首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 330 毫秒
1.
The radio link is a broadcast channel used to transmit data over mobile networks. Because of the sensitivity of this network part, a security mechanism is used to ensure users’ information. For example, the third generation of mobile network security is based on the KASUMI block cipher, which is standardized by the Third Generation Partnership Project (3GPP). This work proposes an optimized and enhanced implementation of the KASUMI block cipher based on a chaotic generator. The purpose is to develop an efficient ciphering algorithm with better performance and good security robustness while preserving the standardization. The proposed design was implemented on several Xilinx Virtex Field Programmable Gate Arrays (FPGA) technologies. The synthesis results and a comparison with previous works prove the performance improvement of the proposed cipher block in terms of throughput, used hardware logic resources, and resistance against most cryptanalysis attacks.  相似文献   

2.
Modern cellular networks allow users to transmit information at high data rates, have access to IP-based networks deployed around the world, and access to sophisticated services. In this context, not only is it necessary to develop new radio interface technologies and improve existing core networks to reach success, but guaranteeing confidentiality and integrity during transmission is a must. The KASUMI block cipher lies at the core of both the f8 data confidentiality algorithm and the f9 data integrity algorithm for Universal Mobile Telecommunications System networks. KASUMI implementations must reach high performance and have low power consumption in order to be adequate for network components. This paper describes a specialized processor core designed to efficiently perform the KASUMI algorithm. Experimental results show two orders of magnitude performance improvement over software only based implementations. We describe the used design technique that can also be applied to implement other Feistel-like ciphering algorithms. The proposed architecture was implemented on a FPGA, results are presented and discussed.  相似文献   

3.
目前人们频繁地使用移动通信进行信息交流,通信系统中信息的安全性以及网络资源使用的安全性将变得越来越重要。着重研究了移动通信系统的安全。首先对3G安全体系机构作了详细的分析,概述了3G的安全威胁,安全原则、目标和要求,分析了3G的安全特征,对3G接入网络中的认证和密钥协商、数据机密性服务、数据完整性服务等机制进行了探讨。然后,对3G加密算法KASUMI算法作了研究,详细介绍了算法的原理和构成,并对KASUMI算法进行了程序仿真。  相似文献   

4.
靳立忠  常桂然  贾杰 《控制与决策》2010,25(12):1857-1860
针对传感器节点的分布优化问题,研究了在保证网络连通性的前提下,极大化移动传感器网络的有效覆盖面积问题,提出了一种基于差分进化算法的移动传感器网络节点分布优化机制.仿真实验结果表明,该算法能以相对较小的代价快速完成移动传感器网络节点的分布优化,提高网络的有效覆盖率,实现移动传感器网络布局的全局优化.  相似文献   

5.
6.
无线移动Ad Hoc网络高效路由技术研究   总被引:2,自引:3,他引:2  
无线移动自组织AdHoc网络是目前国际上前沿和热点的研究领域。综述了AdHoc网络的基本概念、原理、特点、研究现状和相关研究问题,提出了能耗平衡、瞬态链路/路由、路由算法集成等概念和思想,给出了优化路由选择的数学模型,在此基础上提出了我们自己的基于代价优化、能耗平衡、综合考虑链路状况的优化的路由算法,谊算法可以显著提高网络的性能及增加结点和网络的寿命。  相似文献   

7.
This paper presents a novel block-based neural network (BBNN) model and the optimization of its structure and weights based on a genetic algorithm. The architecture of the BBNN consists of a 2D array of fundamental blocks with four variable input/output nodes and connection weights. Each block can have one of four different internal configurations depending on the structure settings, The BBNN model includes some restrictions such as 2D array and integer weights in order to allow easier implementation with reconfigurable hardware such as field programmable logic arrays (FPGA). The structure and weights of the BBNN are encoded with bit strings which correspond to the configuration bits of FPGA. The configuration bits are optimized globally using a genetic algorithm with 2D encoding and modified genetic operators. Simulations show that the optimized BBNN can solve engineering problems such as pattern classification and mobile robot control.  相似文献   

8.
In this paper, we consider the problem of survivable routing in dynamic WDM networks with single link failure model. Our work mainly concerns in how to dynamically determine a protection cycle (i.e., two link-disjoint paths between a node pair) to establish a dependable lightpath with backup paths sharing. This problem is identified as NP-complete, thus a heuristic for finding near optimal solution with reasonable computation time is usually preferred. Inspired from the principle of ant colony optimization, we propose in this paper an ant-based mobile agents algorithm for this problem with improved blocking performance. To enable the new ant-based algorithm, we propose to use on each network node both a routing table that contains a set of feasible protection cycles between source destination nodes and also a pheromone table for mobile agents. By keeping a suitable number of mobile agents in a network to continually and proactively update the routing tables based on the current network congestion state, the routing solution of a connection request can be obtained with a reasonable computation time. Extensive simulation results upon the ns-2 network simulator and two typical network topologies show that our new algorithm can achieve a significantly lower blocking probability than the promising algorithm for dynamic lightpath protection proposed in [11] with a comparable computation complexity.  相似文献   

9.
由于移动边缘计算网络在边缘位置部署,在多用户并发的情况下带宽资源优化策略容易出现高计算负荷,降低带宽资源优化的效果。为了解决这一问题,提出基于萤火虫算法的移动边缘计算网络带宽资源优化策略。在服务器之间数据连续传输的情况下,确定网络内用户分布情况,计算网络运行需要消耗的能量,利用萤火虫算法建立以带宽资源为中心的数学模型,以移动边缘计算网络的各项参数作为依据,对数学模型求解,得到最优解后,以用户最大收益为目标部署优化策略。实验结果表明:提出的基于萤火虫算法的带宽资源优化策略计算延迟小,网络带宽资源优化效能高,整体计算性能得到了明显提升。  相似文献   

10.
针对移动IP网络中三角路由算法效率不高,导致移动网络性能难以达到最优的问题,提出了一种基于PSO和共轭梯度法的移动IP路由优化方案。首先利用粒子来取代网络节点中的路由选择表,将IP网络和粒子群算法联系起来,研究将粒子群算法用于求解移动IP路由选择当中的最短路径,针对粒子群算法早熟收敛和局部搜索能力不足的缺陷,引入局部搜索能力强的共轭梯度算法对其进行优化,从而有效提高找出移动IP最短路由的速度;仿真结果表明了该算法的有效性。  相似文献   

11.
主要研究基于移动终端的网页融合处理方法,目的是实现在移动终端上无缝地浏览互联网页。要在移动终端上顺利浏览此页面,需要克服移动网络的带宽限制和移动终端的处理能力限制。分析了此种情况,将问题转化为给定一个网页的HTML源文件,解决突破带宽限制和终端处理能力限制的问题;从而提出了一种5C融合处理方法:通过5C处理流程(Convert,Cut,Compress,Cache,Converge),得出最适合移动终端的HTML源文件,支持在移动终端上顺利的浏览互联网页面。  相似文献   

12.
5G / B5G移动通信系统的高带宽、高可靠性和低延迟的通信需求需要更多新技术的支持. 毫米波由于其丰富的频谱资源和极高的带宽容量而成为5G/B5G移动通信系统的研究热点之一. 不同于以往由有线网络主导的互联网架构, 如今的移动互联网已经成为无线接入网和高速核心网的融合. 但是目前对毫米波端到端通信传输性能的研究工作还相对较少, 而且多采用仿真实验. 本文利用真实网络设备, 通过开展真实网络环境下的实验, 对毫米波链路基本传输性能和5G/B5G毫米波网络端到端通信系统中TCP传输性能进行测量分析, 研究5G/B5G毫米波网络传输过程中的链路瓶颈, 为设计毫米波端到端网络传输协议, 提高网络传输吞吐率奠定基础.  相似文献   

13.
The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.  相似文献   

14.
Adaptive control for mobile robot using wavelet networks   总被引:2,自引:0,他引:2  
This work improves recent results concerning the adaptive control of mobile robots via neural and wavelet networks, in the sense that the stability proof, based on the second method of Lyapunov, encompasses (1) unmodeled dynamics and disturbances in the robot model; (2) adaptation of all parameters in the wavelet networks; and (3) a flexible procedure for automatically adjusting the wavelet architecture. Prior knowledge of dynamic of the mobile robot and network training is not necessary because the controller learns the dynamics online. The wavelet network's parameters and structure are also adapted online. Simulation results are presented by using parameters of the Magellan mobile robot from IS Robotics, Inc.  相似文献   

15.
设计了一种基于虚电路的拒绝服务保护基体系结构;介绍了基于虚电路的资源分配算法;在基于服务元网络体系结构的虚电路结构原型系统中实现了所提出的资源分配算法。与其他算法相比,该算法能有效对抗来自网络的恶意授权实体的拒绝服务攻击。  相似文献   

16.
张鑫  杨晓元  朱率率 《计算机应用》2016,36(8):2231-2235
针对终端接入移动网络缺乏可信性验证问题,提出一种移动网络可信匿名认证协议,移动终端在接入网络时进行身份验证和平台完整性认证。在可信网络连接架构下,给出了可信漫游认证和可信切换认证的具体步骤,在认证时利用移动终端中预存的假名和对应公私钥对实现了用户匿名隐私的保护。安全性分析表明,协议满足双向认证、强用户匿名性、不可追踪性和有条件隐私保护。协议中首次漫游认证需要2轮交互,切换认证需1轮即可完成,消息交换轮数和终端计算代价优于同类可信认证协议。  相似文献   

17.
随着移动设备和新兴移动应用的广泛使用,移动网络中流量的指数级增长所引发的网络拥塞、时延较大、用户体验质量差等问题无法满足移动用户的需求。边缘缓存技术通过对网络热点内容的复用,能极大缓解无线网络的传输压力;同时,该技术减少用户请求的网络时延,进而改善用户的网络体验,已经成为面向5G/Beyond 5G的移动边缘计算(MEC)中的关键性技术之一。围绕移动边缘缓存技术,首先介绍了移动边缘缓存的应用场景、主要特性、执行过程和评价指标;其次,对以低时延高能效、低时延高命中率及最大化收益为优化目标的边缘缓存策略进行了分析和对比,并总结出各自的关键研究点;然后,阐述了支持5G的MEC服务器的部署,并在此基础上分析了5G网络中的绿色移动感知缓存策略和5G异构蜂窝网络中的缓存策略;最后,从安全、移动感知缓存、基于强化学习的边缘缓存、基于联邦学习的边缘缓存以及Beyond 5G/6G网络的边缘缓存等几个方面讨论了边缘缓存策略的研究挑战和未来发展方向。  相似文献   

18.
提出了一种跨层的6LoWPAN无线传感器网络移动管理方案。首先提出了6LoWPAN网络体系结构, 基于该体系结构, 提出了一种跨层的移动切换算法。在此算法中, 网络层移动切换与链路层移动切换同时进行, 在三层切换过程中, 移动节点无须转交地址配置, 也无须参与网络层的移动切换过程, 且无须参与移动切换过程, 在二层切换过程中, 移动节点无须扫描所有信道, 通过获取的信道信息直接进行二层切换, 因此降低了切换延迟、丢包率和切换代价。  相似文献   

19.
和传统的C/S模型相比,移动代理模型在数据融合方面更适合无线传感器网络.在基于移动代理的数据融合算法中,移动代理访问传感节点的顺序以及总数对算法的效率、网络寿命等有着重大影响.为此提出了一种基于数据融合的移动代理曲线动态路由算法设计方案.通过构造特定数据结构的数据报文和数据表,给出了目标节点基本信息收集算法获取目标节点到处理节点的最优路径;将移动代理路由归结为一个优化问题,由静态路由算法求出移动代理迁移的静态最优路由节点序列,进而获得了移动代理基于曲线的动态路由算法.理论分析和模拟实验表明,随着传感器网络规模的增大和传感数据量的增加,和其它算法相比,该算法有更小的网络耗能和延时.  相似文献   

20.
针对无线传感器网络在随机部署移动节点时,存在分布不均匀导致的覆盖率较低的问题,以网络覆盖率最大化为目标建立网络覆盖优化模型,提出一种基于改进鲸鱼优化算法(IWOA)的网络覆盖优化策略;首先,采用量子位Bloch球面坐标编码初始化种群,提升种群多样性,扩展搜索空间的遍历能力;其次,提出一种基于步长改进的位置更新方式,平衡算法的全局探索和局部搜索能力;最后采用莱维飞行,对个体进行扰动更新,提高跳出局部最优的能力。仿真结果表明,将改进后的鲸鱼优化算法应用在WSN覆盖优化中,与标准鲸鱼优化算法和其他文献中的算法相比,有效减少了传感器节点冗余,表现出更快的收敛速度和更高的覆盖率,进而改善网络监测质量,延长网络生存时间。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号