期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
D-S Evidence Theory Based Trust Ant Colony Routing in WSN 被引量:3
1
作者 Ziwen Sun Zhiwei Zhang +1 位作者 Cheng Xiao Gang Qu 《China Communications》 SCIE CSCD 2018年第3期27-41,共15页
This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor ne... This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes. 展开更多
关键词 wireless sensor networks antcolony routing trust evaluation model D-Sevidence theory ns2 simulation
下载PDF
Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks
2
作者 Mohammed-Alamine El Houssaini Abdessadek Aaroud +1 位作者 Ali El Hore Jalel Ben-Othman 《Computer Technology and Application》 2015年第1期37-44,共8页
This work presents a multi-criteria analysis of the MAC (media access control) layer misbehavior of the IEEE (Institute of Electrical and Electronics Engineers) 802.11 standard, whose principle is to cheat at the ... This work presents a multi-criteria analysis of the MAC (media access control) layer misbehavior of the IEEE (Institute of Electrical and Electronics Engineers) 802.11 standard, whose principle is to cheat at the protocol to increase the transmission rate by greedy nodes at the expense of the other honest nodes. In fact, IEEE 802.11 forces nodes for access to the channel to wait for a back off interval, randomly selected from a specified range, before initiating a transmission. Greedy nodes may wait for smaller back-off intervals than honest nodes, and then obtaining an unfair assignment. In the first of our works a state of art on the research on IEEE 802.11 MAC layer misbehavior are presented. Then the impact of this misbehavior at the reception is given, and we will generalize this impact on a large scale. An analysis of the correlation between the throughput and the inter-packets time is given. Afterwards, we will define a new metric for measuring the performance and capability of the network. 展开更多
关键词 Mobile ad-hoc networks MAC IEEE 802.11 misbehavior ns2 simulations.
下载PDF
Redundancy Elimination in GPRS network 被引量:3
3
作者 QIU Qin-long ZHANG Dong-mei +1 位作者 MA Jian ZHANG Da-jiang 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期477-482,共6页
The mechanisms of TCP’s retransmission and reset will result in redundant packets. These redundant packets are often sent unnecessarily to the user over a slow last-hop link delaying useful traffic. This is a problem... The mechanisms of TCP’s retransmission and reset will result in redundant packets. These redundant packets are often sent unnecessarily to the user over a slow last-hop link delaying useful traffic. This is a problem for wide-area wireless links, such as General Packet Radio Service (GPRS), because unnecessary transmissions waste already limited radio bandwidth, battery power at the mobile terminal and incurs monetary cost due to charging by data volume. The paper first describes a GPRS model, then discusses how to eliminate the redundant packets in GPRS network and presents the simulation results in Network Simulation 2 (NS 2). The more traffic is, the more the network can benefit. In heavy traffic, it can even get more than 30% improvement in throughput. Average delay and loss percent are also lowered. 展开更多
关键词 GPRS TCP Redundancy Elimination Network simulation 2 (NS 2)
下载PDF
Game Theoretic Simulation on the Mimicry Honeypot
4
作者 SHI Leyi ZHAO Junnan +3 位作者 JIANG Lanlan XING Wenjuan GONG Jian LIU Xin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期69-74,共6页
A mimicry honeypot framework based on game theory is presented in our work, which can calculate the equilibrium strategy of the deceptive game using non-cooperative incomplete dynamic game theory, and make decisions f... A mimicry honeypot framework based on game theory is presented in our work, which can calculate the equilibrium strategy of the deceptive game using non-cooperative incomplete dynamic game theory, and make decisions for the mimicry framework to deploy the simple service, the honeypot and the fake honeypot. A mimicry prototype is implemented using NS2 platform, and simulation experiments are launched to validate the decision-making result and the deceptive performance of the mimicry honeypot. The empirical study shows that the mimicry honeypot framework based on game theory can be able to influence the equilibrium strategy results by dynamically changing the deployment vector of the mimicry system. It validates that the mimicry honeypot framework has better flexibility, activeness and fraudulence than the traditional honeypot. 展开更多
关键词 HONEYPOT mimicry honeypot game theory EQUILIBRIUM Network Simulator 2 ns2
原文传递
Performance Comparison and Analysis of IP and MPLS Networks 被引量:3
5
作者 LIU Er wu, CAO Ming cui, CHEN Chun han, LI Feng (State Key Laboratory of Laser Technology, Huazhong University of Science and Technology, Wuhan 430074, P.R.China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2001年第2期16-20,共5页
With the increasing need for Quality of Service( QoS ),the traditional IP network is becoming less competitive. In order to give readers quantitative and convictive performance comparisons between IP and M... With the increasing need for Quality of Service( QoS ),the traditional IP network is becoming less competitive. In order to give readers quantitative and convictive performance comparisons between IP and MPLS network,we choose Berkeleys NS 2 simulator [1] in our research on network throughput and end to end TCP behavior. Using NS 2 simulator,we analyze the performance of a network with MPLS Traffic Engineering( MPLS TE ).Specifically,the throughput and TCP end to end delay time under two different queuing algorithms are obtained and compared between the MPLS network and traditional IP network. We find that in the IP network using SFQ queuing algorithm will help traffic balance compared to the simple FIFO scheme,but it still can not utilize the available bandwidth,which in turn leads to the poor performance as in the FIFO case.With MPLS TE , the throughput will be higher and the end to end TCP delay time remains almost the same even in heavy load case.We notice that if flows are isolated partially,using SFQ scheme will have a comparable performance as the fully isolation case using FIFO scheme in a MPLS network,and that if flows are isolated fully for FIFO and SFQ schemes,both will have the same result.Finally,we conclude that a better queuing algorithm will help reduce the label space requirement. 展开更多
关键词 quality of service NS 2 simulator MPLS traffice engineering SFQ FIFO
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部