期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
VSAT卫星通信系统在长庆气田卫星通信网中的应用
1
作者 方俊 《中国无线通信》 2003年第1期35-36,共2页
卫星通信具有通信范围广、维护成本低、施工简单和便于搬迁的特点,是现代通信的重要手段。近年来,随着广播电视、股市证券、银行业、航空业的快速发展,卫星通信的应用越来越广泛。卫星通信具有其它通信方式所不能比拟的优点。
关键词 VSAT系统 卫星通信系统 长庆气田 全网状网 单跳特性 DAMA技术 SCPC系统 TDMA模式 链路控制 配置
下载PDF
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
2
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 game theory intrusion detection model WMNS
下载PDF
The Study on Wireless Mesh Networks Security based on Improved Coding Scheme
3
作者 He Rongyi 《International English Education Research》 2014年第3期134-136,共3页
In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect fi'om multiple failures in... In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect fi'om multiple failures in wireless mesh networks to achieve high throughput where the redundancy is considered for the average number of failures. Our coding scheme is designed to protect fi'om the average number of failures to increase the network throughput. When the number of failures is more than the average case, the destination will have to walt for more coded packets in the following time slots. 展开更多
关键词 Network Security link failure survivability.
下载PDF
A secure routing scheme based on social network analysis in wireless mesh networks 被引量:2
4
作者 Yao YU Zhaolong NING Lei GUO 《Science China Earth Sciences》 SCIE EI CAS CSCD 2016年第12期139-150,共12页
As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guara... As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node's routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved. 展开更多
关键词 wireless mesh networks node selfish social network analysis secure routing Markov chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部