The authentication error in Two-Hop wireless networks is considered without knowledge of eavesdropper channels and location. This paper presents an eavesdropper model with authentication error and two eavesdropping wa...
详细信息
ISBN:
(纸本)9781467379533
The authentication error in Two-Hop wireless networks is considered without knowledge of eavesdropper channels and location. This paper presents an eavesdropper model with authentication error and two eavesdropping ways. In the model, the authentication error is expressed a pair(p_1, p_2). Based on the authentication error, a cooperative transmission protocol against impersonation attack is presented. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) the impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The Error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.
Frequency shift keying (FSK) modulation function in MATLAB without filter function, leading to poor adjacent channel suppression, which causes aliasing after a non-linear device easily. Based on FSK modulation signal ...
详细信息
ISBN:
(纸本)9781467370066
Frequency shift keying (FSK) modulation function in MATLAB without filter function, leading to poor adjacent channel suppression, which causes aliasing after a non-linear device easily. Based on FSK modulation signal generation principle, designing a better adjacent channel suppression function in this paper, which verified by demodulating through Agilent's vector signal analyzer (89600S), this function gets achieved more satisfactory results in the application of semi physical simulation.
This paper details the radiation of laser induced air plasma. The plasma was produced by interacting the air with the Nd: YGA laser focused with optical lens. The relationship between spectrum of laser - induced air p...
详细信息
An anonymous cluster head election protocol in clustered wireless sensor networks was proposed. The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilin...
详细信息
This paper considers an OFDMA-based cooperative cognitive radio network where the secondary users (SUs) act as the relay of the primary users (PUs) while guaranteeing the quality of service (QoS) of the PUs. In return...
详细信息
10G Ethernet technology has been widely used in modern high speed communication system. As a result, program design for high-speed data capture on 10G Ethernet, as the first and important step in network monitor and a...
详细信息
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this pape...
详细信息
ISBN:
(纸本)9781849199094
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this paper is to design a low-rate mobile Ad Hoc network routing protocols WLRP (Wireless Low-Rate Ad Hoc security Routing Protocol), using the trust evaluation mechanism between neighbour nodes which can effectively prevent attacks from inside the network, to greatly enhance the Ad Hoc Network security. Simulation results show that in low-Rate link environment, the WLRP protocol performs better than AODV.
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati...
详细信息
ISBN:
(纸本)9781849198455
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulation is proposed in the paper. Firstly, behaviour attribution of node (user) in network instance is extracted in the algorithm, description and abstraction of user behaviour by vector mode is performed, simultaneously, K mean algorithm is adopted to make clustering analysis for user behaviour;on the basis of conditions described as above, Hybrid Ant-Colony Algorithm (HBACA) is modified to search relationships between variety of grouping sets in the network instance, and identify each user role in the performing process of network instance. Simulation result shows that the algorithm can extract internal relations of communication behaviours between each network member, in order to obtain key role in a specific network instance.
The aerosol fire extinguishing agent is a complex pyrotechnic composition, and the extinguishing efficiency need a series of experiments to identify. A method is put forward out based on combining back-propagation neu...
详细信息
The expansion mechanism of expandable graphite (EG) was studied systematically in this paper. Based on the feature of the structure and the linear expansion of expandable graphite, a simple expansion model was establi...
详细信息
暂无评论