22 resultados para EFFICIENT SIMULATION


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In our previous novel attack (Packet Faking Attack [1]) we presented a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. In this paper, we present an efficient detection mechanism against this type of attack where each node can detect the attack instead of the destination node. Our detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea, that is, the packet creation time of each packet. Simulation results show this robust mechanism achieves a very high accuracy, detection rate and good network traffic reduction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Service oriented architecture has been proposed to support collaborations among distributed wireless sensor network (WSN) applications in an open dynamic environment. However, WSNs are resource constraint, and have limited computation abilities, limited communication bandwidth and especially limited energy. Fortunately, sensor nodes in WSNs are usually deployed redundantly, which brings the opportunity to adopt a sleep schedule for balanced energy consumption to extend the network lifetime. Due to miniaturization and energy efficiency, one sensor node can integrate several sense units and support a variety of services. Traditional sleep schedule considers only the constraints from the sensor nodes, can be categorized to a one-layer (i.e., node layer) issue. The service oriented WSNs should resolve the energy optimization issue considering the two-layer constraints, i.e., the sensor nodes layer and service layer. Then, the one-layer energy optimization scheme in previous work is not applicable for service oriented WSNs. Hence, in this paper we propose a sleep schedule with a service coverage guarantee in WSNs. Firstly, by considering the redundancy degree on both the service level and the node level, we can get an accurate redundancy degree of one sensor node. Then, we can adopt fuzzy logic to integrate the redundancy degree, reliability and energy to get a sleep factor. Based on the sleep factor, we furthermore propose the sleep mechanism. The case study and simulation evaluations illustrate the capability of our proposed approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Data aggregation in wireless sensor networks is employed to reduce the communication overhead and prolong the network lifetime. However, an adversary may compromise some sensor nodes, and use them to forge false values as the aggregation result. Previous secure data aggregation schemes have tackled this problem from different angles. The goal of those algorithms is to ensure that the Base Station (BS) does not accept any forged aggregation results. But none of them have tried to detect the nodes that inject into the network bogus aggregation results. Moreover, most of them usually have a communication overhead that is (at best) logarithmic per node. In this paper, we propose a secure and energy-efficient data aggregation scheme that can detect the malicious nodes with a constant per node communication overhead. In our solution, all aggregation results are signed with the private keys of the aggregators so that they cannot be altered by others. Nodes on each link additionally use their pairwise shared key for secure communications. Each node receives the aggregation results from its parent (sent by the parent of its parent) and its siblings (via its parent node), and verifies the aggregation result of the parent node. Theoretical analysis on energy consumption and communication overhead accords with our comparison based simulation study over random data aggregation trees.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a robust model and its simulation to investigate the performance of an AC propulsion system in a rail vehicle for directly returning the regenerative braking power to the feeder substation of an AC traction network. This direct returning method can be an efficient approach for energy recovery if the regenerative braking is reliably applied. However, it is shown that this method can cause undesired voltage fluctuations if the regenerative braking regime or braking location of the rail vehicle change. The load torque on the traction motor (TM) is precisely modelled when pure electrical braking is applied. Different states of the direct torque controlled inverter are modelled when the TM regenerates. A circuit model for the utility grid, load impedances and the traction network is developed to evaluate the network receptivity against the regenerated power. The dynamics of the electromagnetic torque and the fluctuations of the DC-link voltage are investigated for two operational conditions: changes on the regenerative braking regime and changes on the rail vehicle braking location. The results justify how the DC-link voltage dramatically fluctuates with variations of the rail vehicle's operation conditions, whereas the electromagnetic torque is maintained on optimum rates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a machine-to-machine network, the throughput performance plays a very important role. Recently, an attractive energy harvesting technology has shown great potential to the improvement of the network throughput, as it can provide consistent energy for wireless devices to transmit data. Motivated by that, an efficient energy harvesting-based medium access control (MAC) protocol is designed in this paper. In this protocol, different devices first harvest energy adaptively and then contend the transmission opportunities with energy level related priorities. Then, a new model is proposed to obtain the optimal throughput of the network, together with the corresponding hybrid differential evolution algorithm, where the involved variables are energy-harvesting time, contending time, and contending probability. Analytical and simulation results show that the network based on the proposed MAC protocol has greater throughput than that of the traditional methods. In addition, as expected, our scheme has less transmission delay, further enhancing its superiority.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ply-scale finite element (FE) models are widely used to predict the performance of a composite structure based on material properties of individual plies. When simulating damage, these models neglect microscopic fracture processes which may have a significant effect on how a crack progresses within and between plies of a multidirectional laminate. To overcome this resolution limitation a multi-scale modelling technique is employed to simulate the effect micro-scale damage events have on the macro-scale response of a structure. The current paper discusses the development and validation of a hybrid mass-spring system and finite element modelling technique for multi-scale analysis. The model developed here is limited to elastic deformations; however, it is the first key step towards an efficient multi-scale damage model well suited to simulation of fracture in fibre reinforced composite materials. Various load cases have been simulated using the model developed here which show excellent accuracy compared to analytical and FE results. Future work is discussed, including extension of the model to incorporate damage modelling.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control is an indispensable security component of cloud computing, and hierarchical access control is of particular interest since in practice one is entitled to different access privileges. This paper presents a hierarchical key assignment scheme based on linear-geometry as the solution of flexible and fine-grained hierarchical access control in cloud computing. In our scheme, the encryption key of each class in the hierarchy is associated with a private vector and a public vector, and the inner product of the private vector of an ancestor class and the public vector of its descendant class can be used to derive the encryption key of that descendant class. The proposed scheme belongs to direct access schemes on hierarchical access control, namely each class at a higher level in the hierarchy can directly derive the encryption key of its descendant class without the need of iterative computation. In addition to this basic hierarchical key derivation, we also give a dynamic key management mechanism to efficiently address potential changes in the hierarchy. Our scheme only needs light computations over finite field and provides strong key indistinguishability under the assumption of pseudorandom functions. Furthermore, the simulation shows that our scheme has an optimized trade-off between computation consumption and storage space.