期刊文献+
共找到824篇文章
< 1 2 42 >
每页显示 20 50 100
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
1
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
Toward path reliability by using adaptive multi-path routing mechanism for multimedia service in mobile Ad-hoc network 被引量:2
2
作者 ZHEN Yan,WU Mu-qing,WU Da-peng,ZHANG Qin-juan,XU Chun-xiu Broadband Communication Network Laboratory,Beijing University of Posts and Telecommunications,Beijing 100876,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第1期93-100,共8页
Traditional multi-path routing mechanisms aim to establish complete node or link disjoint paths. However, under some circumstances if multiple paths cannot be established based on the current network topology, the tra... Traditional multi-path routing mechanisms aim to establish complete node or link disjoint paths. However, under some circumstances if multiple paths cannot be established based on the current network topology, the traditional multi-path routing mechanism will degenerate into single path routing mechanism, thus the advantages of multi-path routing cannot be exhibited. To enhance the end-to-end path reliability, an adaptive multi-path routing mechanism with path segment is proposed, in which multi-path can be established at part of the end-to-end path. In this way the reliability of the path can be enhanced. This path segment mechanism can divide the end-to-end path into several short segments, and a parallel forwarding mechanism is proposed for guaranteeing the quality of service of multimedia services over the wireless network. Simulations show that the network performance metrics such as the packet delivery ratio, the end-to-end delay and the number of route discoveries are all improved by using the adaptive multi-path routing mechanism. 展开更多
关键词 mobile Ad-hoc networks multi-path routing RELIABILITY parallel forwarding path segment
原文传递
Study of network survivability based on multi-path routing mechanism
3
作者 HUANG Song XU Yong ZHANG Ling 《Science in China(Series F)》 2008年第11期1898-1907,共10页
As an important secure routing mechanism, multi-path routing is one of the major ways to improve network efficiency and to guarantee the network security, which ensures the reliability of data transmission by using ba... As an important secure routing mechanism, multi-path routing is one of the major ways to improve network efficiency and to guarantee the network security, which ensures the reliability of data transmission by using backup paths when the primary one is unavailable due to local node or link failures. Most current studies on multi-path routing mechanism are based on experiments or simulations. The resulta are usually specific application scenarios oriented heuristic algorithms, lacking universal significance. In this paper, a theoretic analysis is performed on the relationship between the multi-path routing policy, the network efficiency and its survivability. Starting with point-to-point communication network, an impactoriented analysis is made on the network interference under multi-path routing mechanism. Based on the analysis, the upper-limit of network performance under interference impact is also discussed. 展开更多
关键词 multi-path routing network survivability interference impact
原文传递
Improved Multi-Path Routing for QoS on MANET
4
作者 M.Vargheese Surbhi Bhatia +1 位作者 Shakila Basheer Pankaj Dadheech 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2521-2536,共16页
A Mobile Ad hoc NETwork(MANET)is a self-configuring network that is not reliant on infrastructure.This paper introduces a new multipath routing method based on the Multi-Hop Routing(MHR)technique.MHR is the consecutiv... A Mobile Ad hoc NETwork(MANET)is a self-configuring network that is not reliant on infrastructure.This paper introduces a new multipath routing method based on the Multi-Hop Routing(MHR)technique.MHR is the consecutive selection of suitable relay nodes to send information across nodes that are not within direct range of each other.Failing to ensure good MHR leads to several negative consequences,ultimately causing unsuccessful data transmission in a MANET.This research work consists of three portions.The first to attempt to propose an efficient MHR protocol is the design of Priority Based Dynamic Routing(PBDR)to adapt to the dynamic MANET environment by reducing Node Link Failures(NLF)in the network.This is achieved by dynamically considering a node’s mobility parameters like relative velocity and link duration,which enable the next-hop selection.This method works more efficiently than the traditional protocols.Then the second stage is the Improved Multi-Path Dynamic Routing(IMPDR).The enhancement is mainly focused on further improving the Quality of Service(QoS)in MANETs by introducing a QoS timer at every node to help in the QoS routing of MANETs.Since QoS is the most vital metric that assesses a protocol,its dynamic estimation has improved network performance considerably.This method uses distance,linkability,trust,and QoS as the four parameters for the next-hop selection.IMPDR is compared against traditional routing protocols.The Network Simulator-2(NS2)is used to conduct a simulation analysis of the protocols under consideration.The proposed tests are assessed for the Packet Delivery Ratio(PDR),Packet Loss Rate(PLR),End-to-End Delay(EED),and Network Throughput(NT). 展开更多
关键词 multi-path routing quality of service node-link failure packet delivery ratio
下载PDF
A TRUST MECHANISM-BASED CHANNEL ASSIGNMENT AND ROUTING SCHEME IN COGNITIVE WIRELESS MESH NETWORKS WITH INTRUSION DETECTION 被引量:1
5
作者 Wu Guofeng Zhang Jing He Zhaopan 《Journal of Electronics(China)》 2010年第5期728-734,共7页
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ... Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively. 展开更多
关键词 Cognitive Wireless Mesh Networks (CWMN) Intrusion detection Trust mechanism Channel assignment routing
下载PDF
Backtracking Routing Mechanism for Improving Link Failure Recovery
6
作者 WU Jing ZHOU Jianguo YANG Jianfeng YAN Puliu JIANG Hao 《Wuhan University Journal of Natural Sciences》 CAS 2007年第3期462-466,共5页
Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing ... Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing algorithm based on inverse shortest path tree rooted at destination is presented. The feasible restoration routing is obtained through searching from the start of the failure link and tracing back to the leaves of the shortest path tree with the destination as the root. The packets are forwarded from the mounted point with smaller sequence to the mount point with bigger sequence to decrease the possible of loop in case of multi-failures. The simulations and analysis indicate that backtracking routing algorithm improves the network survivability especially for large network, at the cost of the computation complexity in the same order as failure insensitive routing. 展开更多
关键词 failure insensitive routing (FIR) shortest path tree (SPT) backtracking routing mechanism network survivability network usability
下载PDF
Considerations on Novel Network Routing Mechanism
7
作者 Guo Yunfei, Zhu Xuanyong, Wang Na (Information Engineering University, Zhengzhou 450002, China) 《ZTE Communications》 2008年第1期23-28,共6页
Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single nex... Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single next-hop routing mechanism, which is the root of transmission congestion in the network. To solve this congestion problem, a fundamental measure is to change the route selection mode of current routing mechanism to allow parallel transmission over multiple routes. Currently, Border Gateway Protocol (BGP) is the only inter-domain routing protocol used in the Internet, but the routing system using BGP suffers scalability problem. To solve the scalability issue of the current inter-domain routing system, a new hierarchical routing system, i.e. Scalable Inter-Domain Routing Architecture (s-idra), is suggested. In addition to scalability, the current routing system is facing other challenges including security, Quality of Service (QoS), multicasting, mobility and dynamic network topology. Therefore, the research on routing protocols, especially the protocol for the new network architecture, is still a tough task and has a long way to go. 展开更多
关键词 Considerations on Novel Network routing mechanism BGP QOS
下载PDF
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET 被引量:1
8
作者 S.Neelavathy Pari K.Sudharson 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2775-2789,共15页
A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,... A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,from the other side,are exposed to severe potential threats that are difficult to counter with present security methods.As a result,several safe communication protocols designed to enhance the secure interaction among MANET nodes.In this research,we offer a reputed optimal routing value among network nodes,secure computations,and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism(HTRM).In addition,the study designs a robust Public Key Infrastructure(PKI)system using the suggested trust evaluation method in terms of“key”generation,which is a crucial component of a PKI cryptosystem.We also concentrate on the solid node authenticating process that relies on pre-authentication.To ensure edge-to-edge security,we assess safe,trustworthy routes to secure computations and authenticate mobile nodes,incorporating uncertainty into the trust management solution.When compared to other protocols,our recommended approach performs better.Finally,we use simulations data and performance evaluation metrics to verify our suggested approach’s validity Our approach outperformed the competing systems in terms of overall end-to-end delay,packet delivery ratio,performance,power consumption,and key-computing time by 3.47%,3.152%,2.169%,and 3.527%,3.762%,significantly. 展开更多
关键词 Mobile ad-hoc network trust management secure authentication reputation mechanism secure routing
下载PDF
Multi-Path Routing and Resource Allocation in Active Network 被引量:2
9
作者 XUWu-ping YANPu-liu WUMing 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第2期398-404,共7页
An algorithm of traffic distribution called active multi-path routing (AMR)in active network is proposed. AMR adopts multi-path routing and applies nonlinear optimizeapproximate method to distribute network traffic am... An algorithm of traffic distribution called active multi-path routing (AMR)in active network is proposed. AMR adopts multi-path routing and applies nonlinear optimizeapproximate method to distribute network traffic among multiple paths. It is combined to bandwidthresource allocation and the congestion restraint mechanism to avoid congestion happening and worsen.So network performance can be improved greatly. The frame of AMR includes adaptive trafficallocation model, the conception of supply bandwidth and its' allocation model, the principle ofcongestion restraint and its' model, and the implement of AMR based on multi-agents system in activenetwork. Through simulations, AMR has distinct effects on network performance. The results show AMRisa valid traffic regulation algorithm. 展开更多
关键词 multi-path routing resource allocation congestion control active network multi-agent system
下载PDF
MRBCH: A Multi-Path Routing Protocol Based on Credible Cluster Heads for Wireless Sensor Networks 被引量:4
10
作者 Yang Yang Enjian Bai +1 位作者 Jia Hu Wenqiang Wu 《International Journal of Communications, Network and System Sciences》 2010年第8期689-696,共8页
Wireless sensor networks are widely used for its flexibility, but they also suffer from problems like limited capacity, large node number and vulnerability to security threats. In this paper, we propose a multi-path r... Wireless sensor networks are widely used for its flexibility, but they also suffer from problems like limited capacity, large node number and vulnerability to security threats. In this paper, we propose a multi-path routing protocol based on the credible cluster heads. The protocol chooses nodes with more energy remained as cluster heads at the cluster head choosing phase, and then authenticates them by the neighbor cluster heads. Using trust mechanisms it creates the credit value, and based on the credit value the multi-path cluster head routing can finally be found. The credit value is created and exchanged among the cluster heads only. Theoretical analysis combined with simulation results demonstrate that this protocol can save the resource, prolong the lifetime, and ensure the security and performance of the network. 展开更多
关键词 WIRELESS Sensor Network CLUSTERING multi-path routing CREDIT VALUE
下载PDF
The quickly switching routing algorithm based on multi-path in mobile Ad Hoc networks
11
作者 LIN Wei YANG Yong-tian 《Journal of Marine Science and Application》 2006年第1期39-43,共5页
This paper proposes a new on-demand multi-alternate-path algorithm, called quickly switching routing algorithm(QSRA). It switches failure routing to an alternate path as quickly as the network can. Like a nervure shap... This paper proposes a new on-demand multi-alternate-path algorithm, called quickly switching routing algorithm(QSRA). It switches failure routing to an alternate path as quickly as the network can. Like a nervure shape, algorithm QSRA shapes disjoint-alternate-path structure, but is not limited to. It also contains another structure that every primary node has several links to alternate paths. This structure has two advantages, the first one is that primary nodes can select one alternate path immediately when primary routing is failure without going back to source node to re-discover a new routing or choose an alternate path; the second is that it guarantees primary nodes can select another alternate path as quickly as possible once one of alternate paths fails. Strongpoint of algorithm QSRA is reducing frequency of routing re-discovering. Besides, the structure occupies fewer resources than other routing algorithms due to its distributed structure. Simulation shows that QSRA has higher packets received ratio and lower control packet overhead and lower end-to-end delay. 展开更多
关键词 mobile Ad Hoc networks routing multi-path routing
下载PDF
SOPA:Source Routing Based Packet-Level Multi-Path Routing in Data Center Networks
12
作者 LI Dan LIN Du +1 位作者 JIANG Changlin Wang Lingqiang 《ZTE Communications》 2018年第2期42-54,共13页
Many "rich - connected" topologies with multiple parallel paths between smwers have been proposed for data center networks recently to provide high bisection bandwidth, but it re mains challenging to fully utilize t... Many "rich - connected" topologies with multiple parallel paths between smwers have been proposed for data center networks recently to provide high bisection bandwidth, but it re mains challenging to fully utilize the high network capacity by appropriate multi- path routing algorithms. As flow-level path splitting may lead to trafl'ic imbalance between paths due to flow- size difference, packet-level path splitting attracts more attention lately, which spreads packets from flows into multiple available paths and significantly improves link utilizations. However, it may cause packet reordering, confusing the TCP congestion control algorithm and lowering the throughput of flows. In this paper, we design a novel packetlevel multi-path routing scheme called SOPA, which leverag- es OpenFlow to perform packet-level path splitting in a round- robin fashion, and hence significantly mitigates the packet reordering problem and improves the network throughput. Moreover, SOPA leverages the topological feature of data center networks to encode a very small number of switches along the path into the packet header, resulting in very light overhead. Compared with random packet spraying (RPS), Hedera and equal-cost multi-path routing (ECMP), our simulations demonstrate that SOPA achieves 29.87%, 50.41% and 77.74% higher network throughput respectively under permutation workload, and reduces average data transfer completion time by 53.65%, 343.31% and 348.25% respectively under production workload. 展开更多
关键词 data center networks multi-path routing path splitting
下载PDF
Microstructure evolution and mechanical properties of ZK60 magnesium alloy produced by SSTT and RAP route in semi-solid state
13
作者 王长朋 张营营 +3 位作者 李迪凡 梅华生 张帷 刘杰 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2013年第12期3621-3628,共8页
The microstructure evolution and mechanical properties of a ZK60 magnesium alloy produced by the semi-solid thermal transformation (SSTT) route and the recrystallization and partial melting (RAP) route were studie... The microstructure evolution and mechanical properties of a ZK60 magnesium alloy produced by the semi-solid thermal transformation (SSTT) route and the recrystallization and partial melting (RAP) route were studied, respectively. The microstructure evolution during partial remelting was studied at different temperatures for different time. The tensile mechanical properties of thixoformed components by the two routes at room temperature were examined. The results show that coalescence is dominant in the SSTT alloy and Ostwald ripening is dominant in the RAP alloy. Compared with the SSTT route, the RAP route can produce finer semi-solid microstructure under the similar isothermal holding condition. The microstructure of the RAP alloy is much more spheroidized compared with the SSTT alloy. Thixoforming for the ZK60 magnesium alloy produced by the SSTT and RAP route results in successful filling of the die, and the thixoforming process improves the mechanical properties of ZK60 magnesium alloy. The RAP alloy shows significantly advantageous mechanical properties over that of the SSTT alloy. 展开更多
关键词 ZK60 magnesium alloy semi-solid thermal transformation (SSTT) recrystallization and partial melting (RAP) route microstructure evolution mechanical properties
下载PDF
Reliable Braided Multipath Routing with Network Coding for Underwater Sensor Networks 被引量:5
14
作者 杨余旺 古力 +3 位作者 鞠玉涛 郑亚 孙亚民 杨静宇 《China Ocean Engineering》 SCIE EI 2010年第3期565-574,共10页
Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effect... Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effective coding technique for throughput and robustness of networks. In this paper, we propose a Reliable Braided Multipath Routing with Network Coding for underwater sensor networks (RBMR-NC). Disjoint multi-path algorithm is used to build independent actual paths, as called main paths. Some braided paths on each main path are built according to the braided multi-path algorithm, which are called logic paths. When a data packet is transmitted by these nodes, the nodes can employ network coding to encode packets coming from the same group in order to further reduce relativity among these packets, and enhance the probability of successful decoding at the sink node. Braided multi-path can make the main paths to be multiplexed to reduce the probability of long paths. This paper mainly employs successful delivery rate to evaluate RBMR-NC model with theoretical analysis and simulation methods. The results indicate that the proposed RBMR-NC protocol is valuable to enhance network reliability and to reduce system redundancy. 展开更多
关键词 network coding multi-path routing underwater sensor networks network reliability
下载PDF
Influence of rolling route on microstructure and mechanical properties of AZ31 magnesium alloy during asymmetric reduction rolling 被引量:10
15
作者 Ru MA Yue LU +1 位作者 Ling WANG Yi-nong WANG 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2018年第5期902-911,共10页
Four different routes of asymmetric reduction rolling were conducted on AZ31 magnesium alloy to investigate their effect on the microstructure evolution and mechanical properties. Route A is the forward rolling; while... Four different routes of asymmetric reduction rolling were conducted on AZ31 magnesium alloy to investigate their effect on the microstructure evolution and mechanical properties. Route A is the forward rolling; while during routes B and C the sheets are rotated 180o in rolling direction and normal direction, respectively; route D is the unidirectional rolling. The strain states of rolled sheets were analyzed by the finite element method, while the microstructure and texture were observed using optical microscopy, X-ray diffraction and electron back-scattered diffraction techniques, and the mechanical properties were measured by tensile test. The results show that route D produced the largest effective strain. Compared with other samples, sample D exhibited a homogeneous microstructure with fine grains as well as a weak and tilted texture, in corresponding, it performed excellent tensile properties, which suggested that route D was an effective way to enhance the strength and plasticity of AZ31 sheet. 展开更多
关键词 AZ31 Mg alloy asymmetric reduction rolling rolling route fmite element analysis mechanical properties
下载PDF
A Novel Distributed LDoS Attack Scheme against Internet Routing 被引量:3
16
作者 ZHU Hongliangt XIN Yang +1 位作者 WU Qiuxin YOU Fucheng 《China Communications》 SCIE CSCD 2014年第A01期101-107,共7页
LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is... LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect. 展开更多
关键词 distributed low-rate DoS attacks attack efficiency BGP route flapping defense mechanisms
下载PDF
Geological conditions and key rock mechanics issues in the Western Route of South-to-North Water Transfer Project 被引量:2
17
作者 XuechaoWang 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE 2011年第3期234-243,共10页
In terms of special geological conditions of the Western Route of South-to-North Water Transfer Project, the classification method for surrounding rocks is discussed by combining with the construction method of tunnel... In terms of special geological conditions of the Western Route of South-to-North Water Transfer Project, the classification method for surrounding rocks is discussed by combining with the construction method of tunnel boring machine (TBM). The classification standard of surrounding rocks is put forward on the basis of physical simulations and engineering practices. Damage, deformation and evolution of surrounding rocks induced by TBM excavation are discussed. Meanwhile, the long-term deformation mechanisms and stability of surrounding rocks are also studied. On this basis, a three-dimensional constitutive model for interbedded sandstone slate and a fiat shell-joint element-foundation system for calculating internal forces of segment lining are established. The deformation features of surrounding rocks of deep and steep interbedded sandstone slate and their influences on internal forces of segment lining are presented. Finally, the design methods of segment lining constructed in deep and steep flysch are proposed. 展开更多
关键词 the Western route of South-to-North Water Transfer Project rock mechanics issues classification of surrounding rocks stability of surrounding rocks excavation-induced damage lining design
下载PDF
Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN 被引量:3
18
作者 Yu Hu Yuanming Wu Hongshuai Wang 《Wireless Sensor Network》 2014年第11期237-248,共12页
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at... The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm. 展开更多
关键词 INSIDER ATTACK Selective FORWARDING TRUST mechanism MONITOR NODE Secure routing Protocol
下载PDF
Mechanism of Thaumasite Formation in Concrete 被引量:2
19
作者 宋远明 ZHOU Shaolong +2 位作者 WANG Zhijuan WANG Bo 钱觉时 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2017年第4期893-897,共5页
Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2... Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2S, C3A, ettringite, and thaumasite, and X-ray diffraction(XRD), Raman spectroscopy and infrared spectroscopy(IR) were used to identify thaumasite from other hydrates. To investigate the direct route of thaumasite formation, C3S, C2S, gypsum, and calcium carbonate were used to prepare a cement paste so that the interference of ettringite formation can be avoided. The indirect route of thaumasite formation was also studied by considering the effect of C3A or ettringite content on thaumasite formation. Results show that thaumasite can be definitely generated in the absence of aluminium-bearing minerals or ettringite under appropriate conditions, while the ettringite presence promotes the thaumasite formation. No evidences support the heterogeneous nucleation route in this work. It is concluded that the method mentioned in this work can surely be used to investigate the mechanism of thaumasite formation, and thaumasite can form by both direct and woodfordite routes. 展开更多
关键词 thaumasite ettringite formation mechanism direct route woodfordite route
下载PDF
A Survey on Routing Algorithms for Opportunistic Mobile Social Networks 被引量:1
20
作者 Ying Cai Haochen Zhang +1 位作者 Yanfang Fan Hongke Xia 《China Communications》 SCIE CSCD 2021年第2期86-109,共24页
Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performa... Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performance of routing algorithms.Users in OMSNs communicate to share and disseminate data to meet needs for variety of applications.Such networks have attracted tremendous attention lately due to the data transmission requirement from emerging applications such as IoT and smart city initiatives.Devices carried by human is the carrier of message transmission,so the social features of human can be used to improve the ability of data transmission.In this paper,we conduct a comparative survey on routing algorithms in OMSNs.We first analyze routing algorithms based on three social features.Since node selfishness is not really considered previously in aforementioned routing algorithms,but has significant impact on network performance,we treat node selfishness as another social feature,classify and elaborate routing algorithms based on incentive mechanism.To assess the impact of social features on routing algorithms,we conducted simulation for six routing algorithms and analyzed the simulation result.Finally,we conclude the paper with challenges on design of routing in OMSNs and point out some future research directions. 展开更多
关键词 OMSNs routing algorithms social features SELFISHNESS incentive mechanism
下载PDF
上一页 1 2 42 下一页 到第
使用帮助 返回顶部