从传输成功率、平均传输延迟和路由开销比率三个路由性能指标入手,利用ONE仿真平台仿真并分析了不同网络环境因素对机会网络几种典型路由协议的影响,为不同机会网络环境下路由协议的选取提供依据.仿真结果表明:各路由协议性能差异明显,...从传输成功率、平均传输延迟和路由开销比率三个路由性能指标入手,利用ONE仿真平台仿真并分析了不同网络环境因素对机会网络几种典型路由协议的影响,为不同机会网络环境下路由协议的选取提供依据.仿真结果表明:各路由协议性能差异明显,其中Spray and Wait和MaxProp算法在各种仿真环境下都具有较高的传输成功率,且Spray and Wait算法路由开销比率较低.展开更多
In response to the deficiencies of BitTorrent, the concept of density radius was proposed, and the distance from the maximum point of radius density to cluster center as a cluster radius was taken to solve the too lar...In response to the deficiencies of BitTorrent, the concept of density radius was proposed, and the distance from the maximum point of radius density to cluster center as a cluster radius was taken to solve the too large cluster radius resulted from the discrete points and to reduce the false positive rate of early recognition algorithms. Simulation results show that in the actual network environment, the improved algorithm, compared with K-means, will reduce the false positive rate of early identification algorithm from 6.3% to 0.9% and has a higher operational efficiency.展开更多
Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for int...Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for intrusion detection system in IEC 61850 standard-based substation automation system is provided to test simulated attacks on IEDs (intelligent electronic devices). Intrusion detection is the process of detecting malicious attacker, so it is an effective and mature security mechanism to protect electrical facility. However, it is not harnessed when securing IEC 61850 automated substation. To prove the detection capability of the system testing environment was developed to analyze and test attacks simulated with different test cases. It shows that the simulation environment works accordingly to various network traffic scenarios and eventually proves the functionality of intrusion detection system to be later deployed in the real IEC 61850 based substation automation system site.展开更多
文摘从传输成功率、平均传输延迟和路由开销比率三个路由性能指标入手,利用ONE仿真平台仿真并分析了不同网络环境因素对机会网络几种典型路由协议的影响,为不同机会网络环境下路由协议的选取提供依据.仿真结果表明:各路由协议性能差异明显,其中Spray and Wait和MaxProp算法在各种仿真环境下都具有较高的传输成功率,且Spray and Wait算法路由开销比率较低.
基金Project(2011FJ3034) supported by the Planned Science and Technology Program of Hunan Province, ChinaProject(61070194) supported by the National Natural Science Foundation of China
文摘In response to the deficiencies of BitTorrent, the concept of density radius was proposed, and the distance from the maximum point of radius density to cluster center as a cluster radius was taken to solve the too large cluster radius resulted from the discrete points and to reduce the false positive rate of early recognition algorithms. Simulation results show that in the actual network environment, the improved algorithm, compared with K-means, will reduce the false positive rate of early identification algorithm from 6.3% to 0.9% and has a higher operational efficiency.
文摘Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for intrusion detection system in IEC 61850 standard-based substation automation system is provided to test simulated attacks on IEDs (intelligent electronic devices). Intrusion detection is the process of detecting malicious attacker, so it is an effective and mature security mechanism to protect electrical facility. However, it is not harnessed when securing IEC 61850 automated substation. To prove the detection capability of the system testing environment was developed to analyze and test attacks simulated with different test cases. It shows that the simulation environment works accordingly to various network traffic scenarios and eventually proves the functionality of intrusion detection system to be later deployed in the real IEC 61850 based substation automation system site.