首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
一种无线传感器网络中的虫洞攻击检测算法   总被引:2,自引:0,他引:2  
分析了无线传感器网络中的虫洞攻击的特点,根据某些路径变短和某些节点的邻居数增加的特点,提出了一种无线传感器网络中虫洞攻击的检测算法.首先在边界部署一些源、目的节点对,然后利用路由发现过程来发现跳数异常少的可疑路由.通过检查邻居节点数来检测可疑路径上的每个节点,如果节点的邻居数增加,则该节点为被感染节点,网络中存在虫洞攻击.被感染节点被从网络中隔离,以避免更大的破坏.实验结果表明该算法具有较低的漏报率和较高的准确性.  相似文献   

2.
虫洞攻击破坏路由操作、影响节点定位,对整个无线传感器网络(WSNs)的安全性造成极大的威胁.针对这种情况,提出了基于网格的虫洞攻击抵御策略(DEAD).通过附加的网格属性,借助特定网格内节点的信息交换来检测网络中的虫洞攻击,包括具有伪造篡改能力的特殊虫洞攻击,从而大大减少了虫洞攻击造成的危害.仿真实验表明,该策略能够在网络受到攻击时,有效地检测出恶意节点.  相似文献   

3.
通过对Ad Hoc网络中最优链路状态路由(Optimized Link State Routing,OLSR)协议的研究,从数学集合的角度来分析MPR(Multi Point Relay,MPR)集选择问题,通过将一跳邻居节点及其所连接的一条邻居节点抽象化为包含子集的集合,计算剩余集合的独立子集生成MPR中继节点,从而找到节点数量最少的MPR集.仿真实验结果表明,该算法降低了网络传输的延时,提高了网络传输的速度.  相似文献   

4.
为了解决无线传感器网络定位过程中的常见安全问题,提出了一种抗攻击的定位方法.该方法通过高效的认证机制和检测机制帮助待定位节点验证信标节点的合法性及检测定位信息的可靠性,筛选出值得信赖的定位信息用于节点的定位计算,能够有效抵御定位过程中的女巫攻击和虫洞攻击.实验结果验证了该方法能够在存在安全威胁的网络环境下,有效提高无线传感器节点的定位精度.  相似文献   

5.
在线社交网络中用户伪装攻击检测方法研究   总被引:1,自引:0,他引:1  
当前用户伪装攻击检测方法无法适应动态环境,实时性不高;且需要准确的先验知识,检测精度较低。提出一种新的在线社交网络中用户伪装攻击检测方法,介绍了k最邻近节点(KNN)算法的基本思想,给出KNN算法的实现过程。分析了用户伪装攻击检测与分类的关系,确定在线社交网络中用户伪装攻击检测就是对被检测的未知行为进行分类的过程。针对用户行为,将训练集中正常用户行为的邻居进行排列,通过和k相似的邻居的分类标签对新用户行为类别进行判断,从而实现用户伪装攻击检测。实验结果表明,所提方法不仅检测精度高,而且开销小。  相似文献   

6.
利用链路预测推断网络演化机制   总被引:2,自引:0,他引:2  
直接建立演化模型推测影响网络演化的因素是目前研究网络演化制的常用方法,但由于可供比较的结构特征量太多,不同的模型之间难以进行定量化的比较.链路预测是指利用网络的结构或者节点的属性息预测未产生连接的两个节点间产生连接的可能性.其本质是挖掘网络产生连边的原因和驱动力,这同时也是网络演化模型所关的问.实际上,一个演化模型原则上都可以对应于一种链路预测的算法.因此,助链路预测的理论框和评方法可以定量化地对不同演化模型所对应的链路预测算法进行评,从而间接地对演化模型的表现进行定量比较.本文首先绍于节点接近性的链路预测方法,然后讨论利用链路预测推测网络演化制的本框.在以中城市航空网络为例的实证分析中发现,当单独利用结构(共同邻居数目)和节点属性(地理位、人口、GDP和第三产业产值)作为定义接近性的因素时,于共同邻居的算法预测准确度最高,暗示网络演化主要受结构因素影响,其次才是外在因素.而将四种于节点属性的算法与于结构的算法耦合进行计算时,共同邻居配合第三产业产值效最好,与偏相关分析和因分析的结论一.本文为研究网络演化模型供了全新的视角和分析工具.  相似文献   

7.
针对无线传感器网络Sybil攻击的安全性威胁问题,分析了其攻击原理和现有的防范算法.提出了一种分散式防范算法,分别采用测量一致性、测量与计算一致性2种方法对攻击节点进行检测.该算法改变了传统集中式防范算法的思路,并能滤除攻击生成的虚节点.仿真和实验结果表明,该算法对Sybil攻击有很强的针对性,能达到99%的虚节点滤除...  相似文献   

8.
提出一种新的适用于无线传感器网络的虫洞检测协议CBWDP (cluster based wormholedetection protocol).该协议在簇结构和新的通信策略基础上,能够采用简单的手段检测出内部虫洞节点并对其实现有效的隔离.同时该协议无需强的外在假设条件,具有易于部署的特性.仿真结果表明,CBWDP协议能够在不降低网络性能的同时有效检测和抵御虫洞攻击,从而保证了无线传感器网络环境的安全性.  相似文献   

9.
目前复杂网络中的社团划分算法很多,其中大多数是在社团数目已知的前提下进行的.通过定义社团强度和计算相邻节点的邻居集合,提出改进的相邻节点相似度矩阵.然后通过不断地删除矩阵中相似度最小值对应的连边,在社团数目未知的前提下,符合已定义的社团强度的社团就可以产生.实验结果表明,该算法在社团数目未知的前提下,不仅时间复杂度较低,而且又能够准确地识别网络中的社团.  相似文献   

10.
针对无线传感器网络中拒绝睡眠攻击严重降低网络寿命的问题,提出了一种参考接收信号强度指示的虚假调度切换方法.该方法采用接收信号强度指示协助检测拒绝睡眠攻击节点的存在性,当检测结果为真时,启动虚假调度切换,即在受攻击者一跳范围内广播调度切换信息,并在定时器超时后回到初始调度状态,从而使攻击者耗费大量能量测量和跟踪调度周期,以至于过早死亡,保护了正常节点的工作,使其能够摆脱或躲避恶意节点的攻击.在NS2.29平台上,采用标准S-MAC模块进行了仿真.结果表明,该策略能够有效地减少恶意节点碰撞、广播和能量衰竭攻击的影响,在牺牲了一定的能量和时延的情况下,保证了网络的健康程度并减少了丢包率.  相似文献   

11.
Language markedness is a common phenomenon in languages, and is reflected from hearing, vision and sense, i.e. the variation in the three aspects such as phonology, morphology and semantics. This paper focuses on the interpretation of markedness in language use following the three perspectives, i.e. pragmatic interpretation, psychological interpretation and cognitive interpretation, with an aim to define the function of markedness.  相似文献   

12.
何延凌 《科技信息》2008,(4):258-258
Language is a means of verbal communication. People use language to communicate with each other. In the society, no two speakers are exactly alike in the way of speaking. Some differences are due to age, gender, statue and personality. Above all, gender is one of the obvious reasons. The writer of this paper tries to describe the features of women's language from these perspectives: pronunciation, intonation, diction, subjects, grammar and discourse. From the discussion of the features of women's language, more attention should be paid to language use in social context. What's more, the linguistic phenomena in a speaking community can be understood more thoroughly.  相似文献   

13.
王慧 《科技信息》2008,(10):240-240
Wuthering Heights, Emily Bronte's only novel, was published in December of 1847 under the pseudonym Ellis Bell. The book did not gain immediate success, but it is now thought one of the finest novels in the English language. Catherine is the key character of this masterpiece, because everybody and everything center on her though she had a short life. We can understand this masterpiece better if we know Catherine well.  相似文献   

14.
The Williston Basin is a significant petroleum province, containing oil production zones that include the Middle Cambrian to Lower Ordovician, Upper Ordovician, Middle Devonian, Upper Devonian and Mississippian and within the Jurassic and Cretaceous. The oils of the Williston Basin exhibit a wide range of geochemical characteristics defined as "oil families", although the geochemical signature of the Cambrian Deadwood Formation and Lower Ordovician Winnipeg reservoired oils does not match any "oil family". Despite their close stratigraphic proximity, it is evident that the oils of the Lower Palaeozoic within the Williston Basin are distinct. This suggests the presence of a new "oil family" within the Williston Basin. Diagnostic geochemical signatures occur in the gasoline range chromatograms, within saturate fraction gas chromatograms and biomarker fingerprints. However, some of the established criteria and cross-plots that are currently used to segregate oils into distinct genetic families within the basin do not always meet with success, particularly when applied to the Lower Palaeozoic oils of the Deadwood and Winnipeg Formation.  相似文献   

15.
理论推导与室内实验相结合,建立了低渗透非均质砂岩油藏启动压力梯度确定方法。首先借助油藏流场与电场相似的原理,推导了非均质砂岩油藏启动压力梯度计算公式。其次基于稳定流实验方法,建立了非均质砂岩油藏启动压力梯度测试方法。结果表明:低渗透非均质砂岩油藏的启动压力梯度确定遵循两个等效原则。平面非均质油藏的启动压力梯度等于各级渗透率段的启动压力梯度关于长度的加权平均;纵向非均质油藏的启动压力梯度等于各渗透率层的启动压力梯度关于渗透率与渗流面积乘积的加权平均。研究成果可用于有效指导低渗透非均质砂岩油藏的合理井距确定,促进该类油藏的高效开发。  相似文献   

16.
As an American modern novelist who were famous in the literary world, Hemingway was not a person who always followed the trend but a sharp observer. At the same time, he was a tragedy maestro, he paid great attention on existence, fate and end-result. The dramatis personae's tragedy of his works was an extreme limit by all means tragedy on the meaning of fearless challenge that failed. The beauty of tragedy was not produced on the destruction of life, but now this kind of value was in the impact activity. They performed for the reader about the tragedy on challenging for the limit and the death.  相似文献   

17.
Location based services is promising due to its novel working style and contents.A software platform is proposed to provide application programs of typical location based services and support new applications developing efficiently. The analysis shows that this scheme is easy implemented, low cost and adapt to all kinds of mobile nework system.  相似文献   

18.
以AC-13级配为基础,将橡胶颗粒代替部分集料掺入混合料中,以低温弯曲试验为评价方法对不同橡胶颗粒掺量下沥青混合料的低温抗裂性进行研究,并引入应变能密度值对混合料的低温抗裂性进行综合评价.试验结果表明:橡胶颗粒沥青混合料试件的破坏微应变均超过2 300,满足冬寒区的技术指标;无论是否掺加橡胶颗粒,随着温度的下降,沥青混合料破坏时的最大弯拉强度增大,弯拉应变降低,劲度模量增大;弯曲应变能密度在胶粒掺量为1%左右时具有较大的弯曲应变能密度值,此时橡胶颗粒沥青混合料具有较好的低温抗裂性.  相似文献   

19.
正The periodicity of the elements and the non-reactivity of the inner-shell electrons are two related principles of chemistry,rooted in the atomic shell structure.Within compounds,Group I elements,for example,invariably assume the+1 oxidation state,and their chemical properties differ completely from those of the p-block elements.These general rules govern our understanding of chemical structures and reactions.Using first principles calcula-  相似文献   

20.
We have developed an adiabatic connection to formulate the ground-state exchange-correlation energy in terms of pairing matrix linear fluctuations.This formulation of the exchange-correlation energy opens a new channel for density functional approximations based on the many-body perturbation theory.We illustrate the potential of such approaches with an approximation based on the particle-particle Random Phase Approximation(pp-RPA).This re-  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号