您的位置: 专家智库 > >

国家自然科学基金(09ZR1414900)

作品数:4 被引量:5H指数:1
发文基金:国家自然科学基金国家高技术研究发展计划更多>>
相关领域:电子电信自动化与计算机技术水利工程电气工程更多>>

文献类型

  • 4篇中文期刊文章

领域

  • 3篇电子电信
  • 2篇自动化与计算...
  • 1篇电气工程
  • 1篇水利工程

主题

  • 3篇SECURI...
  • 1篇MULTI-...
  • 1篇NETWOR...
  • 1篇NETWOR...
  • 1篇PERFOR...
  • 1篇ROUTIN...
  • 1篇SECURE
  • 1篇WIRELE...
  • 1篇ANTENN...
  • 1篇EFFECT...
  • 1篇INTRUS...
  • 1篇MOBILE...

传媒

  • 2篇China ...
  • 1篇Journa...
  • 1篇Journa...

年份

  • 1篇2011
  • 1篇2010
  • 2篇2009
4 条 记 录,以下是 1-4
排序方式:
Effects of Denial of Service Attack in Mobile Ad Hoc Networks被引量:1
2009年
Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised aodes or intruders. In this paper, we investigated the effects of flooding attacks in network simulation 2 (NS-2) and measured the packet delivery ratio and packet delay under different flooding frequencies and different numbers of attack nodes. Simulation results show that with the increase the flooding frequencies and the numbers of attack nodes, network performance drops. But when the frequency of flooding attacks is greater than a value, the performance decrease gets smooth. Meanwhile the packet delay firstly increases and then declines to a value of stability at the end.
易平周雍凯吴越柳宁
关键词:SECURITY
Security in Wireless Mesh Neworks: Challenges and Solutions被引量:3
2009年
Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changing topology, cooperative routing algorithms.The article surveys the state of the art in security for wireless mesh networks.Firstly,we analyze various possible threats to security in wireless mesh networks.Secondly,we introduce some representative solutions to these threats,including solutions to the problems of key management,secure network routing,and intrusion detection.We also provide a comparison and discussion of their respective merits and drawbacks,and propose some improvements for these drawbacks.Finally,we also discuss the remaining challenges in the area.
Yi PingXing HongkaiWu YueLi Jianhua
Outage Performance and Diversity Analysis for Multi-antenna Multi-relay Networks
2010年
The performance of multi-antenna multi-relay cooperative system is investigated in this paper. Two relaying strategies, i.e., reactive and proactive strategies are analyzed with the Amplifyand-Forward (AF) and Decode-and-Forward (DF) protocols. We derive the Cumulative Distribution Function (CDF) of the received Signal-to-Noise Ratio (SNR) at the destination, which is used to calculate the exact outage probability, for both AF and DF protocols. According to these results, we conclude that a cooperative network which composes K relays each equipped with nr antennas can achieve maximal order-(2nrK+1) diversity gain, by proper processing at relays and destination. Furthermore, the performance comparison is given, in terms of outage probability. These two strategies outperform each other in different scenarios in AF protocol, whilst proactive strategy is always better than its counterpart in DF protocol. According to these results, the optimal power allocation schemes among relay nodes are also presented, with reasonable power constraint.
Liu NingYi PingLi JianingLi JianhuaWu Yue
Performance analysis of mobile ad hoc networks under flooding attacks被引量:1
2011年
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value.
Ping YiFutai ZouYan ZouZhiyang Wang
关键词:SECURITY
共1页<1>
聚类工具0