您的位置: 专家智库 > >

国家自然科学基金(09ZR1414900)

作品数:4 被引量:5H指数:1
发文基金:国家自然科学基金国家高技术研究发展计划更多>>
相关领域:电子电信自动化与计算机技术水利工程电气工程更多>>

文献类型

  • 4篇中文期刊文章

领域

  • 3篇电子电信
  • 2篇自动化与计算...
  • 1篇电气工程
  • 1篇水利工程

主题

  • 2篇移动AD
  • 2篇通信
  • 2篇网络
  • 2篇洪水
  • 2篇洪水频率
  • 1篇电器
  • 1篇动态拓扑
  • 1篇对焦
  • 1篇信号
  • 1篇信号处理
  • 1篇信号分析
  • 1篇有限资源
  • 1篇中继
  • 1篇中继节点
  • 1篇通信安全
  • 1篇通信系统
  • 1篇自动对焦
  • 1篇拓扑
  • 1篇网络节点
  • 1篇网络模拟

传媒

  • 2篇China ...
  • 1篇Journa...
  • 1篇Journa...

年份

  • 1篇2011
  • 1篇2010
  • 2篇2009
4 条 记 录,以下是 1-4
排序方式:
Effects of Denial of Service Attack in Mobile Ad Hoc Networks被引量:1
2009年
Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering.The nodes of mobile ad hoc networks are thus susceptible to compromise.The networks are particularly vulnerable to denial of service(DoS) attacks launched through compromised nodes or intruders.In this paper,we investigated the effects of flooding attacks in network simulation 2(NS-2) and measured the packet delivery ratio and packet delay under different flooding frequencies and different numbers of attack nodes.Simulation results show that with the increase the flooding frequencies and the numbers of attack nodes,network performance drops.But when the frequency of flooding attacks is greater than a value,the performance decrease gets smooth.Meanwhile the packet delay firstly increases and then declines to a value of stability at the end.
易平周雍凯吴越柳宁
关键词:拒绝服务攻击HOC网络移动ADHOC网络网络节点洪水频率移动AD网络性能
Security in Wireless Mesh Neworks: Challenges and Solutions被引量:3
2009年
Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changing topology, cooperative routing algorithms.The article surveys the state of the art in security for wireless mesh networks.Firstly,we analyze various possible threats to security in wireless mesh networks.Secondly,we introduce some representative solutions to these threats,including solutions to the problems of key management,secure network routing,and intrusion detection.We also provide a comparison and discussion of their respective merits and drawbacks,and propose some improvements for these drawbacks.Finally,we also discuss the remaining challenges in the area.
Yi PingXing HongkaiWu YueLi Jianhua
关键词:无线通信通信安全信号分析信号处理
Outage Performance and Diversity Analysis for Multi-antenna Multi-relay Networks
2010年
The performance of multi-antenna multi-relay cooperative system is investigated in this paper. Two relaying strategies, i.e., reactive and proactive strategies are analyzed with the Amplifyand-Forward (AF) and Decode-and-Forward (DF) protocols. We derive the Cumulative Distribution Function (CDF) of the received Signal-to-Noise Ratio (SNR) at the destination, which is used to calculate the exact outage probability, for both AF and DF protocols. According to these results, we conclude that a cooperative network which composes K relays each equipped with nr antennas can achieve maximal order-(2nrK+1) diversity gain, by proper processing at relays and destination. Furthermore, the performance comparison is given, in terms of outage probability. These two strategies outperform each other in different scenarios in AF protocol, whilst proactive strategy is always better than its counterpart in DF protocol. According to these results, the optimal power allocation schemes among relay nodes are also presented, with reasonable power constraint.
Liu NingYi PingLi JianingLi JianhuaWu Yue
关键词:通信系统继电器中继节点自动对焦
Performance analysis of mobile ad hoc networks under flooding attacks被引量:1
2011年
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value.
Ping YiFutai ZouYan ZouZhiyang Wang
关键词:洪水频率网络模拟移动AD节点数动态拓扑有限资源
共1页<1>
聚类工具0