期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Heuristic Spectrum Assignment Algorithm in Distributed Cognitive Networks
1
作者 Li Yu Cong liu +1 位作者 zuhao liu Wenyu Hu 《Wireless Sensor Network》 2010年第6期411-418,共8页
Cognitive radio is an exciting emerging technology that has the potential of dealing with the urgent requirement and scarcity of the radio spectrum. Although having multiple radio interfaces and available spectrum ban... Cognitive radio is an exciting emerging technology that has the potential of dealing with the urgent requirement and scarcity of the radio spectrum. Although having multiple radio interfaces and available spectrum bands can generally increase the effective throughput, a problem arises as to what the best strategy to dynamically assign available bands to secondary users for maximizing throughput by minimizing the interference, and what the best scheme to allocate the spectrum holes to unlicensed users to maximize the fairness. This paper presents a distributed and heuristic spectrum assignment algorithm for multi-radio wireless cognitive networks in a cognitive network environment. The proposed algorithm (Fairness Bargaining with Maximum throughput, FBMT) considers the problems including system throughput and the fairness. Extensive simulation studies in 802.11 based multi-radio cognitive networks have been performed. The results indicate that the proposed algorithm can facilitate a large increase in network throughput and acquire a good fairness performance in comparison with a common spectrum assignment mechanism that is used as a benchmark in the literature. 展开更多
关键词 COGNITIVE Network DISTRIBUTED Spectrum ASSIGNMENT THROUGHPUT FAIRNESS FBMT
下载PDF
Trust Evaluation Model Based on Behavior Space Classification for Ad Hoc Networks 被引量:1
2
作者 Li Yu zuhao liu +1 位作者 Yuan Gao Dudu Samba 《Tsinghua Science and Technology》 EI CAS 2012年第2期179-185,共7页
Trust management frameworks are used to evaluate and manage trust relationships between network nodes and enhance network security. However, trust management frameworks themselves are vulnerable to attacks. Attacks ag... Trust management frameworks are used to evaluate and manage trust relationships between network nodes and enhance network security. However, trust management frameworks themselves are vulnerable to attacks. Attacks against trust management frameworks are described in this paper with a trust management framework to resist them. The trustworthiness between nodes is evaluated to classify node behavior using a three-dimensional classifier based on a fuzzy integral. Different behaviors are mapped to different behavioral spaces to detect malicious nodes and identify their behavior types. The security of ad hoc networks is then improved by various measures to handle different types of malicious behavior. Simula- tions of the model on the System In The Loop (SITL) platform show that this trust management framework can separate normal nodes and malicious nodes and can distinguish different types of malicious nodes. 展开更多
关键词 ad hoc networks trust routing behavior space fuzzy integral System In The Loop (SITL)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部