【摘 要】
:
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols.A new approach-tunnel key node identification (TKNI) was pro
【机 构】
:
Inst.of Command Automation,Inst.of Communication Eng.
论文部分内容阅读
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols.A new approach-tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.
其他文献
The technique state to design counter-current extraction columns is based on the performance of pilot plant experiments. The modelling is then either with the e
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7
Objective To observe the therapeutic effect of non-surgical treatment on diabetic Chinese with chronic periodontitis. Methods Moderate to advanced chronic perio
The Wide-Sense Stationary Uncorrelated Scattering (WSSUS) model has long been viewed as a basic channel model to describe the fading dispersive channel. But non
An experiment is conducted to investigate the effects of lubricant10#, which contains extreme pressure additives T304 and T305, on the rolling contact fatigue (
A new early-late synchronizer is proposed to improve tracking speed. The performance of the traditional early-late synchronizer is analyzed in detail, the resul
An algorithm of auto-searching weld line for welding mobile robot is presented.Auto-searching weld line is that the robot can automatically recognize a weld gro
目的 :考察乳痛宁颗粒剂中当归、川芎、香附子挥发油的最佳提取工艺和 β-环糊精最佳包合工艺。 方法 :用单因素分析考察最佳提取工艺 ,以收油率作为评价提取工艺的指标 ;用
The study of multipoint blank holder force(BHF) control is carried out for hydroforming a complicated shape motorcycle fuel tank. By finite element method (FEM)
Anomaly detection of privileged processes is one of the most important means to safeguard the host and system security. The key problem for improving detection