Multiple channels are available for use in IEEE 802.11.Multiple channels can increase the available network's capacity,and how to efficiently assign these available channels to optimize the network performance is ...Multiple channels are available for use in IEEE 802.11.Multiple channels can increase the available network's capacity,and how to efficiently assign these available channels to optimize the network performance is a challenge.We survey current techniques to solve the problem,and category the techniques single-radio,multi-radio,cross-layer multi-channel assignment.This paper also discusses some interesting issues at last.展开更多
We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are a...We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work.展开更多
The exponential growth of the Internet coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 10...The exponential growth of the Internet coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 100 million Internet users. To converge the control method has emerged as a promising technique to solve the Web QoS problem. In this paper, a model of adaptive session is presented and a session flow self regulating algorism based on Kalman Filter are proposed towards Weh Server. And a Web QoS self-regularing scheme is advanced. To attain the goal of on-line system identification, the optimized estimation of QoS parameters is fulfilled by utilizing Kalman Filter in full domain, The simulation results shows thal the proposed scheme can guarantee the QoS with both robusmess and stability .展开更多
In this paper, a clustering algorithm is proposed based on the high correlation among the overlapped field of views for the wireless multimedia sensor networks. Firstly, by calculating the area of the overlapped field...In this paper, a clustering algorithm is proposed based on the high correlation among the overlapped field of views for the wireless multimedia sensor networks. Firstly, by calculating the area of the overlapped field of views (FoVs) based on the gird method, node correlations have been obtained. Then, the algorithm utilizes the node correlations to partition the network region in which there are high correlation multimedia sensor nodes. Meanwhile, in order to minimize the energy consumption for transmitting images, the strategy of the cluster heads election is proposed based on the cost estimation, which consists of signal strength and residual energy as well as the node correlation. Simulation results show that the proposed algorithm can balance the energy consumption and extend the network lifetime effectively.展开更多
Data generated in wireless multimedia sensor networks (WMSNs) may have different importance and it has been claimed that the network exert more efforts in servicing applications carrying more important information. ...Data generated in wireless multimedia sensor networks (WMSNs) may have different importance and it has been claimed that the network exert more efforts in servicing applications carrying more important information. Nevertheless, importance of packets cannot generally be accurately represented by a static priority value. This article presents a dynamic priority based congestion control (DPCC) approach that makes two major innovations in WMSNs. First, DPCC employs dynamic priority to represent packet importance. Second, it prioritizes the local traffic of motes near the base station when WMSN is highly congested. Simulation results confirm the superior performance of the proposed approach with respect to energy efficiency, loss probability and latency as well.展开更多
Routing is one of the most important supporting parts in wireless sensor networks (WSNs) application that directly affects the application efficiency. Routing time and energy consumption are two major factors used t...Routing is one of the most important supporting parts in wireless sensor networks (WSNs) application that directly affects the application efficiency. Routing time and energy consumption are two major factors used to evaluate WSNs routing. This article proposes a minimum routing time and energy consumption (MiniTE) routing, which can ensure feasibility of the routing protocol both in routing time and energy consumption. Based on the MiniTE, WSNs can be partitioned into different regions according to the received signal strength indication (RSSI). Messages are sent by nodes in the region to their parent node and again up to their parent node until finally to the sink node. Theoretic evaluation and simulation results are given to verify the features of the protocol.展开更多
This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses ecl...This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses eclipse modeling framework plug-ins and graphical editing framework plug-ins to parse the models into platform specific models, which are responsible for implementation of grid services' clients and servers and their automatic deployment. This paper emphasizes on design method, which uses model drive architecture, and design process, which uses model-view-control.展开更多
Multipath routing mechanism is vital for reliable packet delivery, load balance, and flexibility in the open network because its topology is dynamic and the nodes have limited capability. This article proposes a new m...Multipath routing mechanism is vital for reliable packet delivery, load balance, and flexibility in the open network because its topology is dynamic and the nodes have limited capability. This article proposes a new multipath switch approach based on traffic prediction according to some characteristics of open networks. We use wavelet neural network (WNN) to predict the node traffic because the method has not only good approximation property of wavelet, but also self-learning adaptive quality of neural network. When the traffic prediction indicates that the primary path is a failure, the alternate path will be occupied promptly according to the switch strategy, which can save time for the switch in advance The simulation results show that the presented traffic prediction model has better prediction accuracy; and the approach based on the above model can balance network load, prolong network lifetime, and decrease the overall energy consumption of the network.展开更多
In recent years, with the rapid development of data intensive applications, data replication has become an enabling technology for the data grid to improve data availability, and reduce file transfer time and bandwidt...In recent years, with the rapid development of data intensive applications, data replication has become an enabling technology for the data grid to improve data availability, and reduce file transfer time and bandwidth consumption. The placement of replicas has been proven to be the most difficult problem that must be solved to realize the process of data replication. This paper addresses the quality of service (QoS) aware replica placement problem in data grid, and proposes a dynamic programming based replica placement algorithm that not only has a QoS requirement guarantee, but also can minimize the overall replication cost, including storage cost and communication cost. By simulation, experiments show that the replica placement algorithm outperforms an existing popular replica placement technique in data grid.展开更多
With the increasing systems, the problems of fair uses of peer-to-peer (P2P) information and resources sharing become serious. P2P systems are self-organizing, distributed systems with no centralized authority, such...With the increasing systems, the problems of fair uses of peer-to-peer (P2P) information and resources sharing become serious. P2P systems are self-organizing, distributed systems with no centralized authority, such as Free-riding and Tragedy of Commons. Because of the voluntary participation and lack of motivation, the information and resources available in P2P networks are extremely variable and unpredictable. This article studied the problems existing in P2P networks and propose a different method to stimulate the peers in P2P networks to share information and resources, using agents so as to improve the performance of P2P networks And through simulation experiments and analyzing the results, it can be concluded that this mechanism can effectively solve the problems of fair sharing in P2P systems.展开更多
As a novel application technology,wireless video sensor networks become the current research focus,especially on target tracking and surveillance scenario.Based on multiple agents' technique,this article introduces a...As a novel application technology,wireless video sensor networks become the current research focus,especially on target tracking and surveillance scenario.Based on multiple agents' technique,this article introduces a series of intelligent algorithms such as simulated annealing algorithm(SA),genetic algorithm(GA),and ant colony optimization algorithm(ACO) or their mixed algorithms,to resolve the optimization of tasks schedule and data transmission.This article analyzes the performance of abovementioned algorithms and verifies their feasibility associated with agents.The simulations demonstrates that the mixed algorithms based on SA and GA obtain the optimal solution to tasks schedule,and those combined with SA-ACO show advantages on multimedia sensor networks routing optimization.展开更多
The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a nove...The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protoeol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.展开更多
This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimi...This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimization in order to accurately detect and efficiently filter the traffic of distributed denial-of-service attack. This paper presents the design of our software, and describes all important algorithms of detection and filtering. Experimental results showed that our method has only a low delay to detect abnormal traffic of distributed denial-of-service attacks, and with a high percentage o f filtering.展开更多
To balancing energy consumption in wireless sensor networks, we proposed a fixed time interval node broadcasting scheme under variational acceleration straight-line movement model. Simulation results show that the app...To balancing energy consumption in wireless sensor networks, we proposed a fixed time interval node broadcasting scheme under variational acceleration straight-line movement model. Simulation results show that the approach proposed in this paper has a superior performance on energy consumption balance compared to uniform broadcasting methods.展开更多
Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article...Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently.展开更多
基金spported by the National Natural Science Foundation of China ( No. 60973139, 60773041 )Postdoctoral Foundation (No. 0801019C,20090451240, 20090451241)+2 种基金Science&Technology Innovation Fund for Higher Education Institutions of Jiangsu Province( No.CX09B_153Z,CX08B-086Z )Six Projects Sponsoring Talent Summits of Jiangsu Province(No. 2008118)the project of NJUPT(No.NY207135)
文摘Multiple channels are available for use in IEEE 802.11.Multiple channels can increase the available network's capacity,and how to efficiently assign these available channels to optimize the network performance is a challenge.We survey current techniques to solve the problem,and category the techniques single-radio,multi-radio,cross-layer multi-channel assignment.This paper also discusses some interesting issues at last.
基金supported by the National Natural Science Foundation of China(No. 60573141, 60773041)National High Technology Research and Devel-opment Program of China(863 Program) (No. 2006AA01Z201, 2006AA01Z219, 2007AA01Z404, 2007AA01 Z478)the Provincial Jiangsu High Technology Research Program(No. BG2006001)
文摘We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work.
基金Supported by the National Natural Science Funda-tion of China (60272024) ,the National Natural Science Foundation ofHenan Province (0411014100)
文摘The exponential growth of the Internet coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 100 million Internet users. To converge the control method has emerged as a promising technique to solve the Web QoS problem. In this paper, a model of adaptive session is presented and a session flow self regulating algorism based on Kalman Filter are proposed towards Weh Server. And a Web QoS self-regularing scheme is advanced. To attain the goal of on-line system identification, the optimized estimation of QoS parameters is fulfilled by utilizing Kalman Filter in full domain, The simulation results shows thal the proposed scheme can guarantee the QoS with both robusmess and stability .
基金supported by the National Natural Science Foundation of China (60973139, 61170065, 61171053, 61003039, 61003236, 61103195)the Natural Science Foundation of Jiangsu Province (BK2011755)+10 种基金Scientific & Technological Support Project (Industry) of Jiangsu Province (BE2010197,BE2010198, BE2011844, BE2011189)Natural Science Key Fund for Colleges and Universities in Jiangsu Province (11KJA520001)the Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(10KJB520013, 11KJB520014,11KJB520016)Scientific Research & Industry Promotion Project for Higher Education Institutions(JH2010-14, JHB2011-9)Postdoctoral Foundation (20100480048)Science & Technology Innovation Fund for higher education institutions of Jiangsu Province (CX10B-196Z,CX10B-200Z,CXZZ11-0405, CXZZ11-0406, CXZZ11_0409)Doctoral Fund of Ministry of Education of China(20103223120007, 20113223110002)key Laboratory Foundation of Information Technology processing of Jiangsu Province (KJS1022)Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD),(K93-9-2010-13)the Project of Priority Academic Program Development of Jiangsu Higher Education Institutions (yx002001)Research Fund of Jiangsu Suqian College (2012ky17)
文摘In this paper, a clustering algorithm is proposed based on the high correlation among the overlapped field of views for the wireless multimedia sensor networks. Firstly, by calculating the area of the overlapped field of views (FoVs) based on the gird method, node correlations have been obtained. Then, the algorithm utilizes the node correlations to partition the network region in which there are high correlation multimedia sensor nodes. Meanwhile, in order to minimize the energy consumption for transmitting images, the strategy of the cluster heads election is proposed based on the cost estimation, which consists of signal strength and residual energy as well as the node correlation. Simulation results show that the proposed algorithm can balance the energy consumption and extend the network lifetime effectively.
基金supported by the National Natural Science Foundation of China (60973139, 60903181, 60773041 )Special Fund for Software Technology of Jiangsu Province, the Special Foundation for Development of Modern Service Industry of Jiangsu Province, Postdoctoral Foundation (0801019C, 20090451240,20090451241)+2 种基金Science&Technology Innovation Fund for higher education institutions of Jiangsu Province (CX09B_153Z, CX10B- 260Z, CX10B-261Z, CX10B-262Z, CX10B-263Z, CX10B-264Z)the six kinds of Top Talent of Jiangsu Province (2008118)the key Laboratory Foundation of Information Technology processing of Jiangsu Province (2010)
文摘Data generated in wireless multimedia sensor networks (WMSNs) may have different importance and it has been claimed that the network exert more efforts in servicing applications carrying more important information. Nevertheless, importance of packets cannot generally be accurately represented by a static priority value. This article presents a dynamic priority based congestion control (DPCC) approach that makes two major innovations in WMSNs. First, DPCC employs dynamic priority to represent packet importance. Second, it prioritizes the local traffic of motes near the base station when WMSN is highly congested. Simulation results confirm the superior performance of the proposed approach with respect to energy efficiency, loss probability and latency as well.
基金supported by the National Natural Science Foundation of China (60573141 and 60773041)the Hi-Tech Research Program of China (2006AA01Z201, 2006AA01Z219, 2006AA01Z439)+4 种基金the High Technology Research Program of Jiangsu Province (BG2006001)the Special Fund for Software Technology of Jiangsu Province, the High Technology Research Program of Nanjing (2007 RZ 106)the Foundation of National Laboratory for Modern Communications (9140C1105040805)the Key Laboratory of Information Technology Processing of Jiangsu Province (KJS06006)the Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions (07KJB520083).
文摘Routing is one of the most important supporting parts in wireless sensor networks (WSNs) application that directly affects the application efficiency. Routing time and energy consumption are two major factors used to evaluate WSNs routing. This article proposes a minimum routing time and energy consumption (MiniTE) routing, which can ensure feasibility of the routing protocol both in routing time and energy consumption. Based on the MiniTE, WSNs can be partitioned into different regions according to the received signal strength indication (RSSI). Messages are sent by nodes in the region to their parent node and again up to their parent node until finally to the sink node. Theoretic evaluation and simulation results are given to verify the features of the protocol.
文摘This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses eclipse modeling framework plug-ins and graphical editing framework plug-ins to parse the models into platform specific models, which are responsible for implementation of grid services' clients and servers and their automatic deployment. This paper emphasizes on design method, which uses model drive architecture, and design process, which uses model-view-control.
基金the National Natural Science Foundation of China (60573141 and 60773041)Hi-Tech Research and Development Program of China (2006AA01Z201, 2006AA01Z439, 2007AA01Z478)+5 种基金the Natural Science Foundation of Jiangsu Province (BK2005146)High Technology Research Programme of Jiangsu Provinc (BG2006001)High Technology Research Programme of Nanjing (2007RZ127)Foundation of National Laboratory for Modern Communications (9140C1101010603)Key Laboratory of Information Technology processing of Jiangsu Province (kjs06006)The Young Teachers Program of Anhui Province (2006jql044)
文摘Multipath routing mechanism is vital for reliable packet delivery, load balance, and flexibility in the open network because its topology is dynamic and the nodes have limited capability. This article proposes a new multipath switch approach based on traffic prediction according to some characteristics of open networks. We use wavelet neural network (WNN) to predict the node traffic because the method has not only good approximation property of wavelet, but also self-learning adaptive quality of neural network. When the traffic prediction indicates that the primary path is a failure, the alternate path will be occupied promptly according to the switch strategy, which can save time for the switch in advance The simulation results show that the presented traffic prediction model has better prediction accuracy; and the approach based on the above model can balance network load, prolong network lifetime, and decrease the overall energy consumption of the network.
基金sponsored by the National Natural Science Foundation of China (61202354)the Hi-Tech Research and Development Program of China (2007AA01Z404)Scientific & Technological Support Project (Industry) of Jiangsu Province (BE2011189)
文摘In recent years, with the rapid development of data intensive applications, data replication has become an enabling technology for the data grid to improve data availability, and reduce file transfer time and bandwidth consumption. The placement of replicas has been proven to be the most difficult problem that must be solved to realize the process of data replication. This paper addresses the quality of service (QoS) aware replica placement problem in data grid, and proposes a dynamic programming based replica placement algorithm that not only has a QoS requirement guarantee, but also can minimize the overall replication cost, including storage cost and communication cost. By simulation, experiments show that the replica placement algorithm outperforms an existing popular replica placement technique in data grid.
基金the National Natural Science Foundation of China (60573141, 70271050) National 863 High Technology Research Program of China (2005AA775050)+3 种基金 the Natural Science Foundation of Jiangsu Province (BK2005146) High Technology Research Programme of Jiangsu Provinc (BG2005038, BG2006001) High Technology Research Programme of Nanjing (2006RZ105) Key Laboratory of Information Technology Processing of Jiangsu Province (kjs05001, kjs06).
文摘With the increasing systems, the problems of fair uses of peer-to-peer (P2P) information and resources sharing become serious. P2P systems are self-organizing, distributed systems with no centralized authority, such as Free-riding and Tragedy of Commons. Because of the voluntary participation and lack of motivation, the information and resources available in P2P networks are extremely variable and unpredictable. This article studied the problems existing in P2P networks and propose a different method to stimulate the peers in P2P networks to share information and resources, using agents so as to improve the performance of P2P networks And through simulation experiments and analyzing the results, it can be concluded that this mechanism can effectively solve the problems of fair sharing in P2P systems.
基金sponsored by the National Natural Science Foundation of China (60973139, 60773041)the Natural Science Foundation of Jiangsu Province (BK2008451)+4 种基金the Hi-Tech Research and Development Program of China (2007AA01Z404, 2007AA01Z478)Special Fund for Software Technology of Jiangsu ProvinceFoundation of National Laboratory for Modern Communications (9140C1105040805)Postdoctoral Foundation (0801019C, 20090451240)the six kinds of Top Talent of Jiangsu Province (2008118)
文摘As a novel application technology,wireless video sensor networks become the current research focus,especially on target tracking and surveillance scenario.Based on multiple agents' technique,this article introduces a series of intelligent algorithms such as simulated annealing algorithm(SA),genetic algorithm(GA),and ant colony optimization algorithm(ACO) or their mixed algorithms,to resolve the optimization of tasks schedule and data transmission.This article analyzes the performance of abovementioned algorithms and verifies their feasibility associated with agents.The simulations demonstrates that the mixed algorithms based on SA and GA obtain the optimal solution to tasks schedule,and those combined with SA-ACO show advantages on multimedia sensor networks routing optimization.
基金supported by the National Natural Science Foundation of China(6057314,60773041)
文摘The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protoeol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.
文摘This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimization in order to accurately detect and efficiently filter the traffic of distributed denial-of-service attack. This paper presents the design of our software, and describes all important algorithms of detection and filtering. Experimental results showed that our method has only a low delay to detect abnormal traffic of distributed denial-of-service attacks, and with a high percentage o f filtering.
基金supported by the National Natural Science Foundation of China (61170065, 61171053, 61202355)the Doctoral Foundation of Ministry of Education (20123223120006)+3 种基金the Natural Science Foundation of Jiangsu Province (BK2012436)the Postdoctoral Science Foundation of JiangSu Province (1202034C)the Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions (11KJB520014)the Scientific Research Foundation of Nanjing University of Posts and Telecommunications (NY211018)
文摘To balancing energy consumption in wireless sensor networks, we proposed a fixed time interval node broadcasting scheme under variational acceleration straight-line movement model. Simulation results show that the approach proposed in this paper has a superior performance on energy consumption balance compared to uniform broadcasting methods.
基金supported by the National Natural Science Foundation of China(61202004)
文摘Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently.