期刊文献+
共找到569篇文章
< 1 2 29 >
每页显示 20 50 100
Research on Multiple Access Algorithms for Wireless Network
1
作者 Kaifeng Yao 《Journal of Electronic Research and Application》 2024年第4期55-63,共9页
Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“ce... Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“centralized-distribution”system MAC protocol combined with a slot allocation algorithm.This allows it to quickly adapt to the topology changes in the network and the overall network frame structure.For the centralized time slot allocation,since the system’s frame structure changes across the entire network,the root node must gather information from other nodes.This ensures that the root node can collect the latest topology information when the network topology changes and subsequently adjust the frame structure of the whole network for the distributed time slot allocation.The simulation results show that the adaptive time-division multiple access mechanism can quickly adapt to changes in topology and the network’s frame structure.It enables adaptive changes in node transmission times,ensures the rapid transmission and circulation of large-capacity data between nodes,and improves transmission efficiency. 展开更多
关键词 TDMA Wireless network MAC protocol time gap allocation
下载PDF
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
2
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor network REAL-time Routing Protocol Contention-Based Scheme Beaconless
下载PDF
A new real-time ethernet MAC protocol for time-critical applications 被引量:1
3
作者 沈钢 许晓鸣 +2 位作者 蔡云泽 何星 张卫东 《Journal of Central South University of Technology》 EI 2002年第1期54-58,共5页
The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol ... The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel. 展开更多
关键词 real time ETHERNET multiple access protocol industrial control networks
下载PDF
Distributed In-Time Multiple Coverage Holes Healing Protocol
4
作者 Lin-Na Wei Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2012年第2期185-191,共7页
Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes... Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes by their mobifity. When multiple coverage holes appear in the sensor network and each of them has a time requirement (in which the coverage hole has to be healed), conflicts for the requests of the same mobile sensor may arise. A distributed multiple mobile sensor schedufing protocol (DMS) is proposed in this paper to solve this problem by finding mobile sensors in the time response zone defined by the time requirement of each coverage hole. Simulation results show that DMS can well schedule the mobile sensors to move to multiple coverage holes within the time requirement. 展开更多
关键词 Coverage bole distributed protocol mobile sensor dispatch sensor network time limited.
下载PDF
Time sensitive networking security:issues of precision time protocol and its implementation 被引量:1
5
作者 Davide Berardi Nils OTippenhauer +2 位作者 Andrea Melis Marco Prandini Franco Callegati 《Cybersecurity》 EI CSCD 2023年第4期1-13,共13页
Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,margi... Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,marginally addresses security aspects,notably not encompassing the frames designed for management purposes(Type Length Values or TLVs).In this work we show that the TLVs can be abused by an attacker to reconfigure,manipulate,or shut down time synchronization.The effects of such an attack can be serious,ranging from interruption of operations to actual unintended behavior of industrial devices,possibly resulting in physical damages or even harm to operators.The paper analyzes the root causes of this vulnerability,and provides concrete examples of attacks leveraging it to de-synchronize the clocks,showing that they can succeed with limited resources,realistically available to a malicious actor. 展开更多
关键词 time synchronization time sensitive networking Precision time protocol Cybersecurity attacks
原文传递
An Arrangement of Channels and Transceivers in Optical Packet Switching Networks
6
作者 Ming Hu 《Journal of Electronic Science and Technology of China》 2008年第1期5-9,共5页
Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to r... Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to reduce the cost of nodes,fixed transmitters and receivers are used instead of tunable transmitters and receivers.Two fixed transmitters and many fixed receivers are used in each node in the scheme.The average waiting delay of this scheme is analyzed through mathematics and computer simulation.The result shows that the property of the scheme is almost the same as using tunable transmitter and receiver.Furthermore,if the tuning time of tunable transmitters is taken into account,the performance of the tunable transmitter scheme is poor than this scheme at the average waiting delay and throughput of the network. 展开更多
关键词 Dense wavelength division multiplexing(DWDM) media access and control (MAC) protocol optical packet switching network transmitter and receiverarrangement tuning time.
下载PDF
基于D2D通信和虚拟MIMO的飞行器集群网络传输方案设计
7
作者 刘志峰 张雪 +4 位作者 栗苹 张继豪 李思琪 王卫东 龚鹏 《兵工学报》 EI CAS CSCD 北大核心 2024年第4期1141-1147,共7页
在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-I... 在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-Input Multiple-Output,MIMO)技术,提出一套D2D通信与虚拟MIMO技术结合的无中心飞行器集群网络传输方案。重点研究在正交资源模式下,将不同的协作传输协议与空时编码进行组合,在信噪比、误比特率、接入概率等方面对通信性能的影响。仿真结果表明:D2D通信与虚拟MIMO技术结合的传输方案在不增加资源的前提下,对集群网络的通信性能有明显提升,且引入分布式空时编码可进一步优化误比特率性能,但3种传输协议在不同传输质量评价方向的改善有所不同。 展开更多
关键词 飞行器集群网络 终端直通通信 虚拟多输入多输出 协作传输协议 空时编码
下载PDF
基于ARIMA-TCN混合模型的高速铁路时间同步方法
8
作者 陈永 詹芝贤 张薇 《铁道学报》 EI CAS CSCD 北大核心 2024年第6期90-100,共11页
列控系统作为高速铁路的核心系统,保持其系统的时间同步对于行车安全至关重要。针对现有时间同步方法易受时变上下行传输时延、随机时钟跳变等影响,导致主从时钟偏移估计不准确的问题,提出一种基于差分自回归移动平均-时域卷积神经网络(... 列控系统作为高速铁路的核心系统,保持其系统的时间同步对于行车安全至关重要。针对现有时间同步方法易受时变上下行传输时延、随机时钟跳变等影响,导致主从时钟偏移估计不准确的问题,提出一种基于差分自回归移动平均-时域卷积神经网络(ARIMA-TCN)混合模型的高速铁路时间同步方法。首先,根据上下行链路传输速率的不对称比,建立高速铁路时钟的数学理论和实际观测模型。然后,使用拉依达准则识别处理跳变异常值,完成实际时间序列的预处理。再次,使用ARIMA模型平滑时间序列中不确定时延带来的噪声抖动,获得平稳的时间序列。最后,通过提出的注意力增强TCN模型进行预测补偿,完成时钟偏移的补偿校正。通过实验仿真,得到基站区间内位置、基站间距以及车速对高速铁路时间同步的影响性分析。实验结果表明:与对比方法相比,所提方法补偿后的均方根误差较最小二乘法减少了75%、较最大似然估计方法误差减少了44.4%,较BP神经网络方法误差减少了16.7%,验证所提方法具有更低的同步误差和更高的同步精度。 展开更多
关键词 时间同步 精确时钟协议 差分自回归移动平均模型 注意力增强时域卷积网络 时间补偿
下载PDF
基于DRL的定向网络时隙复用和功率控制协议
9
作者 梁仕杰 赵海涛 +3 位作者 张姣 王海军 魏急波 王俊芳 《信号处理》 CSCD 北大核心 2024年第7期1341-1353,共13页
近年来,无人机网络逐渐地广泛应用于各行各业,对无人机网络能提供的网络容量提出了更高的要求。定向天线结合无人机网络构成定向无人机网络以增加网络资源应对无人机网络中各个节点对网络有限通信资源的竞争造成网络容量低的问题。定向... 近年来,无人机网络逐渐地广泛应用于各行各业,对无人机网络能提供的网络容量提出了更高的要求。定向天线结合无人机网络构成定向无人机网络以增加网络资源应对无人机网络中各个节点对网络有限通信资源的竞争造成网络容量低的问题。定向无人机网络通过定向天线的空间复用能力可以提高网络的时隙利用效率。针对TDMA协议在定向组网中时隙利用率过低导致网络容量受限的问题,该文提出了一种基于深度Q网络(DQN)的定向无人机网络时隙复用和功率控制协议。为了提高时隙利用率,考虑在单位时隙进行多个链路通信以实现时隙资源的复用。然而多个链路在同一个时隙通信会产生链路间的干扰,如何在考虑链路间相互干扰的情况下控制功率提高网络的容量是时隙复用研究的重点问题。为了解决该问题,首先考虑以功率要求和每条链路最小信道容量为约束,考虑相较于其他研究更为复杂更符合实际的链路互干扰模型,建模问题为最大全网容量问题。然后为了构建链路间的更复杂的互干扰环境,将多个链路的瞬时信道信息、定向增益状态融入到DQN框架的状态中,DQN的奖励为高于最小信道容量的链路信道容量的和。最后,将每个时隙的优化问题扩展到每一帧的优化问题,并利用多个DQN进行求解。仿真结果表明,在保证每个被分配时隙的最小信道容量前提下,相较于对比方法网络容量有了很大的提升。 展开更多
关键词 时分多址协议 定向无人机网络 深度Q网络 时隙复用 功率控制
下载PDF
海洋跨介质通信自组网络设计与实现
10
作者 王霁远 吕婷婷 +2 位作者 崔家琦 要雨函 张岩 《移动通信》 2024年第11期98-108,共11页
世界各国在海洋资源开发、环境监测、搜索救援、协同巡查等领域的活动日益增频繁,加剧了对海洋跨介质通信的需求。设计了一种基于海上浮标的海洋分布式跨介质通信网络,融合水声、无线电、卫星通信等多种通信手段于一体,通过无线电自组... 世界各国在海洋资源开发、环境监测、搜索救援、协同巡查等领域的活动日益增频繁,加剧了对海洋跨介质通信的需求。设计了一种基于海上浮标的海洋分布式跨介质通信网络,融合水声、无线电、卫星通信等多种通信手段于一体,通过无线电自组网实现局部立体海域的通信覆盖,为水下用户提供互联互通以及与陆网联通的通用接口。重点研究了跨介质通信网络体系,设计了面向海洋复杂环境的网络通信协议及路由算法,并搭建原型网络,开展网络覆盖范围、吞吐率等关键指标的海试验证。经测试,该网络能够实现局部立体海域的准实时通信,由3节点组成的跨介质通信网络能够提供3kbps半径6.6km的吞吐量及海面覆盖范围。 展开更多
关键词 跨介质通信 Mesh自组网络 准实时 通信协议 路由算法
下载PDF
无线微震传感器网络高精度时间同步技术研究 被引量:1
11
作者 王盛 张达 冀虎 《有色金属(矿山部分)》 2024年第3期70-78,共9页
时间同步技术作为无线微震传感器网络的核心技术之一,是网络协调运行的关键。首先研究了无线传感器网络时间同步原理及影响同步精度的因素;其次研究了经典无线时间同步协的实现方法;然后仿真对比了传感器网络时间同步协议(Timing-sync P... 时间同步技术作为无线微震传感器网络的核心技术之一,是网络协调运行的关键。首先研究了无线传感器网络时间同步原理及影响同步精度的因素;其次研究了经典无线时间同步协的实现方法;然后仿真对比了传感器网络时间同步协议(Timing-sync Protocol for Sensor Networks,TPSN)和泛洪式时间同步协议(Flooding Time Synchronization Protocol,FTSP)的同步精度;再针对FTSP协议的不足提出一种改进的G-FTSP协议,能有效提高无线传感器网络时间同步精度;最后估算由时间同步误差造成的微震震源定位误差,验证G-FTSP协议满足实际生产需求。 展开更多
关键词 微震监测 无线传感器网络 时间同步协议 RBS TPSN FTSP 高精度
下载PDF
隐私保护下融合联邦学习和LSTM的少数据综合能源多元负荷预测 被引量:1
12
作者 陈志鹏 张勇 +2 位作者 高海荣 孙晓燕 胡荷娟 《智能系统学报》 CSCD 北大核心 2024年第3期565-574,共10页
对于用能数据不足的综合能源系统,借助相似系统的丰富数据可以为其建立高精度的多元负荷预测模型,然而,受数据安全等因素的限制,很多系统并不愿意共享自身数据。联邦学习为处理隐私保护下的少数据综合能源多元负荷预测问题提供了一个重... 对于用能数据不足的综合能源系统,借助相似系统的丰富数据可以为其建立高精度的多元负荷预测模型,然而,受数据安全等因素的限制,很多系统并不愿意共享自身数据。联邦学习为处理隐私保护下的少数据综合能源多元负荷预测问题提供了一个重要的思路,但是现有方法依然存在相似参与方识别精度不高等不足。鉴于此,本文提出一种融合联邦学习和长短期记忆网络(long short-term memory,LSTM)的少数据综合能源多元负荷预测方法(multitask learning based on shared dot product confidentiality under federated learning,MT-SDPFL)。首先,给出一种基于共享向量点积保密协议的相似参与方识别方法,用来从诸多可用的综合能源系统中选出最为相似的参与方;接着,使用参数共享联邦学习算法对选中的各参与方联合训练,结合LSTM和finetune技术建立每个参与方的多元负荷预测模型。将所提方法应用于多个实际能源系统,实验结果表明,该方法可以在数据稀疏的情况下取得高精度的多源负荷预测结果。 展开更多
关键词 多元负荷预测 综合能源系统 联邦学习 隐私保护 神经网络 少数据 时序数据预测 点积协议
下载PDF
Cloud control for IIoT in a cloud-edge environment
13
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial Internet of Things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
下载PDF
基于时间敏感网络的列车通信网络研究及应用
14
作者 齐玉玲 黄涛 +5 位作者 张军贤 贾焱鑫 徐龙 熊伟 朱海龙 彭开来 《城市轨道交通研究》 北大核心 2024年第5期184-189,共6页
[目的]TCN(列车通信网络)拓扑结构复杂而且对传输实时性要求较高,目前列车数据传输主要采用TRDP(列车实时数据协议)进行承载,但会存在网络时延不确定的问题,故研究采用TSN(时间敏感网络)保证数据传输的有界时延,来解决TCN面临的以上问题... [目的]TCN(列车通信网络)拓扑结构复杂而且对传输实时性要求较高,目前列车数据传输主要采用TRDP(列车实时数据协议)进行承载,但会存在网络时延不确定的问题,故研究采用TSN(时间敏感网络)保证数据传输的有界时延,来解决TCN面临的以上问题。[方法]提出了TTAM(一种TRDP与TSN自适应的方法),以实现TRDP与TSN的协议转换,保证列车数据在网络中传输的时间确定性。[结果及结论]通过搭建TSN测试台,对TSN网络功能及性能(IEEE 802.1 AS与IEEE 802.1 Qbv协议)进行测试,验证了TTAM在TSN技术应用中的有效性。 展开更多
关键词 列车通信网络 时间敏感网络 列车实时数据协议
下载PDF
变电站站内防误系统无线组网设计
15
作者 费腾蛟 杨建旭 +2 位作者 华雄 童旸 张可 《电力信息与通信技术》 2024年第7期75-81,共7页
为实现将防误系统中依赖4G的外网数据交互替换为基于LoRa的自组网通信,文章设计站内无线网络解决方案,在兼容输变电物联网传感器监测应用基础上实现站内自组网,包括网络架构设计及终端入网通信,将防误终端集成到传感器监测网络。针对原... 为实现将防误系统中依赖4G的外网数据交互替换为基于LoRa的自组网通信,文章设计站内无线网络解决方案,在兼容输变电物联网传感器监测应用基础上实现站内自组网,包括网络架构设计及终端入网通信,将防误终端集成到传感器监测网络。针对原有物联网协议的传感器监测设计,以及手持控制终端接入时的传输实时性差、频点切换慢的问题,设计优化方案,在传感器采用竞争时隙的同时,引入操作终端固定时隙预分配方案,提高数据交互效率,并通过同步扫描设计实现移动作业频点自适应切换。验证结果表明,所提系统可在兼容输变电物联网监测方案基础上,满足防误系统的实时性控制类作业应用。 展开更多
关键词 防误系统 LoRa组网 组网协议 时隙分配 频点切换
下载PDF
IP时代的电视系统同步技术综述
16
作者 王琨 李上 段晓峰 《电视技术》 2024年第7期168-173,共6页
随着电视系统由传统的串行数字接口(Serial Digital Interface,SDI)架构逐渐向网际互连协议(Internet Protocol,IP)架构转变,网络时钟协议(Network Time Protocol,NTP)、精确时间协议(Precision Time Protocol,PTP)、实时传输协议(Real-... 随着电视系统由传统的串行数字接口(Serial Digital Interface,SDI)架构逐渐向网际互连协议(Internet Protocol,IP)架构转变,网络时钟协议(Network Time Protocol,NTP)、精确时间协议(Precision Time Protocol,PTP)、实时传输协议(Real-time Transport Protocol,RTP)时间戳(Timestamp)、电影和电视工程师协会(The Society of Motion Picture and Television Engineers,SMPTE)ST 2059等信号取代了传统SDI架构中的黑场(Black Burst,BB)信号,成为IP化电视系统的设备同步、流同步信号。基于此,详细介绍PTP的同步原理、RTP数据包的重要数据格式、RTP时间戳在视音频流同步中的原理及SMPTE ST 2059的定义及相关应用。 展开更多
关键词 网络时钟协议(NTP) 精确时间协议(PTP) 实时传输协议(RTP)
下载PDF
转播车电视节目录制系统的IP化应用
17
作者 谭光伟 《电视技术》 2024年第8期219-223,共5页
针对转播车电视节目录制系统面临的节目信源多样化和网络化现状,分析比较ST 2110、实时消息传输协议(Real Time Messaging Protocol,RTMP)、安全可靠传输(Secure Reliable Transport,SRT)、网络设备接口(Network Device Interface,NDI)... 针对转播车电视节目录制系统面临的节目信源多样化和网络化现状,分析比较ST 2110、实时消息传输协议(Real Time Messaging Protocol,RTMP)、安全可靠传输(Secure Reliable Transport,SRT)、网络设备接口(Network Device Interface,NDI)等主流网际互连协议(Internet Protocol,IP)信号格式中节目信号传输和切换层面的技术差异,结合转播车电视节目录制系统的IP化技术应用实践,提出对IP流信号传输、调度的应用方案。 展开更多
关键词 ST 2110 网络设备接口(NDI) 安全可靠传输(SRT) 实时消息传输协议(RTMP) 信号调度
下载PDF
测量互联网环境的单向延迟及不对称性研究
18
作者 吴承治 《现代传输》 2024年第1期56-63,共8页
NTP协议(Network Time Protocol)的出现就是为了解决网络内设备系统时钟的同步问题。不幸的是,在通常的互联网环境中,数据传输的延迟不是恒定的,即使相同的路由,从NTP服务器到NTP客户端延迟与从NTP客户端到NTP服务器延迟,即单向延迟(OWD... NTP协议(Network Time Protocol)的出现就是为了解决网络内设备系统时钟的同步问题。不幸的是,在通常的互联网环境中,数据传输的延迟不是恒定的,即使相同的路由,从NTP服务器到NTP客户端延迟与从NTP客户端到NTP服务器延迟,即单向延迟(OWD)不总是相同的。这对时间同步的准确性有很大的影响。目前广泛应用的PTP也同样存在这个问题。因此,为了提高时间的准确性,需要通过测量,提供有关实际传输OWD的时间分布和OWD的不对称性的研究。 展开更多
关键词 网络时间协议 单向延迟 硬件时间戳 单向延迟不对称性
下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:7
19
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
下载PDF
Practical Timing Synchronization for Network Dynamics in Large Machine-to-Machine Networks
20
作者 Lei Gu Shih-Chun Lin 《China Communications》 SCIE CSCD 2016年第10期160-168,共9页
Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchro... Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things. 展开更多
关键词 timing synchronization network dynamics graph Laplacian matrix distributed protocol internet of things(IoTs) machine-to-machine(M2M) communications
下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部