Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot...
详细信息
ISBN:
(纸本)9781849198431
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, in this paper, we have proposed an online self-organized group establishing mechanism for strategic mobile scenarios of MANETs to realize the maneuverability of putting the secure group operations into effect. First of all, the algorithm performs initialization for each node, and then the nodes determine group-manager based on condition function and invite neighboring nodes to join in, finally, the rest nodes without grouping confirm their own groups by the group condition function. Both theoretical analysis and simulation experiments have demonstrated that our method can meet the scalability requirement which plays an important role in prolonging the network lifetime and effectively saving the communication, computation and storage overhead in strategic mobile scenario of MANETs.
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot...
详细信息
ISBN:
(纸本)9781849198431
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, in this paper, we have proposed an online self-organized group establishing mechanism for strategic mobile scenarios of MANETs to realize the maneuverability of putting the secure group operations into effect. First of all, the algorithm performs initialization for each node, and then the nodes determine group-manager based on condition function and invite neighboring nodes to join in, finally, the rest nodes without grouping confirm their own groups by the group condition function. Both theoretical analysis and simulation experiments have demonstrated that our method can meet the scalability requirement which plays an important role in prolonging the network lifetime and effectively saving the communication, computation and storage overhead in strategic mobile scenario of MANETs.
In this paper, we consider multiple primary and multiple secondary users cooperative cognitive radio networks, in which the primary users (PUs) lease a portion of their spectrum to the secondary users (SUs) for some r...
详细信息
Based on the P2P structure,a coordinated attack model with multi-nodes is presented for introduction from link configuration,broadcast mechanism and attack *** P2P,Pure P2P and Super P2P are discussed in link configur...
详细信息
Based on the P2P structure,a coordinated attack model with multi-nodes is presented for introduction from link configuration,broadcast mechanism and attack *** P2P,Pure P2P and Super P2P are discussed in link configuration ***,BCRM and DRM mechanisms are introduced in broadcast *** attack methods mainly focus on the index poisoning and routing table *** model is advanced in high attack flexibility,no single point of failure,high freedom in node attack,difficult to cluster and identify the attack traffic,difficult to trace the attacker,robustness,etc.,and it is suitable for wireless network confrontation.
The CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) mechanism is formally modeled ***,based on the Markov Chain theory,the analysis of the attack on CSMA/CA is introduced from two aspects which are the...
详细信息
The CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) mechanism is formally modeled ***,based on the Markov Chain theory,the analysis of the attack on CSMA/CA is introduced from two aspects which are the stochastic performance model and bandwidth share *** discussing the typical attack methods,the performance is analyzed from the aspects of throughput,communication efficiency,and collision numbers,which validates the feasibility and efficiency of attack method based on Markov Chain theory.
There are some critical nodes in Ad Hoc networks, and the failure of these critical nodes can critically affect the performance of the network. For the aim of selecting the important and trusted critical nodes in Ad H...
详细信息
A new proper integral representation of the first order Marcum Q-function Q(a, b) is derived and proved in this article. The most special feature of this form is that it holds the same representation for any value of ...
详细信息
A new proper integral representation of the first order Marcum Q-function Q(a, b) is derived and proved in this article. The most special feature of this form is that it holds the same representation for any value of arguments ratio a/b, meanwhile, it is can be used for stable numerical quadrature directly, and furthermore, it is also useful in the performance analysis of radar detection and digital communication systems analytically. The correctness of this new form is checked by the numerical comparison with the definition form of Marcum Q-function over a small and large domains in its two arguments.
Situation awareness aims to provide the global security views of the cyberspace for administrators. In this paper, a novel framework of cyber security situation awareness is proposed. The framework is based on a trust...
详细信息
With the rapid advance of data collection and storage technique, it is easy to acquire tens of millions or even billions of data sets. How to explore and exploit the useful or interesting information for human beings ...
详细信息
暂无评论