首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23篇
  免费   0篇
无线电   22篇
自动化技术   1篇
  2014年   2篇
  2013年   2篇
  2012年   1篇
  2011年   1篇
  2010年   1篇
  2009年   1篇
  2005年   1篇
  2004年   4篇
  2003年   6篇
  2002年   3篇
  1997年   1篇
排序方式: 共有23条查询结果,搜索用时 46 毫秒
11.
    
The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security attacks, although already very long, continues to augment impeding the expansion of these networks. The trust management schemes consist of a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them, either for data forwarding, data aggregation or any other cooperative function. A variety of trust models which follow different directions regarding the distribution of measurement functionality, the monitored behaviours and the way measurements are used to calculate/define the node's trustworthiness has been presented in the literature. In this paper, we survey trust models in an attempt to explore the interplay among the implementation requirements, the resource consumption and the achieved security. Our goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
12.
Lawrence  V.  Zervos  N.  Zahariadis  T.  Meliones  A. 《Telecommunication Systems》2003,23(3-4):335-349
Residential networks are expected to open a huge market and introduce a bright, new era in telecommunications, by exponentially increasing the network usage, via broadband, added value services. Despite the business risks, investments made by the telecommunication industries clearly express the belief that the home networking market is about to take off. In this paper, a home network architecture for the provision of interactive multimedia services is considered and various access and indoor networking alternatives are presented. Then the focus is put on the Residential Gateway (RG), as a single point of networks convergence. Based on prototypes development, laboratory experiments and field trials throughout Europe and USA, a modular and a compact RG hardware architecture are described and compared, while the software architecture to support the RG functionality is described and the main building blocks are analyzed. Finally, a Web browser-based network management and control application that provides a visual metaphor of the RG is presented. This revised version was published online in September 2006 with corrections to the Cover Date.  相似文献   
13.
14.
Global roaming in next-generation networks   总被引:5,自引:0,他引:5  
Next-generation mobile/wireless networks are already under preliminary deployment. Mobile/wireless all-IP networks are expected to provide a substantially wider and enhanced range of services. However, an evolutionary rather than revolutionary approach to the deployment of a global all-IP wireless/mobile network is expected. To support global roaming, next-generation networks will require the integration and interoperation of mobility management processes under a worldwide wireless communications infrastructure. In this article global roaming is addressed as one of the main issues of next-generation mobile networks. Apart from the physical layer connectivity and radio spectrum allocation plans, mobility in a hierarchical structured scheme is discussed. An all-IP wireless/mobile network combined with inherited mobility schemes of each network layer and Mobile IP extensions is proposed. In this respect the mobility management mechanisms in WLAN, cellular, and satellite networks are analyzed, and an all-IP architecture is described and an enhanced roaming scenario presented  相似文献   
15.
Connecting each house to a broadband access network represents an unprecedented opportunity to offer added-value services and broadband Internet access to residential users and expand the customer base beyond the corporate environment. Home networks, however, may be the last barrier to end-to-end multimedia service provisioning. Although a large number of houses have PCs, modems or multimedia network-enabled appliances, the majority are not equipped to support their interconnection, and most consumers are unwilling or cannot afford large-scale home rewiring. This paper reviews the available home-networking technologies and provides a comparison of the competing broadband in-home technologies. The focus is on technologies that do not require rewiring the home, either reusing the existing wiring or using wireless technology. The paper also discusses the residential gateway (RG) initiative, which provides a single point of convergence between the in-home and the access networks  相似文献   
16.
The Internet is incontrovertibly a great success that has changed our social and economic world. Today, over one billion users access the Internet on regular basis, more than 100 million users have downloaded at least one (multi) media file, and over 47 million of them do so regularly, searching in more than 160 exabytes of content. The content is expected to rise to more than 990 exabytes before 2012, fueled mainly by the users themselves [1]. It is envisaged that in the near- to mid-term future, mobile Internet will provide the means to share and distribute (new) multimedia content and services with superior quality and striking flexibility, in a trusted and personalized way, improving citizens? quality of life, working conditions, edutainment, and safety.  相似文献   
17.
    
The usability of wireless sensor networks in modern applications requires the fulfillment of dynamic Quality of Service (QoS) requirements that can only be met in a reactive manner by the introduction of composite routing metrics, capturing several distinct network characteristics. However, combining routing metrics is neither a trivial nor an arbitrary task, given the routing protocol requirements and routing metrics properties. In this paper, the theoretical framework of routing algebra formalism is adopted and extended to incorporate single or composite routing metrics, because the satisfaction of routing algebra properties ensures convergence, optimality, and loop‐freeness. Moreover, packet forwarding indication is defined as a new trust metric for systems (a) with or (b) without network retransmissions to avoid forwarding attacks, while a novel composite routing metric is presented, combining link reliability and trust‐awareness in an additive manner, fulfilling the theoretical requirements. Finally, this composite metric is applied to the Routing Protocol for Low Power and Lossy Networks via simulations, which verify its efficiency in several scenarios, including the comparison between lexical and additive metric composition approaches. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
18.
    
As the applications of wireless sensor networks proliferate, the efficiency in supporting large sensor networks and offering security guarantees becomes an important requirement in the design of the relevant networking protocols. Geographical routing has been proven to efficiently cope with large network dimensions while trust management schemes have been shown to assist in defending against routing attacks. Once trust information is available for all network nodes, the routing decisions can take it into account, i.e. routing can be based on both location and trust attributes. In this paper, we investigate different ways to incorporate trust in location‐based routing schemes and we propose a novel way of balancing trust and location information. Computer simulations show that the proposed routing rule exhibits excellent performance in terms of delivery ratio, latency time and path optimality. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
19.
(R)evolution toward 4G mobile communication systems   总被引:1,自引:0,他引:1  
  相似文献   
20.
Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The applicability of legacy security solutions is disputable (if not infeasible), due to severe restrictions in node and network resources. Although confidentiality, integrity and authentication measures assist in preventing specific types of attacks, they come at high cost and, in most cases, cannot shield against routing attacks. To face this problem, we propose a secure routing protocol which adopts the geographical routing principle to cope with the network dimensions, and relies on a distributed trust model for the detection and avoidance of malicious neighbours. A novel function which adaptively weights location, trust and energy information drives the routing decisions, allowing for shifting emphasis from security to path optimality. The proposed trust model relies on both direct and indirect observations to derive the trustworthiness of each neighboring node, while it is capable of defending against an increased set of routing attacks including attacks targeting the indirect trust management scheme. Extensive simulation results reveal the advantages of the proposed model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号