期刊文献+
共找到642篇文章
< 1 2 33 >
每页显示 20 50 100
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
1
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
Partitioned k-Exclusion Real-Time Locking Protocol Motivated by Multicore Multi-GPU Systems
2
作者 Mao-Lin Yang Hang Lei +1 位作者 Yong Liao Ze-Wei Chen 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第3期193-198,共6页
Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due ... Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due to the lack in framework for real-time analysis. In order to guarantee real-time requirements while maintaining system utilization ~in modern heterogeneous systems, such as multicore multi-GPU systems, a novel suspension-based k-exclusion real-time locking protocol and the associated suspension-aware schedulability analysis are proposed. The proposed protocol provides a synchronization framework that enables multiple GPUs to be efficiently integrated in multicore real-time systems. Comparative evaluations show that the proposed methods improve upon the existing work in terms of schedulability. 展开更多
关键词 Embedded systems graphic processing units(GPUs) heterogeneous systems locking protocols MULTICORE real-time systems
下载PDF
Real-Time Communication Method for mHealth Base on Extended XMPP Protocol
3
作者 Chenjie Shi Yu Fang 《Communications and Network》 2013年第3期590-595,共6页
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ... Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role status efficiently and reduce data latency during the communication process. Meanwhile, it can be extended flexibly to meet increasing communication demands of mHealth services. Furthermore, a system framework is presented to support telemonitoring scene. Finally, system implementation and feasibility tests verify the effectiveness of the method and framework. 展开更多
关键词 MHEALTH XMPP protocol real-time Communication
下载PDF
Proposal for Energy Consumption Reduction between Connected Objects in a Network Running on MQTT Protocol
4
作者 Saidou Haman Djorwe Temoa +1 位作者 Eric Michel Deussom Djomadji Kolyang   《Journal of Computer and Communications》 2024年第10期177-188,共12页
The “Internet of Things” (IoT) refers to a set of intelligent “objects” that can communicate with each other directly or through a network. The IoT is the embodiment of the idea that everything can be connected an... The “Internet of Things” (IoT) refers to a set of intelligent “objects” that can communicate with each other directly or through a network. The IoT is the embodiment of the idea that everything can be connected anywhere and at any time. The concept can be applied to sectors such as e-health, e-government, automotive, geographic information systems, remote sensing, home networking, e-commerce and climate change mitigation. Unlike the Internet, the IoT has its own constraints, notably those linked to heterogeneity. This divergence is linked to different protocols, technologies and algorithms implemented in these connected objects for their interconnection. It should be noted that IoT devices can communicate with each other using different protocols and dedicated M2M (Machine to Machine) communication technologies. The aim of this work is to find solutions for optimising energy consumption during data exchanges between connected objects, with respect to certain constraints by using firstly this exchange for only Message Queuing Telemetry Transport (MQTT) and secondly the combination of the MQTT protocol and the Constrained Application Protocol (CoAP) protocol to check the quantity of the energy optimized. The MQTT protocol, for example, is one of the most widely used protocols for connected objects. Admittedly, this protocol consumes less energy, but in the situation of a very large number of users, the problem of saturation inevitably arises. In this article, we propose a solution of optimising energy consumption by combining the MQTT protocol with the CoAP protocol which can allow to use the standby mode contrary to the use of MQTT where the broker is always being turning. This solution has not yet been implemented but is being discussed. In this article, we’re going to use the joulemeter which is an application developed by Microsoft to measure and estimate the energy consumption of computers and applications. In our case, we take the example of the “Service Broker for network connections” of the Windows’s 10 Operating System, in my own computer to show the difference between the consumption of energy without the standby mode and with standby mode, because with the MQTT, the Broker’s MQTT is always on. Now, with the combination MQTT and CoAP, it is possible that we have standby mode and to compare these two cases in term of consumption of an energy. And to do it, we must use the joulemeter that we installed in our computer to simulate it. This is achieved by using the CoAP protocol combined with the MQTT protocol. The aim of our work is to reduce energy consumption in order to solve the problem of saturation of the MQTT by linking it to CoAP protocol by using Joulemeter mentioned above. 展开更多
关键词 Internet of Things HETEROGENEITY message Queuing Telemetry Transport Constrained Application protocol Application-Layer Semantic Gateway GATEWAY
下载PDF
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
5
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor Network real-time Routing protocol Contention-Based Scheme Beaconless
下载PDF
Improvement Design for Distributed Real-Time Stream Processing Systems 被引量:4
6
作者 Wei Jiang Liu-Gen Xu +1 位作者 Hai-Bo Hu Yue Ma 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第1期3-12,共10页
In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of ... In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of horizontal scalability and high throughput, which is manly deployed in many areas in order to address the problem of speed mismatch between message producers and consumers. When using Kafka, we need to quickly receive data sent by producers. In addition, we need to send data to consumers quickly. Therefore, the performance of Kafka is of critical importance to the performance of the whole stream processing system. In this paper, we propose the improved design of real-time stream processing systems, and focus on improving the Kafka's data loading process.We use Kafka cat to transfer data from the source to Kafka topic directly, which can reduce the network transmission. We also utilize the memory file system to accelerate the process of data loading, which can address the bottleneck and performance problems caused by disk I/O. Extensive experiments are conducted to evaluate the performance, which show the superiority of our improved design. 展开更多
关键词 Kafka Kafka CAT memory FILE SYSTEM messagE QUEUE real-time STREAM processing SYSTEM
下载PDF
Integration of naval distributed tactical training simulation system based on advanced message queuing protocol 被引量:2
7
作者 柳玉 Wen Jiayan Ji Daqin 《High Technology Letters》 EI CAS 2016年第4期385-394,共10页
Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protoc... Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange. 展开更多
关键词 tactical simulation message middleware advanced message queuing protocol(AMQP) software architecture distributed interactive simulation
下载PDF
A Secure Short Message Communication Protocol 被引量:1
8
作者 Chao-Wen Chang Heng Pan Hong-Yong Jia 《International Journal of Automation and computing》 EI 2008年第2期202-207,共6页
According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the stan... According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application. 展开更多
关键词 Short messaging service security protocol subscriber identity module (SIM) tool kit (STK) AUTHENTICATION mobile
下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
9
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded Internet terminal (EIT) algorithm information security
下载PDF
IPC Mechanisms in Satellite Real-Time Microkernel Operating System
10
作者 刘晓冬 李莲治 +1 位作者 郭福顺 朱力群 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1998年第4期72-75,共4页
One of the most important features of modem minor satellites is to realize autonomous moving. The perfomance of the satellite autonomous computer operating system acting as the control center is of utrnost importance.... One of the most important features of modem minor satellites is to realize autonomous moving. The perfomance of the satellite autonomous computer operating system acting as the control center is of utrnost importance. The recent trend in operating system development is adopting microkernel architecture that holds such advantages as microminiaturization, modularity, portability and extendibility. IPC is the key of microkernel design. Message-based IPC mechanism is generally used in existing microkernel Operating system. It is of consistency, safety and reliability.However, it can not provide efficient support for real-time applications in satellite systems and it only applies to loose coupling multi-processor architecture. In this paper, an improvement solution for existing message-based IPC is proposed at first to obtain real-time performance. Then a new IPC mechanism is designed. It particulary applies to shared memory tight coupling multi-processor architecture. 展开更多
关键词 SATELLITE MICROKERNEL real-time IPC MECHANISM messagE
下载PDF
Transmission Considerations with QoS Support to Deliver Real-Time Distributed Speech Recognition Applications
11
作者 Zhu Xiao-gang Zhu Hong-wen Rong Meng-tian 《Wuhan University Journal of Natural Sciences》 EI CAS 2002年第1期65-70,共6页
Distributed speech recognition (DSR) applications have certain QoS (Quality of service) requirements in terms of latency, packet loss rate, etc. To deliver quality guaranteed DSR application over wirelined or wireless... Distributed speech recognition (DSR) applications have certain QoS (Quality of service) requirements in terms of latency, packet loss rate, etc. To deliver quality guaranteed DSR application over wirelined or wireless links, some QoS mechanisms should be provided. We put forward a RTP/RSVP transmission scheme with DSR-specific payload and QoS parameters by modifying the present WAP protocol stack. The simulation result shows that this scheme will provide adequate network bandwidth to keep the real-time transport of DSR data over either wirelined or wireless channels. 展开更多
关键词 distributed speech recognition quality of service real-time transmission protocol resource reservation protocol wireless application protocol
下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
12
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 Internet control message protocol support vector machine covert tunnel network analysis
下载PDF
An On-Line Scheduler over Hard Real-Time Communication System
13
作者 CHEN Hui XIONG Guangze(School of Computer Science and Engineering,UESTC Chengdu 610054 China) 《Journal of Electronic Science and Technology of China》 2003年第1期47-53,共7页
By thorough research on the prominent periodic and aperiodic scheduling algorithms,anon-line hard real-time scheduler is presented,which is applicable to the scheduling of packets over a link.This scheduler,based on b... By thorough research on the prominent periodic and aperiodic scheduling algorithms,anon-line hard real-time scheduler is presented,which is applicable to the scheduling of packets over a link.This scheduler,based on both Rate Monotonic,pinwheel scheduling algorithm Sr and Polling Serverscheduling algorithms,can rapidly judge the schedulability and then automatically generate a bus tablefor the scheduling algorithm to schedule the packets as the periodic packets.The implementation of thescheduler is simple and easy to use,and it is effective for the utilization of bus link.The orderly executionof the bus table can not only guarantee the performance of the hard real time but also avoid the blockageand interruption of the message transmission.So the scheduler perfectly meets the demand of hard real-time communication system on the field bus domain. 展开更多
关键词 hard real-time communication advanced real-time communication scheduler(ARTCS) on-line scheduler bus scheduling table messagE
下载PDF
基于MQTT协议的轻量化文本信息分发技术研究
14
作者 熊风光 陈霖 +3 位作者 韩慧妍 张元 庞敏 焦世超 《计算机技术与发展》 2024年第2期90-97,共8页
随着卫星通信网络的发展,基于卫星通信网络实现手机、平板电脑等移动通信设备之间的通信成为研究的热点。由于其采用无线电波进行信号传输,且需要经过多个中继站进行信号的转发和处理,导致存在网络延时大、丢包率高以及信道狭窄等问题... 随着卫星通信网络的发展,基于卫星通信网络实现手机、平板电脑等移动通信设备之间的通信成为研究的热点。由于其采用无线电波进行信号传输,且需要经过多个中继站进行信号的转发和处理,导致存在网络延时大、丢包率高以及信道狭窄等问题。针对文本信息在卫星通信网络下的分发过程存在效率低下、可靠性不高的问题,设计一种基于MQTT(Message Queuing Telemetry Transport)协议的轻量化文本信息分发技术。该技术使用MQTT协议作为消息传输协议,在文本信息分发前对MQTT协议进行主题设计、发布订阅机制设计、设备连接设计以及设备心跳设计,确保设备之间的连通性;在文本信息的分发过程中,设计数据校验加密算法、文本信息轻量化处理方法和离线消息存储机制,保证文本信息分发的安全性、可靠性。实验结果表明:相较于传统的基于JSON数据的文本信息分发技术,该技术在提高文本信息分发效率的同时,可确保信息分发的安全性、完整性和稳定性。 展开更多
关键词 MQTT协议 轻量化 文本信息分发 数据加密 离线消息存储
下载PDF
一种基于区块链的MQTT协议优化算法 被引量:1
15
作者 高焜 刘泽辉 +3 位作者 高伟 张雨柔 赵勇彪 琚贇 《电力信息与通信技术》 2024年第5期10-16,共7页
通信协议的设计已然成为实现设备与互联网通信的重要支撑,其覆盖了整个物联网系统的各个环节。针对传统物联网协议中关键数据被伪造或篡改的安全问题,文章设计了一种在数据传输过程中使用区块链技术来保证传输数据安全的改进消息队列遥... 通信协议的设计已然成为实现设备与互联网通信的重要支撑,其覆盖了整个物联网系统的各个环节。针对传统物联网协议中关键数据被伪造或篡改的安全问题,文章设计了一种在数据传输过程中使用区块链技术来保证传输数据安全的改进消息队列遥测传输(message queue telemetry transmission,MQTT)协议,进而保证了存储在broker的数据不被恶意篡改。通过仿真实验证明,该方法具有高效、轻量以及易实现等多方面的特点,在保护物联网的数据安全方面效果十分显著。 展开更多
关键词 MQTT协议 区块链 消息代理服务器 物联网 安全
下载PDF
The Design and Implementation of SMS Gateway Interface for Early Warning Plan for Meteorological Hazards Based on CMPP Protocol 被引量:2
16
作者 苗传海 潘静 张超 《Meteorological and Environmental Research》 CAS 2010年第1期71-74,共4页
Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form t... Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form the meteorological mobile internet service system which is 'One point connect,service the whole province' for short.Accessing interface system to each city's SMG (Short Message Gateway) through standard protocol,we establish the information transmitting channel of short message platform and mobile SMG to realize the store-forward and flow control of short message.In addition,the stable and dependable communication connect of interface system and mobile SMG should be ensure,and the connect could be reconstructed while encountering any error,as well as committing short message would be stopped due to interruption of connect. 展开更多
关键词 CMPP protocol Meteorological warning Disaster prevention and reduction Short message interface Short message routing China
下载PDF
High efficiency AODV routing protocol based on link availability prediction in MANETs 被引量:2
17
作者 刘超 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期489-493,共5页
To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction ba... To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction based strategy is introduced to reduce the amount of Hello messages. In this strategy, a novel wireless link availability prediction model under line-of-sight (LOS) propagation environments is proposed based on which the parameter of Hello Interval in AODV can be dynamically adjusted to achieve the goal of changing the frequency of Hello message broadcasts under different link stability degrees. Simulation results demonstrate that, compared with the standard AODV with the periodic Hello message broadcast mechanism, the proposed protocol effectively reduces unnecessary control message overhead and greatly improves the performance in terms of end-to-end delay and efficiency. 展开更多
关键词 Hello message link availability ad hoc on-demand distance vector routing protocol ad hoc
下载PDF
商用车多源TSC1报文请求的仲裁策略研究
18
作者 郑东 李峰 李甲平 《内燃机与配件》 2024年第14期32-34,共3页
随着商用车智能化水平的逐步提升,整车配备的多种智能控制系统均有控制动力源或缓速器需求。通过研究J1939协议对多源TSC1报文请求的仲裁策略,发现当前发动机在车辆中所具有的动力源和缓速器双重身份对现有J1939协议仲裁策略提出了新的... 随着商用车智能化水平的逐步提升,整车配备的多种智能控制系统均有控制动力源或缓速器需求。通过研究J1939协议对多源TSC1报文请求的仲裁策略,发现当前发动机在车辆中所具有的动力源和缓速器双重身份对现有J1939协议仲裁策略提出了新的挑战。因此对J1939协议的策略进行改进,开发出了一种新的仲裁控制策略。测试结果表明,新策略实现了正确仲裁,即负扭矩请求优先,为整车TSC1控制系统的顶层设计提供了参考。 展开更多
关键词 商用车 J1939协议 TSC1报文
下载PDF
语音实验室端到端即时通信认证协议设计
19
作者 何锴 《现代电子技术》 北大核心 2024年第11期18-21,共4页
为保证语音实验室端到端即时通信安全,确保语音内容不被窃听和篡改,提出一种基于混合加解密的语音实验室端到端即时通信认证协议的设计方法。利用RSA方法加解密发送方传输的即时通信会话密钥,通过3DES方法将发送方发送的明文语音信息进... 为保证语音实验室端到端即时通信安全,确保语音内容不被窃听和篡改,提出一种基于混合加解密的语音实验室端到端即时通信认证协议的设计方法。利用RSA方法加解密发送方传输的即时通信会话密钥,通过3DES方法将发送方发送的明文语音信息进行加解密。在加解密过程中,加密信息打包为加密包后发送至信息接收方,信息接收方获取加密包后,使用RSA方法、3DES方法进行有效的密钥解密认证、明文语音消息解密,获取语音实验室端到端的明文语音信息。实验结果显示,此协议使用下,语音实验室端到端即时通信的认证加速比提升,且仅在密钥输入内容准确的情况下,信息接收方才可得到准确的明文语音消息内容,且不存在内容失真问题。 展开更多
关键词 语音实验室 端到端 即时通信 认证协议 RSA算法 3DES方法 密钥加解密 明文加解密
下载PDF
基于改进K-means的AODV路由协议
20
作者 陈成鹏 查文文 +3 位作者 潘伟豪 汤先美 辜丽川 许正荣 《合肥学院学报(综合版)》 2024年第2期83-90,共8页
AODV路由协议是无线自组织网络中的经典协议,被广泛应用于各种通讯场景中。传统的AODV路由协议在路由发现阶段使用广播方法转发RREQ(路由请求分组),容易造成广播风暴从而影响网络性能。针对该问题,研究提出了基于改进K-means的AODV路由... AODV路由协议是无线自组织网络中的经典协议,被广泛应用于各种通讯场景中。传统的AODV路由协议在路由发现阶段使用广播方法转发RREQ(路由请求分组),容易造成广播风暴从而影响网络性能。针对该问题,研究提出了基于改进K-means的AODV路由协议,使用节点间距离、传输错误数和路由拥塞度作为路由度量,利用密集度参数改进初始聚类中心的选择,设计AODV-K路由协议选择最佳转发节点以减少不必要的路由请求分组转发,提高了路由请求分组的转发效率并减少了路由拥塞。运用NS-3对协议进行仿真,仿真结果表明所提出的改进路由协议,在高网络负载和网络密度下,对比原AODV路由协议,在平均端到端延迟方面分别降低了26.1%和25.6%。当节点数在30、40、50时,在分组投递率方面平均提升13.7%,当每秒发送分组数据包数大于30时,分组投递率平均提高了11.3%。 展开更多
关键词 无线自组织网络 AODV路由协议 路由度量 K-MEANS聚类 消息转发机制
下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部