首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69篇
  免费   8篇
  国内免费   16篇
工业技术   93篇
  2023年   1篇
  2022年   5篇
  2021年   4篇
  2019年   1篇
  2017年   1篇
  2016年   1篇
  2015年   5篇
  2014年   5篇
  2013年   8篇
  2012年   6篇
  2011年   11篇
  2010年   7篇
  2009年   7篇
  2008年   7篇
  2007年   8篇
  2006年   9篇
  2005年   3篇
  2004年   4篇
排序方式: 共有93条查询结果,搜索用时 15 毫秒
1.
In traditional networks special efforts are put to secure the perimeter with firewalls: particular routers that analyze and filter the traffic to separate zones with different levels of trust. In wireless multi-hop networks the perimeter is a concept extremely hard to identify, thus, it is much more effective to enforce control on the nodes that will route more traffic. But traffic filtering and traffic analysis are costly activities for the limited resources of mesh nodes, so a trade-off must be reached limiting the number of nodes that enforce them. This work shows how, using the OLSR protocol, the centrality of groups of nodes with reference to traffic can be estimated with high accuracy independently of the network topology or size. We also show how this approach greatly limits the impact of an attack to the network using a number of firewalls that is only a fraction of the available nodes.  相似文献   
2.
针对传统多点中继(MPR)机制因使用贪心算法而导致求解集合冗余的问题,通过将蚁群优化算法与MPR机制相结合,提出一种基于状态信息的动态更新蚁群优化(DUACO)算法。与传统状态更新机制相比,该算法添加了信息素的动态更新机制和补偿-惩罚规则,考虑到节点移动性将会影响求解集合的精确度,重新定义蚁群算法中的路径选择函数,并将节点移动状态信息加入计算过程。实验结果表明,DUACO算法不仅能够有效降低MPR集合冗余以及提高网络性能,而且还可解决启发式蚁群算法易陷入局部最优解的问题。  相似文献   
3.
针对移动自组织网络路由的可靠运行和安全保障问题,提出一种基于Dempster-Shafer证据理论的节点信任评估模型。利用历史交互信息计算直接信任度,通过邻居节点的推荐度量值获取间接信任度。对直接和间接信任度进行权重修正后根据Dempster组合规则合成,得到节点全局信任度。利用该模型对优化链络状态路由协议的多点中继技术进行优化,设计改进的路由协议TOLSR。仿真结果表明,TOLSR协议能发现和抑制网络的自私节点和恶意节点,有效提高移动自组织网络的可靠性,证明了该信任度评估模型的有效性和合理性。  相似文献   
4.
There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established.  相似文献   
5.
移动自组网中节点通信时路由开销较大,从而引起整个自组网的能耗过高;为了解决这一问题,针对移动自组网的现实组网特征进行了研究,提出了基于复杂网络理论的移动自组网路由算法;在该路由算法中,路由发现基于源节点到目的节点的梯度方向,源节点选取下一级跳数据转发对象时,在其邻域范围内以选取路径是否符合最速下降法作为判断依据;当源节点和目的节点之间存在的节点个数超过复杂网络理论中的达到条件时,源节点在路由方向上选取其邻域内最接近的节点进行转发后,按照最速下降法继续寻找最优路径;实验表明,该路由算法具有较少的跳级数,可以减轻整个自组网的数据存储压力,路由开销在节点疏密度不同时,介于OLSR协议和AODV协议之间.  相似文献   
6.
求解最小MPR集的蚁群算法与仿真   总被引:1,自引:0,他引:1  
在分析利用贪心策略启发式算法求解最小MPR集的缺陷基础上,引入蚁群算法对最小MPR集进行求解.首先定义了节点及其出度和入度,并根据节点的出度和入度限制,给出了求解最小MPR集的蚁群算法.然后,对蚁群算法的3种模型Ant-Cycle、Ant-Quantity和Ant-Density加以改进,并对这3种改进模型的收敛性进行分析与实验.实验采用了圆形分布和理想均匀分布2种拓扑结构,前者实验结果表明Ant-Cycle模型的收敛速度较快,后者结果表明Ant-Cycle模型和Ant-Density模型各有优势.因此,最小MPR集的蚁群算法的模型选择需依据拓扑结构确定.最后,使用OPNET基于该算法对数据链的点对多点的点名呼叫工作方式进行模拟仿真,选择的统计量显示了节点的连通性和数据一致性,验证了该算法的合理性.  相似文献   
7.
In this paper we design and implement the pseudo session initiation protocol (p-SIP) server embedded in each mobile node to provide the ad-hoc voice over Internet protocol (VoIP) services. The implemented p-SIP server, being compatible with common VoIP user agents, integrates the standard SIP protocol with SIP presence to handle SIP signaling and discovery mechanism in the ad-hoc VoIP networks. The ad-hoc VoIP signaling and voice traffic performances are analyzed using E-model R rating value for up to six hops in the implemented test-bed. We also conduct the interference experiments to imitate the practical ad-hoc VoIP environment. The analyzed results demonstrate the realization of ad-hoc VoIP services by using p-SIP server.  相似文献   
8.
卿利 《计算机应用研究》2011,28(4):1527-1529
为了解决现有无线自组织网络地址自动配置协议过于复杂、开销大、可实现性不强的问题,利用OLSR在全网拓扑信息维护、低开销消息洪泛等方面的优势,提出一种以OLSR为基础的地址自动配置方案。实现IP地址的快速分配,并只需对OLSR协议消息作简单修改即可在网络运行过程中维护地址的唯一性。所提出的方案具有开销低、实现简单的特点,适合大型网络地址分配需要。  相似文献   
9.
一种基于邻居信任评估的虫洞防御机制   总被引:6,自引:0,他引:6  
洪亮  洪帆  彭冰  陈晶 《计算机科学》2006,33(8):130-133
移动adhoc网是一种新型无线移动网络,具有无中心、自组织、拓扑结构变化频繁以及开放式通讯信道等特性,因此adhoc网络下的路由协议所面临的安全问题比有线网环境中更为严重。虫洞攻击就是其中的一种,能够对adhoc网络产生致命的影响。在这种攻击下,网络的路由机制将会紊乱,特别是那些依赖通过接收对方的广播报文进行邻居探测的路由协议。本文首先从虫洞形成的根源上入手,重新定义了邻居的概念,强调了邻居作为节点信息转发第一站的功能。然后根据邻居定义,引入简化的Marsh信任模型,将邻居的以往表现作为信任评估的经验来源,再通过具体公式对邻居关系做出判定。在具体的路由过程中,节点根据信任评估值选取高可信度的邻居作为下一跳的转发节点,从而避免虫洞攻击的危害。为了验证方法的可行性,本文将模型应用于OLSR路由协议中并在NS2中进行了仿真。  相似文献   
10.
We consider the problem of assuring the trustworthiness (i.e. reliability and robustness) and prolonging the lifetime of wireless ad hoc networks, using the OLSR routing protocol, in the presence of selfish nodes. Assuring the trustworthiness of these networks can be achieved by selecting the most trusted paths, while prolonging the lifetime can be achieved by (1) reducing the number of relay nodes (MPR) propagating the topology control (TC) messages and (2) considering the residual energy levels of these relay nodes in the selection process. In this paper, we propose a novel clustering algorithm and a relay node selection algorithm based on the residual energy level and connectivity index of the nodes. This hybrid model is referred to as H-OLSR. The OLSR messages are adapted to handle the cluster heads election and the MPR nodes selection algorithms. These algorithms are designed to cope with selfish nodes that are getting benefits from others without cooperating with them. Hence, we propose an incentive compatible mechanism that motivates nodes to behave truthfully during the selection and election processes. Incentive retributions increase the reputation of the nodes. Since network services are granted according to nodes’ accumulated reputation, the nodes should cooperate. Finally, based on nodes’ reputation, the most trusted forwarding paths are determined. This reputation-based hybrid model is referred to as RH-OLSR. Simulation results show that the novel H-OLSR model based on energy and connectivity can efficiently prolong the network lifetime, while the RH-OLSR model improves the trustworthiness of the network through the selection of the most trusted paths based on nodes’ reputations. These are the two different processes used to define the reputation-based clustering OLSR (RBC-OLSR) routing protocol.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号