Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Routing policy based on virtual currency in mobile wireless sensor networks
WANG Guoling, YANG Wenzhong, ZHANG Zhenyu, XIA Yangbo, YIN Yabo, YANG Huiting
Journal of Computer Applications    2018, 38 (9): 2587-2592.   DOI: 10.11772/j.issn.1001-9081.2018020446
Abstract439)      PDF (996KB)(237)       Save
For the routing problem that nodes in mobile wireless sensor network, based on random moving model, a low energy consumption routing strategy named DTVC (Data Transmission based on Virtual Currency) was proposed. When two nodes met each other, the buyer and the seller determined the price of data message and selected relay node according to node attributes and data message attributes. To improve the network performance, the number of the data message's replicas was controlled according to node type and data messages in the queue were sorted according to each message's delay tolerance. The nodes in the network were divided into source nodes and relay nodes for each data message and only the source node could copy it. The smaller the delay tolerance was, the greater the priority was. In order to reduce the energy consumption in the network, the data message in the storage queue that had been transmitted successfully was deleted according to the message broadcast by the sink node. The simulation results on Matlab showed that the data delivery rate of DTVC was increased by at least 2.5%, and the average number of replicas was reduced by at least 25% than those of FAD (the message Fault tolerance-based Adaptive data Delivery scheme), FLDEAR (Fuzzy-Logic based Distance and Energy Aware Routing protocol) and a routing algorithm based on energy consumption optional evolution mechanism.
Reference | Related Articles | Metrics
Application-layer DDoS defense model based on Web behavior trajectory
LIU Zeyu, XIA Yang, ZHANG Yilong, REN Yuan
Journal of Computer Applications    2017, 37 (1): 128-133.   DOI: 10.11772/j.issn.1001-9081.2017.01.0128
Abstract570)      PDF (949KB)(483)       Save
To defense application-layer Distributed Denial of Service (DDoS) built on the normal network layer, a defense model based on Web behavior trajectory in the Web application server was constructed. User's access behavior was abstracted into Web behavior trajectory, and according to the generation approach about attack request as well as behavior characteristics of user access to Web pages, four kinds of suspicion were defined, including access dependency suspicion, behavior rate suspicion, trajectory similarity suspicion, and trajectory deviation suspicion. The deviation values between normal sessions and attack sessions were calculated to detect the application-layer DDoS to a specific website. The defense model prohibited the user access from DDoS when detecting the attack request generated by the user. In the experiment, real data was acted as the training set. Then, through simulating different kinds of attack request, the defense model could identify the attack request and take the defense mechanism against the attack. The experimental results demonstrate that the model can detect and defense the application-layer DDoS to a specific website.
Reference | Related Articles | Metrics