This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and...
详细信息
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in...
详细信息
In view of the disadvantages of IEEE 802.11e EDCA in QoS guarantee and collision avoidance, an enhanced EDCA scheme called SD-AEDCA is presented which dynamically adjusts two EDCA parameters, namely contention window ...
详细信息
As one of the key characteristics of Software as a Service (SaaS), multi-tenancy aims to support massive customers by sharing application instances and databases. To achieve the high economies of scale, one of the mos...
详细信息
In the application of target tracking based on dynamic convey tree-based collaboration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. In this paper,...
详细信息
In Spiking neural networks, information is encoded in separate spike times. The traditional gradient descent based learning algorithm (SpikeProp) trends to be trapped in local optima and cannot converge if the negativ...
详细信息
In this paper, a model for the static channel assignment in multi-radio multi-channel wireless mesh networks is proposed. We describe an interference model in wireless communication environment. The degree of detail i...
详细信息
In this paper, a model for the static channel assignment in multi-radio multi-channel wireless mesh networks is proposed. We describe an interference model in wireless communication environment. The degree of detail in the model determines the accuracy of channel assignment. In many wireless mesh networks studies, the simplistic protocol interference model is adopted, but the model is usually not realistic and practical. Therefore, we construct a physical interference model and put forward a pure integer quadratic programming (PIQP) model to solve the channel assignment problem and maximize the capacity of wireless mesh networks. The feasibility and effectivity of the channel assignment solution are suggested by the results of simulation.
Peer-to-Peer networks develop rapidly in the last few years. The search algorithm lies at the centre of these networks. Many search methods have been proposed for unstructured peer-to-peer networks, but complicated or...
详细信息
Peer-to-Peer networks develop rapidly in the last few years. The search algorithm lies at the centre of these networks. Many search methods have been proposed for unstructured peer-to-peer networks, but complicated organization, high search cost and maintenance overhead make them less practicable. To avoid these weaknesses, in this paper, we propose an adaptive and efficient method for search in unstructured P2P networks, the Semantic Inference Search method (SIS). This approach is based on a simple and powerful principle similar to interest-based locality. It utilizes feedback of not only the requested objects but also semantically related objects from previous searches. It applies Bayesian network to establish an inference model, using semantic inference to direct future searches. Experimental results show that the SIS method achieves high success rate, more discovered objects, low bandwidth consumption, less maintenance and adaptation to changing network topologies.
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure schem...
详细信息
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure scheme for storage overlay networks is proposed by applying erasure coding technique to reduce redundancy and enhance privacy protection. For achieving a lightweight data privacy protection, encoded strips are stored and dual distinct hash functions are deployed to construct hash chains to protect location information for encoded strips. Simulation results show that with different percentage of malicious peers, by adjusting encoding parameters, the scheme is available to provide durable data storage service.
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and...
详细信息
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and periodical key updating. This scheme offers a set of methods for key distribution and updating with MLD snooping mechanism and MLD report filtering on access switches. This method reduces the complexity of the key updating problem when members leave the group by layer 2 control and guarantees the efficiency and security of key management. Compared with other schemes, this scheme performs better on computation cost and communication cost than them and has acceptable storage cost.
暂无评论