您的位置: 专家智库 > >

国家自然科学基金(61173137)

作品数:5 被引量:8H指数:2
相关作者:黄传河王小毛王斌周浩更多>>
相关机构:武汉大学更多>>
发文基金:湖北省自然科学基金国家自然科学基金国家教育部博士点基金更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 5篇中文期刊文章

领域

  • 4篇自动化与计算...
  • 1篇电子电信

主题

  • 2篇路由
  • 1篇信任
  • 1篇性能指标
  • 1篇一致性
  • 1篇移动自组织
  • 1篇移动自组织网
  • 1篇移动自组织网...
  • 1篇钥匙
  • 1篇认知无线
  • 1篇认知无线电
  • 1篇上下文
  • 1篇审计
  • 1篇数据完整
  • 1篇频谱
  • 1篇频谱感知
  • 1篇自组织
  • 1篇自组织网
  • 1篇自组织网络
  • 1篇网络
  • 1篇无线

机构

  • 2篇武汉大学

作者

  • 2篇王小毛
  • 2篇黄传河
  • 1篇周浩
  • 1篇王斌

传媒

  • 3篇Wuhan ...
  • 1篇通信学报
  • 1篇华中科技大学...

年份

  • 1篇2016
  • 2篇2015
  • 1篇2014
  • 1篇2013
5 条 记 录,以下是 1-5
排序方式:
Quantitative Assessment Model on Path Assignment for SDNs
2016年
Software defined networking(SDN) has emerged as an efficient network technology for lowering operating cost through simplified hardware, software and management. Specific research focus has been placed to achieve a successful carrier grade network with SDN, in terms of scalability, reliability, Qo S and service management. In this paper, graph theory and traffic engineering are used to model the network state transitions and path assignment problem at first. Next, we present a quantitative assessment model on path assignment for a centralized controller to assess different kinds of path assignments, considering optimal path utilization, network load balance, network load volatility, and resource utilization simultaneously. In the end, an example forquantitatively assessing existing different path assignments is detailed to illustrate our proposed model.
WANG XiaomaoHUANG ChuanheSHI JiaoliFAN XiyinZHOU Hao
MANET路由协议性能指标的计算方法
2013年
协议指标是衡量协议性能的重要因素,但是在实际评测中,还没有统一的协议指标计算方法.针对该问题,提出了移动自组织网络(MANET)协议评测系统中性能指标的计算方法,选取典型的性能指标并详细描述了指标的计算方法以及指标所用参数的产生、存储和提取方法.通过对网络运行时产生的大量数据进行合理地组织存储,提取出相关数据并计算性能指标.仿真结果显示提出的方法与传统方法相比更简单,更高效.
范茜莹黄传河王小毛吕怡龙张联镇
关键词:移动自组织网络路由协议性能指标计算方法
模拟人群信任和决策机制的协作频谱感知方法被引量:3
2014年
通过模拟人群内部的信任和决策机制,针对多用户的频谱协作感知一致性问题,提出了一种分布式算法。该算法首先通过网络的历次协作过程预测出各感知用户的动态可信值,据此产生用户的相对可信值,并结合决策机制使得用户之间进行数据交互,随着数据的可信、迭代交互,所有用户状态将趋于一致,最后通过判定算法得出最终结果。算法充分考虑了实际环境中各用户频带感知能力的不平衡性,而且各次级用户只需要进行少量局部数据交换即可实现协作感知,与传统的OR-rule、1-out-of-N rule以及普通迭代法有较大区别。对3种数据篡改攻击进行了分析,并在预测算法的基础上提出了相应的安全策略。理论分析与仿真结果表明,新算法在准确性和安全性上均优于传统合作频谱感知算法,能显著提高频谱感知准确率,同时兼具较强的防攻击能力。
王小毛黄传河吕怡龙王斌范茜莹周浩
关键词:认知无线电一致性协作频谱感知
Context-Aware Adaptive Routing for Opportunistic Network被引量:1
2015年
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead.
WANG XiaomaoHUANG ChuanheZHOU HaoSHI JiaoliHE KaiDAN Feng
关键词:路由算法
Public Auditing for Encrypted Data with Client-Side Deduplication in Cloud Storage被引量:4
2015年
Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a public auditing scheme for cloud storage systems, in which deduplication of encrypted data and data integrity checking can be achieved within the same framework. The cloud server can correctly check the ownership for new owners and the auditor can correctly check the integrity of deduplicated data. Our scheme supports deduplication of encrypted data by using the method of proxy re-encryption and also achieves deduplication of data tags by aggregating the tags from different owners. The analysis and experiment results show that our scheme is provably secure and efficient.
HE KaiHUANG ChuanheZHOU HaoSHI JiaoliWANG XiaomaoDAN Feng
关键词:公共审计数据完整
共1页<1>
聚类工具0