期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于改进6LoWPAN的移动物联网性能研究 被引量:3
1
作者 唐智灵 杨雪洲 李思敏 《计算机应用研究》 CSCD 北大核心 2010年第11期4233-4236,共4页
主要研究如何解决在无线移动物联网中使用IPv6所引起的传输效率以及移动切换中数据连续传输问题。为传输效率问题,提出了IPv6报头的复合压缩方法,使用了地址分配器、比较编码、Lempel-Ziv-Welch编码器等算法对报头作压缩处理。为实现移... 主要研究如何解决在无线移动物联网中使用IPv6所引起的传输效率以及移动切换中数据连续传输问题。为传输效率问题,提出了IPv6报头的复合压缩方法,使用了地址分配器、比较编码、Lempel-Ziv-Welch编码器等算法对报头作压缩处理。为实现移动切换时的数据连续传输,提出了改进的移动切换协议E-FHMIPv6方法。仿真结果证明,该算法和方法提高了传输效率,在移动切换时降低了丢包率。因此,提出的解决方案对移动互联网的性能有明显的提高。 展开更多
关键词 物联网 6Lowpan 移动性 效率
下载PDF
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
2
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 Internet of Things ipv6 over low power wireless personal area networks Routing Protocol for low-power and Lossy Networks Internet Protocol Version 6 distributed denial of service wireless sensor networks
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部