首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   0篇
数学   1篇
无线电   4篇
  2021年   1篇
  2018年   1篇
  2016年   1篇
  2013年   1篇
  2012年   1篇
排序方式: 共有5条查询结果,搜索用时 605 毫秒
1
1.
Wireless Networks - A novel approach is proposed to detect protocol misbehavior using state-of-the-art machine learning frameworks and entropy. Nodes in Vehicular Ad Hoc Networks (VANETs) use...  相似文献   
2.
A novel approach is proposed to estimate the timeout period used in wireless ad hoc networks in order to detect misbehaving nodes that make black hole attacks. Timeout period is an acceptable time frame for a node to forward a packet and is used to judge if the node is behaving properly. To avoid misjudgment and false alarms, the accuracy of the estimate of the timeout period is very important. Our method is based on the IEEE 802.11 MAC protocol and Dynamic Source Routing protocol. The main contribution of this paper is proposing a queuing analysis to calculate the mean and maximum delay per hop implementing the 95-percentile of medium access waiting time. In addition, a new technique is introduced that can be applied to determine the mean number of hops in flooding-based ad hoc networks, taking into account edge effects. For each proposed model, analytical results are compared with results obtained from simulations and the validity of the models is confirmed by observing the close relationship between the results.  相似文献   
3.
A reliable one-hop broadcast is a fundamental communication primitive in mobile ad hoc networks in which a message from the source node is guaranteed to be delivered to all nodes within the source node’s transmission range. Despite the importance of it, reliable one-hop broadcast is not easy to accomplish due to collisions in wireless networks known as Hidden Terminal Problem. This paper presents a MAC protocol that not only guarantees reliable one-hop broadcast but also achieves it efficiently by exploring as many simultaneous executions of the communication as possible. In addition to the data packets, the proposed algorithm utilizes the control packets that prevent packet collisions, and at the same time, make the simultaneous communications possible to improve the network throughput. Simulation results show the effectiveness of the proposed algorithm.  相似文献   
4.
Mobile ad hoc networks (MANETs) rely on the benevolence of nodes within the network to forward packets from a source node to a destination node. This network construction allows for the forwarding nodes, whether they are selfish or malicious, to drop packets hindering end-to-end communication. In this paper, a new scheme is proposed against collusion black hole and slander attacks in MANETs, named E2EACK. A novel method is used to detect collusion attacks due to collusive malicious nodes which cooperate in the route discovery, but refuse to forward data packets and do not disclose the misbehavior of each other. Contrary to existing methods that detect only collusion black hole attacks, the E2EACK also detects slander attacks and framing attacks. Moreover, the E2EACK uses ACKnowledgment packet to detect malicious nodes on the path and Message Authentication Code (MAC) to authenticate the sender of each data packet. Analytical and simulation results show that the proposed scheme considerably decreases the routing overhead and increases the packet delivery ratio compared to the existing methods.  相似文献   
5.
In this paper, we propose VEISV (vulnerable – exposed – infectious – secured – vulnerable) network worm attack model, which is appropriate for measuring the effects of security countermeasures on worm propagation. Contrary to existing models, our model takes into consideration accurate positions for dysfunctional hosts and their replacements in state transition. Using the reproduction rate, we derive global stability of a worm-free state and local stability of a unique worm-epidemic state. Furthermore, simulation results show the positive impact of increasing security countermeasures in the vulnerable state on worm-exposed and infectious propagation waves. Finally, equilibrium points are confirmed by phase plots.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号