-
241
A Multiple Collision Channel Assignment Based on Imperfect Game Theory
Published 2014-05-01“…The channel allocation in wireless network will greatly affect the whole performance of the network. …”
Get full text
Article -
242
Realization of smart home key management mechanism based on ECC
Published 2017-06-01“…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
Get full text
Article -
243
Survey on network function virtualization in RAN
Published 2019-01-01“…Finally, the challenges of network function virtualization applying in wireless network were proposed.…”
Get full text
Article -
244
Research on WiFi Penetration Testing with Kali Linux
Published 2021-01-01“…Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. …”
Get full text
Article -
245
Computation task offloading algorithm and system level simulation for vehicles
Published 2019-09-01“…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
Get full text
Article -
246
Research on secret key generation based on wireless channel characteristics in body area network
Published 2021-12-01“…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
Get full text
Article -
247
LoRaWAN technologies for enabling new generation Internet of things
Published 2021-06-01“…., communication performance target localization, wireless network security, and heterogeneous network.The opportunities and challenges were also discussed regarding the wide adoption of LoRaWAN in China’s context in four aspects, i.e., business models, supervision methods, technology innovations, and emerging applications.…”
Get full text
Article -
248
A Voice Data Storage Strategy of Record Server in Broadband Cluster System
Published 2013-05-01“…With the rapid development of wireless high-speed data services,broadband has become an inexorable trend of the development of wireless network. In the process of cluster communication system for command and control,the system will provide data on the direction of broadband and business diversification. …”
Get full text
Article -
249
Research on Spectrum Access Mechanism Based on Polling Scheduling
Published 2013-11-01“…Numerical analysis and simulation results show that the mechanism improves the queuing performance and the bandwidth utilization of spectrum holes, and reveal its potential application in cognitive wireless network for data services.…”
Get full text
Article -
250
Enhanced zebra optimization algorithm and applications of power allocation in SDWN
Published 2025-01-01“…To address the issue of interference caused by shared resources in multi-user communications in software defined wireless network (SDWN), an enhanced zebra optimization algorithm (EZOA) was proposed to achieve power allocation that maximizes the secrecy rate. …”
Get full text
Article -
251
Research of platform identity attestation based on trusted chip
Published 2014-08-01“…The experiment result in a devel-oped prototype system shows that the proposed scheme provides good performances in computation and communication, and is especially suitable for the wireless network.…”
Get full text
Article -
252
Implementation of a prototype real-time multi-mode wireless video transmission system
Published 2006-01-01“…A novel prototype wireless video transmission system was presented.The characteristic of the design was that the wireless terminal used high performance multimedia DSP as video processing and control core,and the interface board integrates various wireless network interfaces.By software control,not only the system could work in single net-work mode,but also could select appropriate transmission channel in multi-mode network environment,so as to present best video quality.The system configuration,hardware and software design,as well as the control policy of the wireless terminal were described in details.Experiments show that in the GPRS/WLAN and CDMA/WLAN test conditions,the system can select the proper network and present satisfactory reconstructed video.…”
Get full text
Article -
253
Virtual backbone formation algorithm based on GBG for wireless sensor networks
Published 2008-01-01“…An approximation algorithm of virtual backbone formation (VBF) based on a more generalized and realistic wireless network communication model of bounded growth graph (GBG) was proposed. …”
Get full text
Article -
254
TD-LTE Coverage Planning Targets and UL/DL Subframe Configuration
Published 2013-05-01“…Common reference signal received power(CRS RSRP)and signal interference noise ratio(CRS SINR)are two important wireless network planning factors,which are directly related to indoor deep coverage and edge data rate. …”
Get full text
Article -
255
An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks
Published 2014-05-01“…In addition, the traffic flow situation is also transmitted to a remote monitoring control system through ZigBee wireless network communication technology. The traffic flow control system developed in this study can perform remote transmission and reduce traffic accidents. …”
Get full text
Article -
256
Multi-agent reinforcement learning based dynamic optimization algorithm of CRE offset for heterogeneous networks
Published 2023-12-01“…To cope with the high throughput demand caused by the proliferation of wireless network users, a multi-agent reinforcement learning based dynamic optimization algorithm of cell range expansion (CRE) offset was proposed for interference scenarios in macro-pico heterogeneous networks.Based on the value decomposition network framework of collaborative multi-agent reinforcement learning, a personalized online local decision of CRE offset for all pico-base stations was achieved by reasonably utilizing and interacting the intra-system user distribution and their interference levels among pico-base stations.Simulation results show that the proposed algorithm has significant advantages in increasing system throughput, balancing the throughput of each base station and improving edge-user throughput, compared to CRE=5 dB and distributed Q-learning algorithms.…”
Get full text
Article -
257
Design method of energy efficiency optimization in PLC-RF wireless transmission networks
Published 2023-04-01“…An energy efficiency optimization transmission scheme using angular information-based channel state information (AI-CSI) was proposed for indoor communications, which integrated the power line communication (PLC) with radio frequency (RF) wireless communication.Specifically, by considering that the Wi-Fi wireless network and the PLC network were the primary and secondary networks, an optimization problem was established to maximize the total energy efficiency of the secondary network.Then, in order to solve the problem, the beam forming weight vector was obtained by using zero-forcing method based on AI-CSI, and an optimization algorithm joint Dinkelbach with Lagrange multiplier was further presented to achieve the optimal power allocation.Finally, computer simulations were given to verify the effectiveness and superiority of the proposed scheme.Besides, the influence of key parameters such as the number of employed antennas and served users was also analyzed.…”
Get full text
Article -
258
Enabling Collaborative Musical Activities through Wireless Sensor Networks
Published 2012-03-01“…This network has been named collaborative musical wireless network (CMWN): it eases device configuration, enables musical collaboration, and allows artists to explore new ways of expression. …”
Get full text
Article -
259
An incentive mechanism with bandwidth allocation for federated learning
Published 2022-12-01“…Federated learning (FL) is an emerging machine learning paradigm that can make full use of crowd sourced mobile resources for training on decentralized data.However, it is challenging to deploy FL over a wireless network because of the limited bandwidth and clients’ selfishness.To address these challenges, an incentive mechanism with bandwidth allocation (IMBA) was proposed.Considering the difference between clients' data quality and computing power, IMBA designs a payment scheme to incentivize high-quality clients to contribute their computing resources, thus improving the training accuracy of the model.By minimizing the weight sum of training time and payment cost, the optimal payment and bandwidth allocation scheme was determined, and the training delay was reduced by optimizing bandwidth allocation.Experiments show that IMBA effectively improves training accuracy, reduces the training delay and helps the server flexibly balance training delay and hiring payment.…”
Get full text
Article -
260
Edge computing and network slicing technology in 5G
Published 2017-06-01“…As a cost-efficient way to meet the wide range of use cases that the fifth generation wireless network will provide,network slicing and edge computing have been advocated by both academia and industry.In the concept of network slicing,the network entities are sliced into several logical networks to provide the requested services for different use cases.The edge computing pushes the frontier of computing applications,data,and services away from centralized nodes to the logical extremes of a network and even the user equipments,which can improve the traditional mobile broadband service capability,and handle with the emerging machine type service.The edge computing based radio access network slicing was proposed as a combination of edge computing and network slicing.The radio access network slicing can meet the diverse use cases and business models in 5G,and enable operators to flexibly provide personalized network services based on third-party need and network situation in a cost-efficient way.…”
Get full text
Article