The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The thesis proposes a threshold key escrow scheme based on elliptic curve cryptosystem which places the respective importance of escrow agents flexibly on the premise of preventing cheating of key escrow. Firstly, In order to fill up a deficiency that general escrow schemes do not take the respective importance of escrow agents into consideration, the paper proposes a threshold key escrow scheme based...
Modeling and Simulation Techniques focus on simulation modeling and analysis challenges to develop principles or gain in existing networking technologies, including simulation methodology or application in unstructured P2P network. In this paper, we focus on the simulation in the random unstructured P2P network.The correlation between topology and search algorithm is less paid attention to in unstructured...
Since the small-world effect and the scale-free characteristic discovery, the research of complex network obtained rapidly development in the past several years, the complex networks' anti-frangibility is one of research focal points. This article analysised the scale-free networks' frangibility, and obtained that the scale-free networks' frangibility is mainly caused by combining attack to the hubs...
In recent years, as the development of wireless sensor networks, people do some deep research on cluster-based protocol, most about the prolongation of the lifetime of WSN and decline of energy consumed by the sensors .This article analyses the cluster-heads generating algorithm among LEACH and presents improved approach that adjusting the nodes, threshold function. When non cluster-heads choose optimal...
With the energy constrained nature of wireless sensors, it is a substantial design issue to make efficient use of battery power in order to increase their lifetime. Focuses on reducing energy consumption of wireless sensor network, this paper proposed CABCF-DCS (clustering algorithm based on communication facility with deterministic cluster-size) algorithm. By changing the cluster-size of the cluster...
Clustering algorithm has a significant impact on the operation of wireless sensor network (WSN). Effective clustering algorithm leads wireless sensor network to operate efficiently. In this paper, we propose "communication facility (CF)" for the first time, based on communication facility, we propose a clustering algorithm CABCF (clustering algorithm based on communication facility) in WSN...
Saving energy is an important goal in designing of wireless sensor networks, and routing algorithm has an important impact on energy consumption for wireless sensor networks. Therefore, improving the energy efficiency of routing algorithm to reduce energy consumption in the network is very necessary. This paper proposes a new distributed routing algorithm based on cluster maintenance (CMDR-LD). By...
The correlation between topology and search algorithm is less paid attention to in unstructured P2P network. In this paper, we focus on designing better search algorithm to adapt to the current network rather than to design the universal algorithm to adapt to a variety of network. Analyzing the characteristics that the flooding algorithm showing in different search stages in different network, we...
With the energy constrained nature of wireless sensors, it is a substantial design issue to make efficient use of battery power in order to increase their lifetime. An optimal routing approach is critical to prolong the lifetime of the network. This paper presents a novel clustering scheme integrating hierarchical method on the basis of classical routing algorithm. Simulation results show that the...
Peer-to-Peer systems depend on effective techniques to find and retrieve data; however, current techniques used in existing unstructured P2P system are often very inefficient because of the existence of large number of redundant messages. In this paper, we analyze the reason of engendering redundant data packet and put forward the Condensing Forward-List algorithm to reduce redundancy. Through experiments...
The discovery of scale free network captured new sights for our understanding on complex system. Considering the growth and preferential attachment, BA model provided a lot of enlightenment for us. However, the two basic assumptions in BA model are still too simple for explaining many real phenomena, there are quite far distance to real networks. In this paper, we try to expand BA model, namely in...
For the purpose of reducing redundant alerts and false alerts as well as recognizing complicated attack scenarios, a multilevel model of alert fusion is presented. This model fuses alerts layer upon layer through primary alert reduction, alert verification, alert clustering and alert correlation. In order to construct accurate and complete attack sensors, in the phase of alert clustering, this paper...
LEACH-DCHS CM (LEACH-DCHS cluster maintenance) algorithm based on LEACH-DCHS algorithm is proposed in this paper. By prolonging the steady-state phase time and retaining the concept of round in the original algorithm, the new algorithm achieves the purpose of saving energy ultimately. Simulation results validate the energy efficiency of LEACH-DCHS CM algorithm.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.