期刊文献+
共找到34篇文章
< 1 2 >
每页显示 20 50 100
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
1
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 Internet of Things IPv6 over low power wireless personal area networks Routing Protocol for Low-Power and Lossy networks Internet Protocol Version 6 distributed denial of service wireless sensor networks
下载PDF
Radio-Acoustic Integrated Network for Ocean Information Transmission:Framework and Enabling Technologies 被引量:4
2
作者 Fangjiong Chen Zilong Jiang +3 位作者 Fei Ji Hua Yu Quansheng Guan Feng Liu 《China Communications》 SCIE CSCD 2021年第9期62-70,共9页
An important vision of next generation mobile system is to provide global internet access.The Space-Terrestrial Integrated Network(STIN)has been proposed and intensively studied to tackle this challenge.Due to the sev... An important vision of next generation mobile system is to provide global internet access.The Space-Terrestrial Integrated Network(STIN)has been proposed and intensively studied to tackle this challenge.Due to the severe attenuation of radio signals in water,the STIN cannot be directly applied in underwater scenarios.In this paper we envision a framework of integrated radio-acoustic network arming at high-efficient data transmission in underwater scenarios,where acoustic signal is for underwater communication and radio signal is for surface and air communications.Since radio links have much higher data transmission rate and lower delay,in the integrated radio-acoustic network,the acoustic links easily become congested,at the same time the radio links are not fully utilized.We therefore propose that the integrated radio-acoustic network should be properly designed to minimize the hop count of acoustic links,as well as the signaling overhead in the acoustic subnetwork.We then present a novel network framework and the relative technologies to help moving the signaling overhead to the radio subnetwork. 展开更多
关键词 integrated network acoustic communication network protocols ocean engineering
下载PDF
Dynamic Routing Protocol for Computer Networkswith Clustering Topology 被引量:2
3
作者 Li, Layuan Li, Chunlin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第1期44-53,共10页
This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering... This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology. 展开更多
关键词 Computational complexity Computer simulation Dynamic programming network protocols TOPOLOGY
下载PDF
Virtual reality mobility model for wireless ad hoc networks 被引量:1
4
作者 Yu Ziyue Gong Bo He Xingui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期819-826,共8页
For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle en... For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols. 展开更多
关键词 wireless ad hoc networks computer simulation network protocols mobility models
下载PDF
Quantum key distribution series network protocol with M-classical Bobs 被引量:3
5
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
下载PDF
Modeling and Simulation of P-Aloha,CSMA /CA and MACAW Protocols for Underwater Acoustic Channel 被引量:1
6
作者 DAO Van-phuong 左加阔 +3 位作者 赵力 NGUYEN Dang-nam 邹采荣 孙剑 《Journal of Donghua University(English Edition)》 EI CAS 2015年第1期35-40,共6页
Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks ... Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation. 展开更多
关键词 underwater acoustic channel OPNET simulation medium access control(MAC) protocol pure Aloha(P-Aloha) protocol carrier sense multiple access with collision avoidance(CSMA /CA) protocol multiple access collision avoidance for wireless local area network(MACAW) protocol
下载PDF
Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis
7
作者 Joo-Chan Lee Hyun-Pyo Choi +4 位作者 Jang-Hoon Kim Jun-Won Kim Da-Un Jung Ji-Ho Shin Jung-Taek Seo 《Computers, Materials & Continua》 SCIE EI 2020年第10期53-67,共15页
Cyberattacks on the Industrial Control System(ICS)have recently been increasing,made more intelligent by advancing technologies.As such,cybersecurity for such systems is attracting attention.As a core element of contr... Cyberattacks on the Industrial Control System(ICS)have recently been increasing,made more intelligent by advancing technologies.As such,cybersecurity for such systems is attracting attention.As a core element of control devices,the Programmable Logic Controller(PLC)in an ICS carries out on-site control over the ICS.A cyberattack on the PLC will cause damages on the overall ICS,with Stuxnet and Duqu as the most representative cases.Thus,cybersecurity for PLCs is considered essential,and many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of preemptive efforts against attacks.In this study,a vulnerability analysis was conducted on the XGB PLC.Security vulnerabilities were identified by analyzing the network protocols and memory structure of PLCs and were utilized to launch replay attack,memory modulation attack,and FTP/Web service account theft for the verification of the results.Based on the results,the attacks were proven to be able to cause the PLC to malfunction and disable it,and the identified vulnerabilities were defined. 展开更多
关键词 Industrial control system programmable logic controller CYBERSECURITY network protocol VULNERABILITY
下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
8
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc... Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%. 展开更多
关键词 Internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
下载PDF
S-MAC Protocol of Wireless Sensor Network
9
作者 Jiang Xue (Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2007年第3期44-47,共4页
Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Ac... Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Access Control (S-MAC) protocol improves energy efficiency and latency in the network. There are mainly two methods to enhance the S-MAC protocol: dynamic adjustment,and sending control and data packets under different transport conditions. For the wireless sensor network,it is not realistic to design one MAC protocol that meets all requirements of every aspect; however,it is possible to design corresponding protocols in accordance with different requirements by flexibly adopting different methods. 展开更多
关键词 MAC S-MAC Protocol of Wireless Sensor network NODE
下载PDF
An Arrangement of Channels and Transceivers in Optical Packet Switching Networks
10
作者 Ming Hu 《Journal of Electronic Science and Technology of China》 2008年第1期5-9,共5页
Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to r... Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to reduce the cost of nodes,fixed transmitters and receivers are used instead of tunable transmitters and receivers.Two fixed transmitters and many fixed receivers are used in each node in the scheme.The average waiting delay of this scheme is analyzed through mathematics and computer simulation.The result shows that the property of the scheme is almost the same as using tunable transmitter and receiver.Furthermore,if the tuning time of tunable transmitters is taken into account,the performance of the tunable transmitter scheme is poor than this scheme at the average waiting delay and throughput of the network. 展开更多
关键词 Dense wavelength division multiplexing(DWDM) media access and control (MAC) protocol optical packet switching network transmitter and receiverarrangement tuning time.
下载PDF
IoT data analytic algorithms on edge-cloud infrastructure:A review
11
作者 Abel E.Edje M.S.Abd Latiff Weng Howe Chan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1486-1515,共30页
The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massiv... The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massive data stream to edge devices and the cloud for adequate storage and processing.This further leads to the challenges of data outliers,data redundancies,and cloud resource load balancing that would affect the execution and outcome of data streams.This paper presents a review of existing analytics algorithms deployed on IoT-enabled edge cloud infrastructure that resolved the challenges of data outliers,data redundancies,and cloud resource load balancing.The review highlights the problems solved,the results,the weaknesses of the existing algorithms,and the physical and virtual cloud storage servers for resource load balancing.In addition,it discusses the adoption of network protocols that govern the interaction between the three-layer architecture of IoT sensing devices enabled edge cloud and its prevailing challenges.A total of 72 algorithms covering the categories of classification,regression,clustering,deep learning,and optimization have been reviewed.The classification approach has been widely adopted to solve the problem of redundant data,while clustering and optimization approaches are more used for outlier detection and cloud resource allocation. 展开更多
关键词 Internet of things Cloud platform Edge Analytic algorithms Processes network communication protocols
下载PDF
Performance improvement of licklider transmission protocol in complex deep space networks based on parameter optimization
12
作者 Guo YU Zhenxing DONG Yan ZHU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第5期406-420,共15页
A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified sce... A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans. 展开更多
关键词 Complex deep space networks File delivery time model Licklider Transmission Protocol(LTP) network Performance network protocols Parameter optimization Performance improvement
原文传递
A Multi-Interface Remote Monitoring and Control System Architecture Based on Embedded Server 被引量:3
13
作者 He Liu Lei Wang +1 位作者 Sheng-Peng Sun Ya-Dong Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第6期67-76,共10页
This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen ... This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen as the CPU of the embedded server with a linux operation system( OS) environment. The embedded server provides multiple interfaces for supporting various application scenarios. The whole network is based on local area network and adopts the Browser / Server( B / S) model. The monitoring and control node is as a browser endpoint and the remote node with an embedded server is as a server endpoint. Users can easily acquire various sensors information through writing Internet protocol address of remote node on the computer browser. Compared with client / server( C / S) mode,B / S model needs less maintain and can be applicable to large user group. In addition,a simple network management protocol( SNMP) is used for management of devices in Internet protocol( IP) networks. The results of the demonstration experiment show that the proposed system gives good support to manage the network from different user terminals and allows the users to better interact with the ambient environment. 展开更多
关键词 MULTI-INTERFACE remote monitoring and control embedded server simple network management protocol(SNMP
下载PDF
无线传感网中轻型简单网络管理协议(英文) 被引量:2
14
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
下载PDF
GMPLS: IP-Centric Control Protocols for Optical Networks(Tutorial) 被引量:1
15
作者 Yaohui Jin Weisheng Hu (Shanghai Jiaotong University, Shanghai, 200030 P. R. China) 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期663-664,共2页
Recent advances in optical networking technologies, particularly DWDM and MEMS, promise the transmission and switching of huge bandwidth capacity. The carriers have convinced of that their revenue must be earned from ... Recent advances in optical networking technologies, particularly DWDM and MEMS, promise the transmission and switching of huge bandwidth capacity. The carriers have convinced of that their revenue must be earned from efficient bandwidth management instead of unsophisticated increase in capacity. The distributed control plane can offer more flexibility, reliability and scalability, whose functions include addressing, resource and topology discovery, route computation, provisioning and restoration. Genera... 展开更多
关键词 GMPLS for IP-Centric Control protocols for Optical networks TUTORIAL
原文传递
MULTIPLE ELECTRONIC CONTROL UNITS CALIBRATION SYSTEM BASED ON EXPLICIT CALIBRATION PROTOCOL AND J1939 PROTOCOL 被引量:3
16
作者 ZHU Keqing XU Quankui YANG Lin ZHUO Bin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第1期42-46,共5页
The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the ... The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP, with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs. 展开更多
关键词 Electronic control unit (ECU) Calibration Explicit calibration protocol (XCP) J1939 communication protocol Controlled area network (CAN)
下载PDF
Design of Enterprise Storage Architecture for Optimal Business Continuity
17
作者 Rekha Singhal Prasad Pawar +2 位作者 Shreya Bokare Rashmi Kale Yogendra Pal 《Journal of Electronic Science and Technology》 CAS 2010年第3期206-214,共9页
This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol s... This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol storage area network (IPSAN), which is used for data management without burdening the application server, as well as mix of synchronous and semi-synchronous replication techniques to replicate data to remote disaster recovery site. We have presented the detailed design of both synchronous and semi-synchronous with case study of using open source database postgres to prove our point for optimal business continuity. The theoretical presentation is also given for the same. 展开更多
关键词 Business continuity disaster recovery Internet protocol storage area network (IPSAN) semi-synchronous replication synchronous replication.
下载PDF
Automatic discovery of stateful variables in network protocol software based on replay analysis
18
作者 Jianxin HUANG Bo YU +1 位作者 Runhao LIU Jinshu SU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第3期403-416,共14页
Network protocol software is usually characterized by complicated functions and a vast state space.In this type of program,a massive number of stateful variables that are used to represent the evolution of the states ... Network protocol software is usually characterized by complicated functions and a vast state space.In this type of program,a massive number of stateful variables that are used to represent the evolution of the states and store some information about the sessions are prone to potentialflaws caused by violations of protocol specification requirements and program logic.Discovering such variables is significant in discovering and exploiting vulnerabilities in protocol software,and still needs massive manual verifications.In this paper,we propose a novel method that could automatically discover the use of stateful variables in network protocol software.The core idea is that a stateful variable features information of the communication entities and the software states,so it will exist in the form of a global or static variable during program execution.Based on recording and replaying a protocol program’s execution,varieties of variables in the life cycle can be tracked with the technique of dynamic instrument.We draw up some rules from multiple dimensions by taking full advantage of the existing vulnerability knowledge to determine whether the data stored in critical memory areas have stateful characteristics.We also implement a prototype system that can discover stateful variables automatically and then perform it on nine programs in Pro FuzzBench and two complex real-world software programs.With the help of available open-source code,the evaluation results show that the average true positive rate(TPR)can reach 82%and the average precision can be approximately up to 96%. 展开更多
关键词 Stateful variables network protocol software Program analysis technology network security
原文传递
Internet of Things: Towards a Solid Ecosystem of Interconnected Things
19
作者 Mohamad Chakroun Jinane Sayah +1 位作者 Chadi Kallab Samir Haddad 《Advances in Internet of Things》 2022年第3期35-64,共30页
The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on character... The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on characterizing the many edges and technologies that make up an IoT system, the IoT ecosystem is still seen as too complex to be recognized as a stand-alone environment due to its significant diversity;hence, the objective of this research is to address such a complex environment in a way that highlights its components and distinguishes them both individually and in relation to their broader context. Therefore, the definition of IoT and its emergence were discussed and organized around the timeline of Internet development phases demonstrating that IoT has been a need that has accompanied the presence of the Internet since its early stages, and then its growth and impact were discussed and highlighted with estimates and numbers. On the technical side, each of the following groups, IoT components, protocols, and architectures, was defined, discussed, and grouped in such a way that their intergroup organization, as well as their placement and contribution to the overall ecosystem, was highlighted. This, in addition to the various examples mentioned throughout the discussion, will provide the reader with a better understanding of the Internet of Things and how deeply it has become entwined in our daily lives and routines as a result of its numerous applications. 展开更多
关键词 Internet of Things IoT Components IoT Architectures IoT Economic Impact IoT Growth networking protocols TCP/IP IoT protocols IoT Challenges IoT Attacks
下载PDF
AeroMTP:A fountain code-based multipath transport protocol for airborne networks 被引量:4
20
作者 Li Jie Gong Erling +2 位作者 Sun Zhiqiang Liu Wei Xie Hongwei 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第4期1147-1162,共16页
Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, AN... Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, ANs have some unique attributes including high node mobility, frequent topology changes, mechanical and aerodynamic constrains, strict safety requirements and harsh communication environment.Thus, the performance of conventional transmission control protocol(TCP) will be dramatically degraded in ANs.Aircraft commonly have two or more heterogeneous network interfaces which offer an opportunity to form multiple communication paths between any two nodes in ANs.To satisfy the communication requirements in ANs, we propose aeronautical multipath transport protocol(Aero MTP) for ANs, which effectively utilizes the available bandwidth and diversity provided by heterogeneous wireless paths.Aero MTP uses fountain codes as forward error correction(FEC) codes to recover from data loss and deploys a TCP-friendly rate-based congestion control mechanism for each path.Moreover, we design a packet allocation algorithm based on optimization to minimize the delivery time of blocks.The performance of Aero MTP is evaluated through OMNe T++ simulations under a variety of test scenarios.Simulations demonstrate that Aero MTP is of great potential to be applied to ANs. 展开更多
关键词 Ad hoc networks Airborne networks Fountain code Multi-paths network protocols
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部