Based on the Wireless Mesh Network (WMN), a wireless emergency communicationsystem for underground coal mine which was designed to be capable of videosurveillance, voice communication, and environment monitoring at th...Based on the Wireless Mesh Network (WMN), a wireless emergency communicationsystem for underground coal mine which was designed to be capable of videosurveillance, voice communication, and environment monitoring at the same time wasproposed.The network architecture of the system was proposed, and its service model,extensible technology, medium access control, routing algorithm, channel allocation andsystem management technologies were analyzed according to the actual rescue requirementsof underground coal mine and the characteristics of underground spatial structureand radio transmissions.The relevant theories and key technologies were extracted,which would provide theoretical support for the system development.展开更多
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble...Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model.展开更多
Industrial wireless mesh networks(WMNs)have been widely deployed in various industrial sectors,providing services such as manufacturing process monitoring,equipment control,and sensor data collection.A notable charact...Industrial wireless mesh networks(WMNs)have been widely deployed in various industrial sectors,providing services such as manufacturing process monitoring,equipment control,and sensor data collection.A notable characteristic of industrial WMNs is their distinct traffic pattern,where the majority of traffic flows originate from mesh nodes and are directed towards mesh gateways.In this context,this paper adopts and revisits a routing algorithm known as ALFA(autonomous load-balancing field-based anycast routing),tailored specifically for anycast(one-to-one-of-many)networking in WMNs,where traffic flows can be served through any one of multiple gateways.In essence,the scheme is a hybrid-type routing strategy that leverages the advantages of both back-pressure routing and geographic routing.Notably,its novelty lies in being developed by drawing inspiration from another field,specifically from the movement of charges in an electrostatic potential field.Expanding on the previous work,this paper explores further in-depth discussions that were not previously described,including a detailed description of the analogy between an electrostatic system and a WMN system based on precise mapping perspectives derived from intensive analysis,as well as discussions on anycast,numerical methods employed in devising the ALFA scheme,its characteristics,and complexity.It is worth noting that this paper addresses these previously unexplored aspects,representing significant contributions compared to previous works.As a completely new exploration,a new scheduling strategy is proposed that is compatible with the routing approach by utilizing the potential-based metric not only in routing but also in scheduling.This assigns higher medium access priority to links with a larger potential difference.Extensive simulation results demonstrate the superior performance of the proposed potential-based joint routing and scheduling scheme across various aspects within industrial WMN scenarios.展开更多
基金Supported by the National Natural Science Foundation of China(50534060)the National High Technology Project of China(2007AA06Z106)
文摘Based on the Wireless Mesh Network (WMN), a wireless emergency communicationsystem for underground coal mine which was designed to be capable of videosurveillance, voice communication, and environment monitoring at the same time wasproposed.The network architecture of the system was proposed, and its service model,extensible technology, medium access control, routing algorithm, channel allocation andsystem management technologies were analyzed according to the actual rescue requirementsof underground coal mine and the characteristics of underground spatial structureand radio transmissions.The relevant theories and key technologies were extracted,which would provide theoretical support for the system development.
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University under Grant No.IRT1078the Key Program of NSFC-Guangdong Union Foundation under Grant No.U1135002+1 种基金Major National S&T Program under Grant No.2011ZX03005-002the Fundamental Research Funds for the Central Universities under Grant No.JY10000903001
文摘Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model.
基金This work was supported by the research grant of the Kongju National University Industry-University Cooperation Foundation in 2024.
文摘Industrial wireless mesh networks(WMNs)have been widely deployed in various industrial sectors,providing services such as manufacturing process monitoring,equipment control,and sensor data collection.A notable characteristic of industrial WMNs is their distinct traffic pattern,where the majority of traffic flows originate from mesh nodes and are directed towards mesh gateways.In this context,this paper adopts and revisits a routing algorithm known as ALFA(autonomous load-balancing field-based anycast routing),tailored specifically for anycast(one-to-one-of-many)networking in WMNs,where traffic flows can be served through any one of multiple gateways.In essence,the scheme is a hybrid-type routing strategy that leverages the advantages of both back-pressure routing and geographic routing.Notably,its novelty lies in being developed by drawing inspiration from another field,specifically from the movement of charges in an electrostatic potential field.Expanding on the previous work,this paper explores further in-depth discussions that were not previously described,including a detailed description of the analogy between an electrostatic system and a WMN system based on precise mapping perspectives derived from intensive analysis,as well as discussions on anycast,numerical methods employed in devising the ALFA scheme,its characteristics,and complexity.It is worth noting that this paper addresses these previously unexplored aspects,representing significant contributions compared to previous works.As a completely new exploration,a new scheduling strategy is proposed that is compatible with the routing approach by utilizing the potential-based metric not only in routing but also in scheduling.This assigns higher medium access priority to links with a larger potential difference.Extensive simulation results demonstrate the superior performance of the proposed potential-based joint routing and scheduling scheme across various aspects within industrial WMN scenarios.