共查询到20条相似文献,搜索用时 15 毫秒
1.
移动通信利用自由空间传输,其通信保密性较差,只要利用侦查监视技术就能识别通话人的位置,清楚的窃听到通话双方的交谈。对于一些涉密部门和单位来说,移动通信网络可能成为隐藏在心脏地带的“窃听器”。所以必须采取相应的安全技术,本文将介绍常见移动通信网络所使用的安全技术。 相似文献
2.
3.
本文论述了TMN产生的背景以及TMN的体系结构 ,并根据HiTMN的开发实践讨论了TMN发展的若干重要问题。 相似文献
4.
根据电信网的技术特点和市场需求,提出了基于CORBA技术的传输网统一网络管理系统的体系结构及功能框架,并分析了该系统的优势和特点。 相似文献
5.
6.
7.
针对无线语音通信易被监听等特点,设计了一种基于混沌保密的无线语音通信系统.采用洛伦兹系统,以TMS320C6713DSP和射频收发器为核心,在分析系统的工作原理和工作过程并给出了硬件原理图及软件流程图的基础上,说明了洛伦兹系统在DSP上的实现方法及改进型混沌同步.最后,利用DSP进行了混沌保密的无线语音通信实验并得到了... 相似文献
8.
Energy saving is a paramount concern in wireless sensor networks (WSNs). A strategy for energy saving is to cleverly manage the duty cycle of sensors, by dynamically activating different sets of sensors while non-active nodes are kept in a power save mode. We propose a simple and efficient approach for selecting active nodes in WSNs. Our primary goal is to maximize residual energy and application relevance of selected nodes to extend the network lifetime while meeting application-specific QoS requirements. We formalize the problem of node selection as a knapsack problem and adopt a greedy heuristic for solving it. An environmental monitoring application is chosen to derive some specific requirements. Analyses and simulations were performed and the impact of various parameters on the process of node selection was investigated. Results show that our approach outperforms a naı¨ve scheme for node selection, achieving large energy savings while preserving QoS requirements. 相似文献
9.
Deployment of heterogeneous wireless networks is spreading throughout the world as users want to be connected anytime, anywhere, and anyhow. Meanwhile, these users are increasingly interested in multimedia applications such as video streaming and Voice over IP (VoIP), which require strict Quality of Service (QoS) support. Provisioning network resources with such constraints is a challenging task. In fact, considering the availability of various access technologies (WiFi, WiMAX, or cellular networks), it is difficult for a network operator to find reliable criteria to select the best network that ensures user satisfaction while maximizing network utilization. Designing an efficient Radio Resource Management (RRM), in this type of environment, is mandatory for solving such problems. In order to provide a better understanding of RRM’s design, this paper presents a detailed investigation of key challenges that constitute an efficient RRM framework. More importantly, an overview with a classification of recent solutions, in terms of decision making, is provided along with the discussion. 相似文献
10.
Salimur Choudhury Kai Salomaa Selim G. Akl 《International Journal of Parallel, Emergent and Distributed Systems》2014,29(2):147-177
Due to the advent of sensor technology and its applications, mobile wireless sensor networks (MWSNs) have gained a significant amount of research interest. In a typical MWSN, sensors can move within the network. We develop a set of probabilistic and deterministic cellular automaton (CA)-based algorithms for motion planning problems in MWSNs. First, we consider a scenario where a group of sensors are deployed and they need to disperse in order to maximise the area covered by the network. In this variant of the problem we do not explicitly consider that the sensors should maintain the connectivity of the network while they move. Second, we consider a scenario where the sensors are initially randomly distributed and they need to disperse autonomously to both maximise the coverage of the network and maintain its connectivity. We carry out extensive simulations of both deterministic and randomised variants of the algorithms. For the first variant of the problem we compare our algorithms with one previous algorithm and find that our algorithm yields better network coverage than the earlier algorithm. We also find that probabilistic algorithms have better overall performance for the second variant. CA algorithms rely only on local information about the network and, hence, they can be used in practice for MWSN problems. On the other hand, locality of the algorithm implies that maintaining connectivity becomes a non-trivial problem. 相似文献
11.
因能耗敏感与有效连通性特征等所造成的网络抗毁性能低下是制约无线传感器网络规模应用的主要技术瓶颈之一。针对该问题,利用二维元胞自动机考虑能耗失效、连通性失效等五种失效情形,建立无线传感器网络拓扑演化规则,并基于随机性失效策略与选择性失效策略对网络抗毁性能展开分析。研究表明,网络面临随机失效时抗毁性能明显优于选择性失效。通过失效节点构成分析,在随机失效策略下,能耗失效为造成网络失败主因,而在选择性失效策略下,连通性失效对性能影响更为显著。基于所得结论,为进一步研究网络抗毁性能提升方法提供有益借鉴。 相似文献
12.
耿勇 《自动化与仪器仪表》2012,(2):188-190
首先对智能化网络管理技术相关的现状和趋势进行了分析;接着介绍结合了基于策略的网络管理技术、基于规则的告警关联分析技术、基于工作流的过程控制技术实现的智能化综合网络管理系统原型系统。 相似文献
13.
提出了一种流量自适应的无线传感器网络簇内通信算法。该算法根据各传感器节点所需传送的数据量来给各节点分配长度不等的时隙,使其能在所分配的时隙内有效地传送完所有的数据,减少节点空闲时和节点从睡眠到活跃状态来回切换时所消耗的能量。不同长度的时隙构成了不同长度的帧,整个簇生存期由不同长度的帧构成。仿真实验证明该算法相对于传统TDMA算法和BMA算法既节省了能量,又提高了信道利用率。 相似文献
14.
15.
无线传感器网络中基于低能量自适应聚类层次协议的多帧通信机制 总被引:2,自引:0,他引:2
基于低能量自适应聚类层次(Low Energy Adaptive Clustering Hierachy, LEACH)的通信协议,提出了适用于无线传感器网络的Multi frame LEACH多帧通信机制。通过定量分析传感器节点的通信能量消耗,建立了聚类首领剩余能量与通信流量的关系模型。MF LEACH通信机制加入了聚类状态检查阶段,阐述了可用的规则;在数据传输阶段,应用预测策略动态决定传输数据帧的数量。初步的研究表明:Multi frame LEACH能更有效节省能量,提高通信效率。 相似文献
16.
提出了一种基于改进神经网络的整体优化的动态信道分配方案(GODCA),该算法尽量保证最大程度的紧致分配,网络优化采用Hopfield神经网络,克服了传统动态信道分配方案实现方式繁杂,且往往不能达到紧致分配方式的不足,同时针对神经网络算法随机性强的弱点,提出一种优化的收敛算法。分析和仿真表明,该算法不论在业务量较大,还是较小都有较小的呼阻率和较高的频谱利用率。 相似文献
17.
安全问题是无线传感器网络应用的关键性问题,而密钥管理是安全问题的核心。由于传感器网络的Ad-hoc属性以及资源限制,提供一种正确的密钥管理方案成为一项具有挑战性的工作。对原三密钥管理机制在层次结构上进行了一些简化,而在路由方面提出了进一步的算法,提高了无线传感器网络对外部攻击的抵抗性,并可支持更大规模的网络,同时节点内存负载变化不大,适用于对安全性要求较高的无线传感器网络应用。 相似文献
18.
The technological advances in wireless sensor network (WSN) enable the development of complex applications including health monitoring, environmental sampling, and disaster area monitoring. WSN applications deploy battery‐powered sensors at remote locations for long periods. The development of energy‐efficient and complex WSN applications therefore requires in‐depth embedded systems programming skills that are normally not found in domain experts. So that this challenge can be overcome, programming environments for WSN need to offer a high degree of productivity, flexibility, and efficiency at the same time. In this work, we present Curracurrong, a development environment for WSNs that is based on expressing queries with stream programming. A query is represented as a stream graph consisting of stream operators and communication channels. Curracurrong provides an extensible stream operator library that adapts to a wide range of applications. It uses a novel placement algorithm that optimizes the energy consumption on sensor nodes. Through a case study, we demonstrate the productivity and flexibility of our system. We conduct experiments that evaluate the energy efficiency of our optimized operator placement algorithm. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
19.
This paper describes a scalable key management and clustering scheme for secure group communications in ad hoc and sensor networks. The scalability problem is solved by partitioning the communicating devices into subgroups, with a leader in each subgroup, and further organizing the subgroups into hierarchies. Each level of the hierarchy is called a tier or layer. Key generation, distribution, and actual data transmissions follow the hierarchy. The distributed, efficient clustering approach (DECA) provides robust clustering to form subgroups, and analytical and simulation results demonstrate that DECA is energy-efficient and resilient against node mobility. Comparing with most other schemes, our approach is extremely scalable and efficient, provides more security guarantees, and is selective, adaptive and robust. 相似文献