共查询到20条相似文献,搜索用时 796 毫秒
1.
提出了一种基于锚节点功率调节的加权质心定位算法,通过锚节点的功率调节确定各个锚节点对于未知节点的影响力因子,并将其作为权重计算未知节点的位置,体现了不同锚节点为未知节点位置计算结果的影响.仿真表明,该算法减小了节点的平均定位误差,是一种适合于无线传感器网络的定位方法. 相似文献
2.
3.
4.
机会网络是一种不需要在源节点和目的节点之间存在完整路径,利用节点移动带来的相遇机会实现网络通信的延迟容忍自组织网络,它以“存储-携带-处理-转发”的模式进行.为实现互不相交簇间的信息传输,本文设计了一种带阈值的簇移动模型CMMT,并提出了一种基于摆渡(Ferry)节点与簇节点协作的路由算法(CBSW).该算法减少了冗余的通信和存储开销,以及在Spray阶段簇节点没有遇到目的节点或摆渡节点,进入Wait阶段携带消息的节点采用直接分发方式只向目的节点传输等问题.仿真实验表明,CBSW算法能够增加传输成功率,减少网络开销和传输延迟. 相似文献
5.
6.
研究无线传感器网络节点定位的方法。首先介绍了节点定位的基本原理,在总结节点定位原理的基础上,对节点定位方法的分类依据进行了归纳。在对无线传感器网络节点定位方法的研究中,主要对是否基于测距的节点定位方法进行具体分析,介绍了2种类型的定位方法的基本原理,并对2种类型的定位方法中的典型算法做了具体说明,最后介绍了定位算法的评价标准。 相似文献
7.
李星 《太赫兹科学与电子信息学报》2021,19(3):506-510
针对无线传感网络的节点故障问题,提出一种新的分布式故障节点检测算法(DFDA)。DFDA算法利用节点度信息估计节点对网络的重要性,并尽可能将节点度高的节点保存到网络中。通过比较节点间感测的数据,检测故障节点。为了增强检测的准确性,采用双重测定策略。仿真结果表明,相比于同类算法,DFDA算法提高了检测故障节点的精确度,并降低了虚警率。 相似文献
8.
文章提出了一种基于IPv6实现6LoWPAN和Zigbee两种异构协议通信的架构——6LoWPAN-IPv6-Zigbee。6LoWPAN-IPv6-Zigbee架构在分析异构节点互通问题的基础上,设计了协议转换、网关功能以及节点交互流程;基于现有的异构节点互通方案,设计了的异构节点互通场景、系统结构、协议转换模式以及网关功能;基于寻址、服务发现等互联互通关键技术,设计了异构节点交互流程。6LoWPAN-IPv6-Zigbee架构可为同时存在Zigbee节点与6LoWPAN节点的混合传感网络提供良好互通性。 相似文献
9.
10.
本文介绍了光交叉连接(OXC)节点在光网络中所处的位置,分析了透明OXC节点和非透明OXC节点两种结构的构成方式.同时分析了OXC节点的串扰性能和利用GMPLS协议实现OXC节点的控制方式. 相似文献
11.
The security characteristics of currently emerging all-optical networks display many unique features compared to traditional communication networks. In particular, network transparency raises many security vulnerabilities that differ substantially from conventional failures and should therefore be treated differently. One of the serious problems related to transparency lies in the fact that optical crosstalk is additive and can be exploited to perform service disruption attacks upon the network. Since these attacks can spread rapidly through the network, causing additional problems and triggering multiple alarms, they must be detected and identified at any point in the network where they may occur. However, to monitor all wavelength channels at several detection points into any node is likely to be very expensive. In this paper we provide formal specifications for optical crosstalk that can arise in optical cross-connect nodes. Based on these specifications, we propose an algorithm for localizing the sources of multiple attacks and identifying their nature in all-optical networks. 相似文献
12.
13.
Ad-hoc networks are peer-to-peer self- organized networks that make possible the communication between nodes located in areas,
where communication infrastructure is absent or difficult to implement. For such networks, security is a crucial issue, since
the wireless medium is vulnerable to various attacks. A centralized solution can be easily compromised, leaving the nodes
exposed to threats originating from malicious users. In this paper, a security design for Ad-hoc networks is proposed and
studied, providing authentication to the nodes that follow the principles of threshold secret sharing. 相似文献
14.
光学全交叉网络的快速控制需要在全混洗网络与光学全交叉网络间进行相互转换,本文分别给出了光学全交叉网络转换成全混洗网络及全混洗网络转换成光学全交叉网络时结点、链路、输入端口、输出端口的映射规则,并用电子学进行快速实现。 相似文献
15.
16.
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then launch some malicious attacks (including tampering or discarding useful data collected from source nodes). In this paper, we propose a secure routing and aggregation protocol for sensor networks, which utilizes one-way hash chain and multi-path mechanism to achieve security of wireless sensor networks. 相似文献
17.
This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes located in the architecture of the network. The programmable nodes execute codes to process active packets, which can carry user data and control information. The multiservice network model defined here considers the more pragmatic trends in programmable networks. In this scenario, new security risks that do not appear in traditional IP networks become visible. These new risks are as a result of the execution of code in the programmable nodes and the processing of the active packets. The proposed security architecture is based on symmetric cryptography in the critical process, combined with an efficient manner of distributing the symmetric keys. Another important contribution has been to scale the security architecture to a multidomain scenario in a single and efficient way. 相似文献
18.
19.
一种新的移动Ad hoc网络的安全路由策略 总被引:3,自引:2,他引:1
本文从各网络节点易受攻击、俘获,各网络节点之间不可信赖的角度出发,引入了可信任第三方的信任分散策略并结合Diffie-Hellman密钥交换算法,提出了一种新的移动Adhoc网络的安全路由策略。 相似文献