisioned IoT and future Internet.In a typical CoT infrastructure,the data collected ...Integration of the IoT(Internet of Things)with Cloud Computing,termed as the CoT(Cloud of Things)can help achieve the goals of the envisioned IoT and future Internet.In a typical CoT infrastructure,the data collected from wireless sensor networks and IoTs is transmitted through a SG(Smart Gateway)to the cloud.The bandwidth between an IoT access point and SG becomes a bottleneck for information transmission between the IoT and the cloud.We propose a novel game theory model to describe the CoT attacker,who expects to use minimum set and energy consumption of IoT attack devices to occupy as many bandwidth resources as possible in a given time period;and the defender,who expects to minimize false alarms.By analyzing this model,we have found that the game theory model is a non-cooperative and repeated incomplete information game,and Nash equilibrium is existent,perfected by the subgame.The best strategy for each stage of the attack is to adjust the attack link number dynamically based on the comparison results of value E and turning point E_(0)for each time period.At the same time,the defender adjusts the threshold valueβdynamically,based on the comparison results of the Load value and expected value ofαfor each time period.The simulation result shows that our strategy can significantly mitigate the harm of a distributed denial of service attack.展开更多
A virtual machine placement optimization model based on optimized ant colony algorithm is proposed.The model is able to determine the physical machines suitable for hosting migrated virtual machines.Thus,it solves the...A virtual machine placement optimization model based on optimized ant colony algorithm is proposed.The model is able to determine the physical machines suitable for hosting migrated virtual machines.Thus,it solves the problem of redundant power consumption resulting from idle resource waste of physical machines.First,based on the utilization parameters of the virtual machine,idle resources and energy consumption models are proposed.The models are dedicated to quantifying the features of virtual resource utilization and energy consumption of physical machines.Next,a multi-objective optimization strategy is derived for virtual machine placement in cloud environments.Finally,an optimal virtual machines placement scheme is determined based on feature metrics,multi-objective optimization,and the ant colony algorithm.Experimental results indicate that compared with the traditional genetic algorithms-based MGGA model,the convergence rate is increased by 16%,and the optimized highest average energy consumption is reduced by 18%.The model exhibits advantages in terms of algorithm efficiency and efficacy.展开更多
基金Acknowledgements This paper was supported by the Major National Science and Technology program under Grant No. 2011ZX03005-002 the National Natural Science Foundation of China under Grant No. 61100233 the Fundamental Universities under Grant No Research Funds for the Central K50510030010.
文摘Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by proactive routing protocol. Pre-proposals like Tree Based Routing (TBR) protocol and Root Driven Routing (RDR) protocol are so centralized that they make the gateway becorre a bottleneck which severely restricts the network performance. We proposed an Optimized Tree-based Routing (OTR) protocol that logically separated the proactive tree into pieces. Route is partly computed by the branches instead of root. We also discussed the operation of multipie Intemet gateways which is a main issue in WMN. The new proposal lightens the load in root, reduces the overhead and improves the throughput. Numerical analysis and simulation results confirm that the perforrmnce of WMN is improved and OTR is more suitable for large scale WMN.
基金Supported by the Major National Science and Technology program (2011ZX03005-002)the National Natural Science Foundation of China (60872041, 61072066, 60963023, 60970143)the Fundamental Research Funds for the Central Universities (JY10000903001, JY10000901034)
文摘The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-out-of-2 rational secret sharing based on Bayesian game and considering different classes of protocol parties, we propose a 2-out-of-2 secret sharing scheme to solve cooperative problem of a rational secret sharing scheme being played only once. Moreover, we prove that the strategy is a perfect Bayesian equilibrium, adopted only by the parties in their decision-making according to their belief system (denoted by the probability distribution) and Bayes rule, without requiring simultaneous channels.
基金This paper is supported by the Natural Science Founds of China(Nos.61602376,U1334211,U1534208)Shaanxi Science and Technology Innovation Project(No.2015KTZDGY01-04)+2 种基金Science Technology Project of Shaanxi Education Department(No.16JK1573)Ph.D.Research Startup Funds of Xi'an University of Technology(No.112-256081504)College Research Funds of Xi’an University of Technology(No.112-451016007).
文摘Integration of the IoT(Internet of Things)with Cloud Computing,termed as the CoT(Cloud of Things)can help achieve the goals of the envisioned IoT and future Internet.In a typical CoT infrastructure,the data collected from wireless sensor networks and IoTs is transmitted through a SG(Smart Gateway)to the cloud.The bandwidth between an IoT access point and SG becomes a bottleneck for information transmission between the IoT and the cloud.We propose a novel game theory model to describe the CoT attacker,who expects to use minimum set and energy consumption of IoT attack devices to occupy as many bandwidth resources as possible in a given time period;and the defender,who expects to minimize false alarms.By analyzing this model,we have found that the game theory model is a non-cooperative and repeated incomplete information game,and Nash equilibrium is existent,perfected by the subgame.The best strategy for each stage of the attack is to adjust the attack link number dynamically based on the comparison results of value E and turning point E_(0)for each time period.At the same time,the defender adjusts the threshold valueβdynamically,based on the comparison results of the Load value and expected value ofαfor each time period.The simulation result shows that our strategy can significantly mitigate the harm of a distributed denial of service attack.
基金This paper is supported by the National Natural Science Founds of China(No.61602376)the Natural Science Research Project of Shaanxi Education Department(Nos.16JK1573,112-431016021)+1 种基金the Ph.D.Research Startup Funds of Xi’an University of Technology(Nos.112-256081504,112-451115002,112-451116015)Research on the training mechanism of computer application ability of non computer majors in Petroleum Universities(No.SGH140627).
文摘A virtual machine placement optimization model based on optimized ant colony algorithm is proposed.The model is able to determine the physical machines suitable for hosting migrated virtual machines.Thus,it solves the problem of redundant power consumption resulting from idle resource waste of physical machines.First,based on the utilization parameters of the virtual machine,idle resources and energy consumption models are proposed.The models are dedicated to quantifying the features of virtual resource utilization and energy consumption of physical machines.Next,a multi-objective optimization strategy is derived for virtual machine placement in cloud environments.Finally,an optimal virtual machines placement scheme is determined based on feature metrics,multi-objective optimization,and the ant colony algorithm.Experimental results indicate that compared with the traditional genetic algorithms-based MGGA model,the convergence rate is increased by 16%,and the optimized highest average energy consumption is reduced by 18%.The model exhibits advantages in terms of algorithm efficiency and efficacy.