Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“ce...Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“centralized-distribution”system MAC protocol combined with a slot allocation algorithm.This allows it to quickly adapt to the topology changes in the network and the overall network frame structure.For the centralized time slot allocation,since the system’s frame structure changes across the entire network,the root node must gather information from other nodes.This ensures that the root node can collect the latest topology information when the network topology changes and subsequently adjust the frame structure of the whole network for the distributed time slot allocation.The simulation results show that the adaptive time-division multiple access mechanism can quickly adapt to changes in topology and the network’s frame structure.It enables adaptive changes in node transmission times,ensures the rapid transmission and circulation of large-capacity data between nodes,and improves transmission efficiency.展开更多
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ...This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.展开更多
The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol ...The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel.展开更多
Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes...Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes by their mobifity. When multiple coverage holes appear in the sensor network and each of them has a time requirement (in which the coverage hole has to be healed), conflicts for the requests of the same mobile sensor may arise. A distributed multiple mobile sensor schedufing protocol (DMS) is proposed in this paper to solve this problem by finding mobile sensors in the time response zone defined by the time requirement of each coverage hole. Simulation results show that DMS can well schedule the mobile sensors to move to multiple coverage holes within the time requirement.展开更多
Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,margi...Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,marginally addresses security aspects,notably not encompassing the frames designed for management purposes(Type Length Values or TLVs).In this work we show that the TLVs can be abused by an attacker to reconfigure,manipulate,or shut down time synchronization.The effects of such an attack can be serious,ranging from interruption of operations to actual unintended behavior of industrial devices,possibly resulting in physical damages or even harm to operators.The paper analyzes the root causes of this vulnerability,and provides concrete examples of attacks leveraging it to de-synchronize the clocks,showing that they can succeed with limited resources,realistically available to a malicious actor.展开更多
Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to r...Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to reduce the cost of nodes,fixed transmitters and receivers are used instead of tunable transmitters and receivers.Two fixed transmitters and many fixed receivers are used in each node in the scheme.The average waiting delay of this scheme is analyzed through mathematics and computer simulation.The result shows that the property of the scheme is almost the same as using tunable transmitter and receiver.Furthermore,if the tuning time of tunable transmitters is taken into account,the performance of the tunable transmitter scheme is poor than this scheme at the average waiting delay and throughput of the network.展开更多
在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-I...在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-Input Multiple-Output,MIMO)技术,提出一套D2D通信与虚拟MIMO技术结合的无中心飞行器集群网络传输方案。重点研究在正交资源模式下,将不同的协作传输协议与空时编码进行组合,在信噪比、误比特率、接入概率等方面对通信性能的影响。仿真结果表明:D2D通信与虚拟MIMO技术结合的传输方案在不增加资源的前提下,对集群网络的通信性能有明显提升,且引入分布式空时编码可进一步优化误比特率性能,但3种传输协议在不同传输质量评价方向的改善有所不同。展开更多
时间同步技术作为无线微震传感器网络的核心技术之一,是网络协调运行的关键。首先研究了无线传感器网络时间同步原理及影响同步精度的因素;其次研究了经典无线时间同步协的实现方法;然后仿真对比了传感器网络时间同步协议(Timing-sync P...时间同步技术作为无线微震传感器网络的核心技术之一,是网络协调运行的关键。首先研究了无线传感器网络时间同步原理及影响同步精度的因素;其次研究了经典无线时间同步协的实现方法;然后仿真对比了传感器网络时间同步协议(Timing-sync Protocol for Sensor Networks,TPSN)和泛洪式时间同步协议(Flooding Time Synchronization Protocol,FTSP)的同步精度;再针对FTSP协议的不足提出一种改进的G-FTSP协议,能有效提高无线传感器网络时间同步精度;最后估算由时间同步误差造成的微震震源定位误差,验证G-FTSP协议满足实际生产需求。展开更多
对于用能数据不足的综合能源系统,借助相似系统的丰富数据可以为其建立高精度的多元负荷预测模型,然而,受数据安全等因素的限制,很多系统并不愿意共享自身数据。联邦学习为处理隐私保护下的少数据综合能源多元负荷预测问题提供了一个重...对于用能数据不足的综合能源系统,借助相似系统的丰富数据可以为其建立高精度的多元负荷预测模型,然而,受数据安全等因素的限制,很多系统并不愿意共享自身数据。联邦学习为处理隐私保护下的少数据综合能源多元负荷预测问题提供了一个重要的思路,但是现有方法依然存在相似参与方识别精度不高等不足。鉴于此,本文提出一种融合联邦学习和长短期记忆网络(long short-term memory,LSTM)的少数据综合能源多元负荷预测方法(multitask learning based on shared dot product confidentiality under federated learning,MT-SDPFL)。首先,给出一种基于共享向量点积保密协议的相似参与方识别方法,用来从诸多可用的综合能源系统中选出最为相似的参与方;接着,使用参数共享联邦学习算法对选中的各参与方联合训练,结合LSTM和finetune技术建立每个参与方的多元负荷预测模型。将所提方法应用于多个实际能源系统,实验结果表明,该方法可以在数据稀疏的情况下取得高精度的多源负荷预测结果。展开更多
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for...The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.展开更多
随着电视系统由传统的串行数字接口(Serial Digital Interface,SDI)架构逐渐向网际互连协议(Internet Protocol,IP)架构转变,网络时钟协议(Network Time Protocol,NTP)、精确时间协议(Precision Time Protocol,PTP)、实时传输协议(Real-...随着电视系统由传统的串行数字接口(Serial Digital Interface,SDI)架构逐渐向网际互连协议(Internet Protocol,IP)架构转变,网络时钟协议(Network Time Protocol,NTP)、精确时间协议(Precision Time Protocol,PTP)、实时传输协议(Real-time Transport Protocol,RTP)时间戳(Timestamp)、电影和电视工程师协会(The Society of Motion Picture and Television Engineers,SMPTE)ST 2059等信号取代了传统SDI架构中的黑场(Black Burst,BB)信号,成为IP化电视系统的设备同步、流同步信号。基于此,详细介绍PTP的同步原理、RTP数据包的重要数据格式、RTP时间戳在视音频流同步中的原理及SMPTE ST 2059的定义及相关应用。展开更多
NTP协议(Network Time Protocol)的出现就是为了解决网络内设备系统时钟的同步问题。不幸的是,在通常的互联网环境中,数据传输的延迟不是恒定的,即使相同的路由,从NTP服务器到NTP客户端延迟与从NTP客户端到NTP服务器延迟,即单向延迟(OWD...NTP协议(Network Time Protocol)的出现就是为了解决网络内设备系统时钟的同步问题。不幸的是,在通常的互联网环境中,数据传输的延迟不是恒定的,即使相同的路由,从NTP服务器到NTP客户端延迟与从NTP客户端到NTP服务器延迟,即单向延迟(OWD)不总是相同的。这对时间同步的准确性有很大的影响。目前广泛应用的PTP也同样存在这个问题。因此,为了提高时间的准确性,需要通过测量,提供有关实际传输OWD的时间分布和OWD的不对称性的研究。展开更多
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to...Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.展开更多
Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchro...Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things.展开更多
文摘Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“centralized-distribution”system MAC protocol combined with a slot allocation algorithm.This allows it to quickly adapt to the topology changes in the network and the overall network frame structure.For the centralized time slot allocation,since the system’s frame structure changes across the entire network,the root node must gather information from other nodes.This ensures that the root node can collect the latest topology information when the network topology changes and subsequently adjust the frame structure of the whole network for the distributed time slot allocation.The simulation results show that the adaptive time-division multiple access mechanism can quickly adapt to changes in topology and the network’s frame structure.It enables adaptive changes in node transmission times,ensures the rapid transmission and circulation of large-capacity data between nodes,and improves transmission efficiency.
文摘This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.
基金TheNationalNaturalScienceFoundationofChina (No .6 9984 0 0 3)
文摘The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel.
基金supported by the National Natural Science Foundation of China under Grant No. 61133016
文摘Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes by their mobifity. When multiple coverage holes appear in the sensor network and each of them has a time requirement (in which the coverage hole has to be healed), conflicts for the requests of the same mobile sensor may arise. A distributed multiple mobile sensor schedufing protocol (DMS) is proposed in this paper to solve this problem by finding mobile sensors in the time response zone defined by the time requirement of each coverage hole. Simulation results show that DMS can well schedule the mobile sensors to move to multiple coverage holes within the time requirement.
文摘Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,marginally addresses security aspects,notably not encompassing the frames designed for management purposes(Type Length Values or TLVs).In this work we show that the TLVs can be abused by an attacker to reconfigure,manipulate,or shut down time synchronization.The effects of such an attack can be serious,ranging from interruption of operations to actual unintended behavior of industrial devices,possibly resulting in physical damages or even harm to operators.The paper analyzes the root causes of this vulnerability,and provides concrete examples of attacks leveraging it to de-synchronize the clocks,showing that they can succeed with limited resources,realistically available to a malicious actor.
文摘Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to reduce the cost of nodes,fixed transmitters and receivers are used instead of tunable transmitters and receivers.Two fixed transmitters and many fixed receivers are used in each node in the scheme.The average waiting delay of this scheme is analyzed through mathematics and computer simulation.The result shows that the property of the scheme is almost the same as using tunable transmitter and receiver.Furthermore,if the tuning time of tunable transmitters is taken into account,the performance of the tunable transmitter scheme is poor than this scheme at the average waiting delay and throughput of the network.
文摘在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-Input Multiple-Output,MIMO)技术,提出一套D2D通信与虚拟MIMO技术结合的无中心飞行器集群网络传输方案。重点研究在正交资源模式下,将不同的协作传输协议与空时编码进行组合,在信噪比、误比特率、接入概率等方面对通信性能的影响。仿真结果表明:D2D通信与虚拟MIMO技术结合的传输方案在不增加资源的前提下,对集群网络的通信性能有明显提升,且引入分布式空时编码可进一步优化误比特率性能,但3种传输协议在不同传输质量评价方向的改善有所不同。
文摘时间同步技术作为无线微震传感器网络的核心技术之一,是网络协调运行的关键。首先研究了无线传感器网络时间同步原理及影响同步精度的因素;其次研究了经典无线时间同步协的实现方法;然后仿真对比了传感器网络时间同步协议(Timing-sync Protocol for Sensor Networks,TPSN)和泛洪式时间同步协议(Flooding Time Synchronization Protocol,FTSP)的同步精度;再针对FTSP协议的不足提出一种改进的G-FTSP协议,能有效提高无线传感器网络时间同步精度;最后估算由时间同步误差造成的微震震源定位误差,验证G-FTSP协议满足实际生产需求。
文摘对于用能数据不足的综合能源系统,借助相似系统的丰富数据可以为其建立高精度的多元负荷预测模型,然而,受数据安全等因素的限制,很多系统并不愿意共享自身数据。联邦学习为处理隐私保护下的少数据综合能源多元负荷预测问题提供了一个重要的思路,但是现有方法依然存在相似参与方识别精度不高等不足。鉴于此,本文提出一种融合联邦学习和长短期记忆网络(long short-term memory,LSTM)的少数据综合能源多元负荷预测方法(multitask learning based on shared dot product confidentiality under federated learning,MT-SDPFL)。首先,给出一种基于共享向量点积保密协议的相似参与方识别方法,用来从诸多可用的综合能源系统中选出最为相似的参与方;接着,使用参数共享联邦学习算法对选中的各参与方联合训练,结合LSTM和finetune技术建立每个参与方的多元负荷预测模型。将所提方法应用于多个实际能源系统,实验结果表明,该方法可以在数据稀疏的情况下取得高精度的多源负荷预测结果。
文摘The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.
文摘随着电视系统由传统的串行数字接口(Serial Digital Interface,SDI)架构逐渐向网际互连协议(Internet Protocol,IP)架构转变,网络时钟协议(Network Time Protocol,NTP)、精确时间协议(Precision Time Protocol,PTP)、实时传输协议(Real-time Transport Protocol,RTP)时间戳(Timestamp)、电影和电视工程师协会(The Society of Motion Picture and Television Engineers,SMPTE)ST 2059等信号取代了传统SDI架构中的黑场(Black Burst,BB)信号,成为IP化电视系统的设备同步、流同步信号。基于此,详细介绍PTP的同步原理、RTP数据包的重要数据格式、RTP时间戳在视音频流同步中的原理及SMPTE ST 2059的定义及相关应用。
文摘NTP协议(Network Time Protocol)的出现就是为了解决网络内设备系统时钟的同步问题。不幸的是,在通常的互联网环境中,数据传输的延迟不是恒定的,即使相同的路由,从NTP服务器到NTP客户端延迟与从NTP客户端到NTP服务器延迟,即单向延迟(OWD)不总是相同的。这对时间同步的准确性有很大的影响。目前广泛应用的PTP也同样存在这个问题。因此,为了提高时间的准确性,需要通过测量,提供有关实际传输OWD的时间分布和OWD的不对称性的研究。
基金the National High Technology Development "863" Program of China (2006AA01Z436, 2007AA01Z452)the National Natural Science Foundation of China(60702042).
文摘Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.
基金supported by the Major Research plan of the National Natural Science Foundation of China 9118008National Key Technology R&D Program of the Ministry of Science and Technology 2014BAC16B01
文摘Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things.