The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key man...The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key management and secure routing protocol. Although the signature mechanism based on symmetric encryption is high in energy efficiency,it is vulnerable to be attacked and there is a time delay during authentication. Traditional public key encryption mechanism with improvement in security brings in complex algorithm and costs much time,which is not suitable for WSN. In this paper,a signature authentication mechanism,an optimized variant Bellare Namprempre Neven( OvBNN) is presented to quickly complete the authentication by mutual cooperation between nodes so as to make the nodes use the intermediate calculation results of their neighbor nodes directly.Simulation results show that the proposed mechanism is superior to traditional authentication mechanisms both in energy consumption and authentication time.展开更多
This paper investigates the social-aware cooperation(SAC) among mobile terminals(MTs), motivated by the fact that modern smart devices have much improved context awareness. Aware of the social ties, the cooperative ne...This paper investigates the social-aware cooperation(SAC) among mobile terminals(MTs), motivated by the fact that modern smart devices have much improved context awareness. Aware of the social ties, the cooperative network contains two layers of property: social and physical. In order to observe how the social awareness benefit the cooperation performance, we first formulate the social ties between MTs into parameters that can describe the cooperative behaviors by taking the mobility feature into account, defined as the conviction-approval-suspicion(CAS) model. Limited by the processing capability, partner selection is of great practical significance. To this end, the social-aware partner selection strategy is analyzed, and a significant superiority is observed compared to social-unaware selection. By analyzing the cooperative throughput, an explicit relationship between the degrees-of-freedom gain and the social-physical property is finally derived. Simulation results validate the theoretical analysis.展开更多
In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing ...In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay.展开更多
基金Support by the National High Technology Research and Development Program of China(2012AA120802)the National Natural Science Foundation of China(61771186)+1 种基金the Postdoctoral Research Project of Heilongjiang Province(LBH-Q15121) the Undergraduate University Project of Young Scientist Creative Talent of Heilongjiang Province(UNPYSCT-2017125)
文摘The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key management and secure routing protocol. Although the signature mechanism based on symmetric encryption is high in energy efficiency,it is vulnerable to be attacked and there is a time delay during authentication. Traditional public key encryption mechanism with improvement in security brings in complex algorithm and costs much time,which is not suitable for WSN. In this paper,a signature authentication mechanism,an optimized variant Bellare Namprempre Neven( OvBNN) is presented to quickly complete the authentication by mutual cooperation between nodes so as to make the nodes use the intermediate calculation results of their neighbor nodes directly.Simulation results show that the proposed mechanism is superior to traditional authentication mechanisms both in energy consumption and authentication time.
基金supported by the National Basic Research Program of China (2013CB329001)the National Natural Science Foundation of China (61132002, 61201186)
文摘This paper investigates the social-aware cooperation(SAC) among mobile terminals(MTs), motivated by the fact that modern smart devices have much improved context awareness. Aware of the social ties, the cooperative network contains two layers of property: social and physical. In order to observe how the social awareness benefit the cooperation performance, we first formulate the social ties between MTs into parameters that can describe the cooperative behaviors by taking the mobility feature into account, defined as the conviction-approval-suspicion(CAS) model. Limited by the processing capability, partner selection is of great practical significance. To this end, the social-aware partner selection strategy is analyzed, and a significant superiority is observed compared to social-unaware selection. By analyzing the cooperative throughput, an explicit relationship between the degrees-of-freedom gain and the social-physical property is finally derived. Simulation results validate the theoretical analysis.
文摘In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay.