期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于群集移动节点的切换算法 被引量:1
1
作者 吕莎莎 孙建伟 +1 位作者 贾军营 于波 《计算机应用》 CSCD 北大核心 2011年第12期3219-3222,3229,共5页
无线蜂窝网的信号切换依赖IP层的移动切换,IETF提出的代理移动IPv6(PMIPv6)协议可以保证移动终端应用IPv6网的快速切换,但是它在切换时延方面仍然无法保证实时通信的服务质量。研究基于PMIPv6协议,提出群集移动节点(CMN)算法,应用媒体... 无线蜂窝网的信号切换依赖IP层的移动切换,IETF提出的代理移动IPv6(PMIPv6)协议可以保证移动终端应用IPv6网的快速切换,但是它在切换时延方面仍然无法保证实时通信的服务质量。研究基于PMIPv6协议,提出群集移动节点(CMN)算法,应用媒体无关切换(MIH)技术,减少了大量移动节点,同时提出切换请求时系统时延增大的问题,扩展原始代理绑定更新消息结构(A-PBU)。最后模拟网络模型和节点移动模型,从切换时延方面分析算法的有效性。实验结果表明,系统应用CMN算法与原始切换算法相比可以大大降低切换时延。 展开更多
关键词 代理移动IPV6 媒体无关切换 群集移动节点 扩展代理绑定更新 切换时延
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
2
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部