期刊文献+
共找到239篇文章
< 1 2 12 >
每页显示 20 50 100
An MAC Layer Algorithm Based on Power Line-Wireless Dual Media Channels and Multiplexing
1
作者 Zhixiong Chen Leixin Zhi +1 位作者 Peiru Chen YinCheng Qi 《China Communications》 SCIE CSCD 2022年第10期78-91,共14页
Hybrid networking of power line and wireless communication can complement each other,save construction costs,improve network robustness,and has important value on the Internet of Things and smart grid.For power line a... Hybrid networking of power line and wireless communication can complement each other,save construction costs,improve network robustness,and has important value on the Internet of Things and smart grid.For power line and wireless dual-interface devices,a media access control(MAC)layer algorithm for hybrid communication is proposed,in which the stations can compete for two channels simultaneously.When a station obtains two channels at the same time,the station will randomly select a channel for transmission to ensure fairness,and reset the counters when the transmission is successful.In this paper,the performance of the unsaturated traffic model and counter spatial division is considered,and the throughput under coupling conditions is obtained.Finally,the simulation results show that the MAC layer algorithm based on the hybrid communication network can make full use of the advantages of the two channels,improve system throughput,and reduce transmission delay. 展开更多
关键词 hybrid communication mac layer Traffic model
下载PDF
Key MAC Layer Technologies of Cognitive Radio Network
2
作者 Zeng Zhimin, Guo Caili (School of Information and Communication Engineering , Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China ) 《ZTE Communications》 2009年第2期21-26,共6页
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro... As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization. 展开更多
关键词 mac Key mac layer Technologies of Cognitive Radio Network RADIO
下载PDF
A Effective Method for Properties Access in MAC Layer of ZigBee
3
作者 Qi-Yong Pan Jin Wu +1 位作者 Yi-Huai Wang Jingfei Ni 《Communications and Network》 2011年第3期149-152,共4页
The attribute access methods of MAC layer in wireless communication network is researched. Aiming at conquering the problem of the shared ZigBee wireless channel resulting multi-channel device conflicts when using the... The attribute access methods of MAC layer in wireless communication network is researched. Aiming at conquering the problem of the shared ZigBee wireless channel resulting multi-channel device conflicts when using the data channel at the same time, therefore the protocol is improved and a method used to access the properties of ZigBee is proposed, and this method can be achieved to manage effectively for all the 29 properties MAC layer, save storage space and realize property maintenance and expansion. 展开更多
关键词 ZIGBEE PROTOCOL IEEE 802.15.4 mac layer PROPERTY
下载PDF
A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks 被引量:4
4
作者 Raja Gunasekaran Vaidheyanathan Rhymend Uthariaraj +2 位作者 Uamapathy Yamini Rajagopalan Sudharsan Selvaraj Sujitha Priyadarshini 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第3期472-481,共10页
Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monito... Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also. 展开更多
关键词 WLANS mac layer DCF CONTENTION BACKOFF
原文传递
Implementation of Abstract MAC Layer Under Jamming
5
作者 Yifei Zou Minghui Xu +3 位作者 Dongxiao Yu Liandong Chen Shaoyong Guo Xiaoshuang Xing 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第2期257-269,共13页
In the past decades,with the widespread implementation of wireless networks,such as the Internet of Things,an enormous demand for designing relative algorithms for various realistic scenarios has arisen.However,with t... In the past decades,with the widespread implementation of wireless networks,such as the Internet of Things,an enormous demand for designing relative algorithms for various realistic scenarios has arisen.However,with the widening of scales and deepening of network layers,it has become increasingly challenging to design such algorithms when the issues of message dissemination at high levels and the contention management at the physical layer are considered.Accordingly,the abstract medium access control(absMAC)layer,which was proposed in2009,is designed to solve this problem.Specifically,the absMAC layer consists of two basic operations for network agents:the acknowledgement operation to broadcast messages to all neighbors and the progress operation to receive messages from neighbors.The absMAC layer divides the wireless algorithm design into two independent and manageable components,i.e.,to implement the absMAC layer over a physical network and to solve higher-level problems based on the acknowledgement and progress operations provided by the absMAC layer,which makes the algorithm design easier and simpler.In this study,we consider the implementation of the absMAC layer under jamming.An efficient algorithm is proposed to implement the absMAC layer,attached with rigorous theoretical analyses and extensive simulation results.Based on the implemented absMAC layer,many high-level algorithms in non-jamming cases can be executed in a jamming network. 展开更多
关键词 abstract mac layer distributed algorithm Rayleigh-fading model jamming networks
原文传递
EECLP: AWireless Sensor Networks Energy Efficient Cross-Layer Protocol
6
作者 Mohammed Kaddi Mohammed Omari Moamen Alnatoor 《Computers, Materials & Continua》 SCIE EI 2024年第8期2611-2631,共21页
Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is ... Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is provided with an energy resource to supply electricity to all of its components.However,the disposed energy resource is limited and battery replacement is generally infeasible.With this restriction,the sensors must conserve energy to prolong their lifetime.Various energy conservation strategies for WSNs have been presented in the literature,from the application to the physical layer.Most of these solutions focus only on optimizing a single layer in terms of energy consumption.In this research,a novel cross-layer technique for WSNs’effective energy usage is presented.Because most energy consumption factors exist in the Medium Access Control(MAC)layer and network layer,our EECLP protocol(Energy Efficient Cross-Layer Protocol for Wireless Sensor Networks)integrates these two layers to satisfy energy efficiency criteria.To gain access to the transmission channel,we implement a communication regime at the MAC layer based on CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance)techniques.Next,depending on the activity and a standby period,we employ the RTS/CTS(Request to Send/Clear to Send)method to prevent collisions and resolve hidden node concerns by utilizing the network allocation vector(NAV)to calculate the transmission duration.Employing a greedy strategy,we establish chains amongst cluster members to mitigate the issue of high energy consumption in routing data.An objective function was utilized to determine the optimal cross-chain path based on the distances to the base station(BS)and residual energy(RE).The simulation,testing,and comparison of the proposed protocol to peer protocols have shown superior outcomes and a prolonged network lifespan.Using the suggested protocol,the network lifetime increases by 10%compared to FAMACO(Fuzzy and Ant Colony Optimization based MAC/Routing Cross-layer)protocol,and it increases by 90%and 95%compared to IFUC(Improved Fuzzy Unequal Clustering)and UHEED(Unequal Hybrid Energy Efficient and Distributed)protocols successively. 展开更多
关键词 WSN energy consumption mac layer network layer EECLP ENERGY-EFFICIENT LIFESPAN
下载PDF
Cross-Layer Energy Analysis and Proposal of a MAC Protocol for Wireless Sensor Networks Dedicated to Building Monitoring Systems
7
作者 Denis Dessales Noel Richard +2 位作者 Anne-Marie Poussard Rodolphe Vauzelle Christophe Martinsons 《Wireless Sensor Network》 2013年第5期91-104,共14页
In a sustainable development context, the monitoring systems are essential to study the building energy performances. With the recent technology advances, these systems can be based on wireless sensor networks, where ... In a sustainable development context, the monitoring systems are essential to study the building energy performances. With the recent technology advances, these systems can be based on wireless sensor networks, where the energy efficiency is the main design challenge. To this end, most of the studies focus on low power Medium Access Control (MAC) protocols to reduce the overall energy consumption of a network. Nevertheless, the performances assessment of these protocols is generally not performed in a realistic way, and does not take into account the performances of the other layers of the OSI model. In this paper, we propose a cross-layer methodology to assess the real performances of a MAC protocol by taking into account the traffic volume, the synchronization losses and more particularly the physical layer performances through a Bit Error Rate (BER) criterion. The simulation results demonstrate clearly the physical layer impact on a sensor lifetime. Finally, the proposal of an energy efficient MAC protocol for a wireless sensor network dedicated to an application of building monitoring is proposed. 展开更多
关键词 WSN Physical layer mac layer Energy Consumption Cross-layer Analysis
下载PDF
MAC-PHY Cross-Layer for High Channel Capacity of Multiple-Hop MIMO Relay System 被引量:1
8
作者 Pham Thanh Hiep Chika Sugimoto Ryuji Kohno 《Communications and Network》 2012年第2期129-138,共10页
For the high end-to-end channel capacity, the amplify-and-forward scheme multiple-hop MIMO relays system is considered. The distance between each transceiver is optimized to prevent some relays from being the bottlene... For the high end-to-end channel capacity, the amplify-and-forward scheme multiple-hop MIMO relays system is considered. The distance between each transceiver is optimized to prevent some relays from being the bottleneck and guarantee the high end-to-end channel capacity. However, in some cases, the location of relays can’t be set at the desired location, the transmit power of each relay should be optimized. Additionally, in order to achieve the higher end-to-end channel capacity, the distance and the transmit power are optimized simultaneously. We propose the Markov Chain Monte Carlo method to optimize both the distance and the transmit power in complex propagation environments. Moreover, when the system has no control over transmission of each relay, the interference signal is presented and the performance of system is deteriorated. The general protocol of control transmission for each relay on the MAC layer is analyzed and compared to the Carrier Sense Multiple Access-Collision Avoidance protocol. According to the number of relays, the Mac layer protocol for the highest end-to-end channel capacity is changed. We also analyze the end-to-end channel capacity when the number of antennas and relays tends to infinity. 展开更多
关键词 Multiple-Hop Relays SYSTEM AMPLIFY-AND-FORWARD OPTIMIZATION Distance OPTIMIZATION Transmit Power mac layer Protocol Infinite Antenna Number
下载PDF
无线和电力线混合通信的MAC层接入算法设计和性能分析 被引量:1
9
作者 黄鑫 卞宝银 +4 位作者 杨鸿珍 陈佩茹 左嘉烁 李秀彩 赵豫京 《电力信息与通信技术》 2024年第1期77-85,共9页
电力线和无线混合通信可以优势互补提升电力物联网室内覆盖的综合性能。针对无线接入和电力线中继的混合通信场景,文章提出一种适用于两跳混合中继的通用MAC层算法。综合考虑物理层信道参数和MAC层的载波侦听多路访问(carrier sense mul... 电力线和无线混合通信可以优势互补提升电力物联网室内覆盖的综合性能。针对无线接入和电力线中继的混合通信场景,文章提出一种适用于两跳混合中继的通用MAC层算法。综合考虑物理层信道参数和MAC层的载波侦听多路访问(carrier sense multiple access,CSMA)退避流程,建立了该MAC层算法的跨层性能分析模型,推导了两跳传输系统归一化吞吐量以及系统时延等性能;最后仿真验证了算法有效性和模型准确性,分析了物理层和MAC层关键参数影响系统性能的机理。与Basic-RTS/CTS算法相比,所提算法可有效提升系统吞吐量和时延性能。 展开更多
关键词 混合通信 中继传输 mac层算法 PHY-mac跨层分析
下载PDF
基于MEC服务器优先服务的路侧单元MAC层调度策略
10
作者 李欣 保利勇 +1 位作者 丁洪伟 官铮 《计算机应用》 CSCD 北大核心 2024年第4期1227-1235,共9页
针对多接入边缘计算(MEC)服务器高可靠、低时延和大数据量的数据传输要求,基于无冲突接入、优先级架构和弹性服务技术,提出一种适用于车辆边缘计算场景下的媒体访问控制(MAC)调度策略。所提策略由车联网(IoV)路侧单元(RSU)集中协调信道... 针对多接入边缘计算(MEC)服务器高可靠、低时延和大数据量的数据传输要求,基于无冲突接入、优先级架构和弹性服务技术,提出一种适用于车辆边缘计算场景下的媒体访问控制(MAC)调度策略。所提策略由车联网(IoV)路侧单元(RSU)集中协调信道接入权,优先确保车载网络中车载通信单元(OBU)与MEC服务器之间的链路传输质量,以及时传输车辆到网络(V2N)业务数据;同时,对本地OBU之间的业务采取弹性服务方式,增强密集车辆接入时应急消息传输的可靠性。首先,构建调度策略的排队分析模型;其次,根据各时刻系统状态变量的无后效性特点建立嵌入式马尔可夫链,并通过概率母函数的分析方法对系统进行理论分析,得到MEC服务器通信单元和OBU的平均排队队长、平均等待时延和RSU查询周期等关键指标的精确解析表达式。计算机仿真实验结果表明,统计分析结果与理论计算结果一致,所提调度策略在高负载情况下能够提高IoV的稳定性和灵活性。 展开更多
关键词 车联网 媒体访问控制层调度 优先级架构 平均排队队长 平均等待时延
下载PDF
基于空中平台通信系统的MAC层调度算法优化研究
11
作者 伍仲明 《计算机应用文摘》 2024年第19期85-87,共3页
随着应用场景的日益增多和复杂化,传统的MAC层调度算法面临多种挑战,如资源利用率低、时延大、不公平的资源分配等,这些问题迫切需要通过算法优化得到解决。围绕空中平台通信系统的MAC层调度算法优化,文章首先分析了系统的工作原理和架... 随着应用场景的日益增多和复杂化,传统的MAC层调度算法面临多种挑战,如资源利用率低、时延大、不公平的资源分配等,这些问题迫切需要通过算法优化得到解决。围绕空中平台通信系统的MAC层调度算法优化,文章首先分析了系统的工作原理和架构,指出了现有MAC层调度算法面临的主要挑战和优化需求,接着提出了一种新的调度优化算法。该算法结合时间片轮转和多级队列调度的策略,旨在提高资源利用率并减少通信延迟,从而实现更公平的资源分配。最终,文章通过一系列技术测试和性能评估验证了所提算法在不同场景下的有效性和优越性,为空中平台通信系统的MAC层调度提供了一种新的优化方案。 展开更多
关键词 空中平台 通信系统 mac
下载PDF
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
12
作者 Hira Akhtar Butt Khoula Said Al Harthy +3 位作者 Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2024年第11期3003-3031,共29页
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such atta... Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost. 展开更多
关键词 Table 1(continued)OSI layer Possible DDoS attack Data link mac Address Flooding Physical Cable disconnection JaMMING physical impersonation
下载PDF
基于VoWLAN的MAC层接入算法的改进 被引量:5
13
作者 曾桂根 洪杰 郑宝玉 《仪器仪表学报》 EI CAS CSCD 北大核心 2011年第7期1660-1668,共9页
在VoWLAN(VoIP over WLAN)系统中,当周期性语音业务与随机性数据业务混合传输时,面临着信道能容纳的话路数少、语音业务与数据业务获得信道的机会不可控等问题。IEEE802.11e协议在传输周期的无竞争期(CFP)采用混合协调功能(HCF)来解决... 在VoWLAN(VoIP over WLAN)系统中,当周期性语音业务与随机性数据业务混合传输时,面临着信道能容纳的话路数少、语音业务与数据业务获得信道的机会不可控等问题。IEEE802.11e协议在传输周期的无竞争期(CFP)采用混合协调功能(HCF)来解决语音业务QoS问题。研究在IEEE802.11e的HCF机制基础上,对媒质接入控制(MAC)层进行了改进,对CFP时段的上行周期性语音采用无竞争预约排队信道接入(CFRQCA)机制取代HCF受控信道接入(HCCA)方式,在CFP时段的下行语音接入采用M-M(Multicast-Multiplexing)机制;为了协调语音业务与数据业务的接入机会,论文中还提出了一种基于业务流量监测的接入机会自适应调度算法(AOASA);理论分析和仿真表明,无竞争预约排队机制和接入机会自适应调度算法能显著提高信道容纳的话路数。 展开更多
关键词 无线局域网上的IP语音 mac 无竞争预约排队信道接入 接入机会自适应调度算法
下载PDF
面向实时业务的认知无线网络MAC层频谱接入方案 被引量:4
14
作者 李瑞芳 刘泉 李仁发 《通信学报》 EI CSCD 北大核心 2014年第4期35-43,共9页
为满足认知无线网络中宽带业务实时传输的需求,提出低延迟的MAC层频谱接入方案,包括频谱感知调度与信道接入竞争两部分。在频谱感知阶段,认知用户选取最佳可用信道数实现感知与传输的延迟最小化;在信道接入竞争阶段,协议考虑频谱资源动... 为满足认知无线网络中宽带业务实时传输的需求,提出低延迟的MAC层频谱接入方案,包括频谱感知调度与信道接入竞争两部分。在频谱感知阶段,认知用户选取最佳可用信道数实现感知与传输的延迟最小化;在信道接入竞争阶段,协议考虑频谱资源动态变化的特点,通过设计数据帧格式以及邻居节点协同侦听机制,减小信道冲突与"聋终端"的影响。理论与实验结果表明,与传统的认知无线网络MAC层协议相比,提出的接入方案数据传输延迟更短,同时在授权信道空闲率较大时吞吐量性能略优。 展开更多
关键词 认知无线网络 频谱接入方案 媒体访问控制层 实时 低延迟
下载PDF
现场总线MAC层的分析 被引量:12
15
作者 徐应跃 吴爱国 《化工自动化及仪表》 CAS 北大核心 2001年第2期4-7,共4页
现场总线的MAC层在很大程度上决定了网络的实时性与可靠性 ,可以说是现场总线系统的关键。介绍了MAC层的两大体系 :令牌环 /令牌总线和CSMA/CD ,并深入分析了它们各自的代表 :PROFIBUS和LON WORKS的MAC层的实现方式 。
关键词 工业控制 现场总线 mac 令牌环 令牌总线 CSMA/CD
下载PDF
一种适用于无线传感器网络的跨层高效MAC协议 被引量:14
16
作者 郑国强 孙若玉 李济顺 《传感技术学报》 CAS CSCD 北大核心 2009年第1期95-99,共5页
为了延长网络的寿命,实现能量的高效利用是无线传感器网络应用的主要目标,MAC协议的能效性直接关系到网络的能耗,但采用分层方法的MAC协议无法实现最优的节能效果。本文基于跨层的方法提出了一种能量高效MAC(cross layer energy efficie... 为了延长网络的寿命,实现能量的高效利用是无线传感器网络应用的主要目标,MAC协议的能效性直接关系到网络的能耗,但采用分层方法的MAC协议无法实现最优的节能效果。本文基于跨层的方法提出了一种能量高效MAC(cross layer energy efficient MAC,CLEE-MAC)协议。该协议在自适应S-MAC(adaptive sensor MAC,AS-MAC)协议基础上,通过利用路由层的路由表信息,改变AS-MAC协议的控制帧格式,有效解决了AS-MAC协议中因"强迫唤醒"造成的能量浪费问题,延长了网络的寿命。理论分析和仿真验证均表明,随着节点密度的增加,CLEE-MAC协议的节能增益随网络密度线性增大。 展开更多
关键词 无线传感器网络 能量高效 mac协议 跨层
下载PDF
基于无线局域网MAC层DOS攻击的入侵检测 被引量:3
17
作者 胡许明 张登福 +1 位作者 陈雕 白渊海 《现代防御技术》 北大核心 2013年第3期75-80,105,共7页
为了检测无线局域网MAC层的6种DOS攻击方式,提出一种基于Hybrid特征选择和支持向量机的入侵检测算法。该算法先用混合器模式的Hybrid特征选择算法提取8个识别攻击的流量统计特征,然后利用支持向量机对待检测对象进行识别分类。通过建立... 为了检测无线局域网MAC层的6种DOS攻击方式,提出一种基于Hybrid特征选择和支持向量机的入侵检测算法。该算法先用混合器模式的Hybrid特征选择算法提取8个识别攻击的流量统计特征,然后利用支持向量机对待检测对象进行识别分类。通过建立仿真环境对检测模型的检测效果进行统计验证,表明检测模型在具有较高检测准确率和较低的虚警率,能够有效地检测MAC层DOS攻击,具有实用价值。 展开更多
关键词 无线局域网 介质访问层 拒绝服务攻击 特征选择 支持向量机 入侵探测
下载PDF
基于D-S证据理论的无线传感器网络MAC层安全研究 被引量:2
18
作者 张聚伟 孙雨耕 杨挺 《计算机应用研究》 CSCD 北大核心 2009年第1期330-333,共4页
研究了无线传感器网络MAC层安全问题,分析了现有无线传感器网络MAC层协议安全体系的不足之处,针对无线传感器网络遭到非法入侵的情况,提出了一个基于D-S证据理论的MAC层入侵检测机制。该机制利用碰撞率、数据包平均等待时间、RTS包到达... 研究了无线传感器网络MAC层安全问题,分析了现有无线传感器网络MAC层协议安全体系的不足之处,针对无线传感器网络遭到非法入侵的情况,提出了一个基于D-S证据理论的MAC层入侵检测机制。该机制利用碰撞率、数据包平均等待时间、RTS包到达率以及邻居节点的报警作为证据,对网络的状态进行实时的分析检测,根据网络的状态作出响应。该算法能够应用于现有的MAC协议如S-MAC、IEEE 802.15.4中,仿真结果表明,该算法能够较好地抵御针对MAC层的攻击,保证网络的安全运行。 展开更多
关键词 介质访问控制层协议 安全 D-S证据理论 无线传感器网络 入侵检测
下载PDF
基于保护流的MANET网MAC层DoS攻击及防御 被引量:3
19
作者 叶进 李伶强 《计算机科学》 CSCD 北大核心 2011年第4期118-121,共4页
在分析拒绝报务攻击和IEEE802.11协议的基础上,讨论了无线Ad hoc网络可能遭受的拒绝服务攻击类型。针对其中的MAC层拒绝服务攻击中的协同攻击,重点分析了基于保护流的解决方案。基于该方法的基本原理,提出了保护流位置设计的原则和方法... 在分析拒绝报务攻击和IEEE802.11协议的基础上,讨论了无线Ad hoc网络可能遭受的拒绝服务攻击类型。针对其中的MAC层拒绝服务攻击中的协同攻击,重点分析了基于保护流的解决方案。基于该方法的基本原理,提出了保护流位置设计的原则和方法。通过仿真分析在加入保护流前后被攻击流的吞吐量和延时,验证了所提出的保护流位置的设计。 展开更多
关键词 AD HOC mac DOS攻击 保护流
下载PDF
车载自组网MAC层的安全问题研究 被引量:1
20
作者 安建伟 周贤伟 +1 位作者 黄欢 武晓博 《计算机应用研究》 CSCD 北大核心 2009年第5期1891-1895,1899,共6页
通过分析车载自组网MAC层存在的安全威胁及其实现原理,对现有的安全解决方案进行总结和评估,并提出了适用于车载自组网环境下MAC层的安全体系结构;最后讨论在安全机制的实现过程中尚未解决的问题,并指出今后研究的重要方向。
关键词 车载自组网 网络安全 mac层安全 mac协议 攻击
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部