Computer Science ›› 2018, Vol. 45 ›› Issue (12): 104-110.doi: 10.11896/j.issn.1002-137X.2018.12.016
• Information Security • Previous Articles Next Articles
XU Jia-jia1,2, BAI Guang-wei1, SHEN Hang1,3
CLC Number:
[1]SONG M K,WANG S,HE T.Exploiting causes and effects of wireless link correlation for better performance [C]∥Computer Communications.IEEE,2015:379-387. [2]WANG S,KIM S M,LIU Y H,et al.CorLayer:A transparent link correlation layer for energy efficient broadcast [J].In MobiCom,2013,23(6):1970-1983. [3]SINGH G.A Survey of Multicast Routing Protocols inMANETS[C]∥International Conference on Futuristic Trends in Engineering & Management.2014. [4]WANG S,BASALAMAH A,SONG M K,et al.Link-Correlation-Aware Opportunistic Routing in Wireless Networks [J].IEEE Transactions on Wireless Communications,2015,14(1):47-56. [5]WANG H,LIU Y,XU S.An Opportunistic Routing ProtocolBased on Link Correlation for Wireless Mesh Networks [M]∥Wireless Communications,Networking and Applications.Springer India,2016. [6]SALEHI M,BOUKERCHE A,DAREHSHOORZADEH A.Modeling and Performance Evaluation of Security Attacks on Opportunistic Routing Protocols for Multihop Wireless Networks [J].Ad Hoc Networks,2016,50(C):88-101. [7]LI L,RAMJEE R,BUDDHIKOT M,et al.Network Coding-Based Broadcast in Mobile Ad-hoc Networks[J].Proceedings -IEEE INFOCOM,2007,5(8):1739-1747. [8]WANG S,KIM S M,YIN Z,et al.Encode When Necessary:Correlated Network Coding Under Unreliable Wireless Links[J].Acm Transactions on Sensor Networks,2017,13(1):1-22. [9]ZHU T,ZHONG Z,HE T,et al.Exploring link correlation for efficient flooding in wireless sensor networks[C]∥Proceedings of the First USENIX/ACM Symposium on Network Systems Design and Implementation (NSDI).2010. [10]WANG S,BASALAMAH A,SONG M K,et al.A Unified Metric for Correlated Diversity in Wireless Networks [J].IEEE Transactions on Wireless Communications,2016,15(9):6215-6227. [11]SRINIVASAN K,JAIN M,CHOI J I,et al.The κ-factor:Inferring protocol performance using inter-link reception correlation[C]∥Proceedings of ACM MOBICOM.2010. [12]ZHAO Z,DONG W,BU J,et al.Exploiting link correlation for core-based dissemination in wireless sensor networks [C]∥Eleventh IEEE International Conference on Sensing,Communication,and Networking.IEEE,2014:372-380. [13]TIAN B.Attack Detection and Defense Technologies in Wireless Sensor Networks[D].Beijing:Beijing University of Posts and Telecommunications,2012.(in Chinese) 田斌.无线传感器网络中攻击检测和防御技术研究[D].北京:北京邮电大学,2012. [14]CHO Y,QU G.Detection and Prevention of Selective Forwar-ding-Based Denial-of-Service Attacks in WSNs [J].International Journal of Distributed Sensor Networks,2013,2013(3):264-273. [15]BORA S,SINGH S,MOHAMAD AS,et al.Watchdog:A Study on Examining and Eliminating Misbehaviour[J].International Journal of Computer Applications,2014,87(3):1-3. [16]AGRAWAL S,JAIN S,SHARMA S.A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks [J].2011,4(1):41-48. [17]MACKE J H,BERENS P,ECKER A S,et al.Generating spike trains with specified correlation coefficients [J].Neural Computation,2009,21(2):397-423. [18]HIGHAM N J.Computing the nearest correlation matrix-aproblem from finance [J].Ima Journal of Numerical Analysis,2002,22(3):329-343. [19]HEINZELMAN W B,CHANDRAKASAN A P,BALAKRISHNAN H.An Application Specific Protocol Architecture for Wireless Microsensor Networks[C]∥IEEE Transactions on Wireless Communication.2002:660-670. |
[1] | ZHAO Luo-cheng, QU Zhi-hao, XIE Zai-peng. Study on Communication Optimization of Federated Learning in Multi-layer Wireless Edge Environment [J]. Computer Science, 2022, 49(3): 39-45. |
[2] | GUO Yi-shan, LIU Man-dan. Anomaly Detection Based on Spatial-temporal Trajectory Data [J]. Computer Science, 2021, 48(6A): 213-219. |
[3] | HE Quan-qi, YU Fei-hong. Review of Low Power Architecture for Wireless Network Cameras [J]. Computer Science, 2021, 48(6A): 369-373. |
[4] | PENG Da-chuan, YANG Xi-min, TANG Wan, ZHANG Xiao, FAN Lei. Dual-NIC Mutual Backup Scheme for Access Point Handoff in Software Defined Wireless Networks [J]. Computer Science, 2021, 48(6A): 427-431. |
[5] | QIAN Guang-ming, YI Chao. Real Time Wireless Connection Scheme for Multi-nodes [J]. Computer Science, 2021, 48(11A): 446-451. |
[6] | JI Xiao-xiang, SHEN Hang, BAI Guang-wei. Non-orthogonal Multiple Access Enabled Scalable Video Multicast in HetNets [J]. Computer Science, 2021, 48(11): 356-362. |
[7] | CAO Su-e, YANG Ze-min. Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine [J]. Computer Science, 2020, 47(8): 319-322. |
[8] | TAO Yang,JI Rui-juan,YANG Li,WANG Jin. Study on Dynamic Priority Admission Control Algorithm in Heterogeneous Wireless Networks [J]. Computer Science, 2020, 47(3): 242-247. |
[9] | LIANG Tao, WANG Tong-xiang, LIU Jian-wei, YANG Jing. Modeling of Jamming Attack and Performance Analysis in Multi-hop Wireless Network [J]. Computer Science, 2019, 46(11A): 414-416. |
[10] | GUO Bin, YU Dan-dan, LU Wei, HUANG Ming-he, ZENG Ya-lin. Selective Network Coding Strategy Based on Packet Loss Prediction [J]. Computer Science, 2019, 46(11A): 399-404. |
[11] | YAO Xin-wei, ZHANG Meng-na, WANG Wan-liang, YANG Shuang-hua. Optimal Energy Allocation Algorithm with Energy Harvesting and Hybrid Energy Storage for Microscale Wireless Networks [J]. Computer Science, 2018, 45(8): 75-79. |
[12] | HAN Xiu-ping, WANG Zhi, PEI Dan. Study on Wi-Fi Fingerprint Anonymization for Users in Wireless Networks [J]. Computer Science, 2018, 45(8): 7-12. |
[13] | XU Wen-hao, SHEN Hang and BAI Guang-wei. Link Burstiness-aware Opportunistic Routing Protocol in Wireless Networks [J]. Computer Science, 2018, 45(5): 83-88. |
[14] | HUANG Rong-xi, WANG Nao, XIE Tian-xiao, WANG Gao-cai. Study on Channel-aware Expected Energy Consumption Minimization Strategy in Wireless Networks [J]. Computer Science, 2018, 45(10): 130-137. |
[15] | GUO Ping, FU De-sheng, ZHU Jie-zhong and CHENG Ya-ping. Lightweight and Shifted CA Architecture for MANET [J]. Computer Science, 2017, 44(3): 145-149. |
|