Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Routing protocol for bus vehicle network with cyclical movement
PENG Yali, XU Hong, YIN Hong, ZHANG Zhiming
Journal of Computer Applications    2015, 35 (2): 313-316.   DOI: 10.11772/j.issn.1001-9081.2015.02.0313
Abstract450)      PDF (806KB)(395)       Save

As an important part of the urban vehicle network, bus vehicle network provides supports for a wide range of urban-vehicle communication network due to cyclical movement law. However, the complex urban road environment brings great challenges to highly efficient and reliable routing protocols for bus vehicle network. In bus vehicle network with the characteristics of cyclical movement, a new protocol named SRMHR (Single & Realmending-Multi Hop Routing) was proposed to ensure the single hop link's life time and multi-hop submission probability in limited delay. According to the signal propagation attenuation model and vehicle mobility model, a single hop selection mechanism and a multi-hop delay probability forwarding mechanism were proposed to ensure the reliability and effectiveness of bus-assistant forwarding. On the urban traffic simulation platform, using real road traffic data of slight adjustment, the performance of signal attenuation model, single hop selection mechanism and light correction model under different traffic densities were tested. The results prove the validity of each link of the scheme. Comparison with SF (Spray and Focus) and SW (Spray and Wait) proves that SRMHR protocol has a higher successful rate of data transmission and lower delivery delay.

Reference | Related Articles | Metrics
False data filtering scheme based on trust management mechanism in wireless sensor networks
CAO Yanhua ZHANG Zhiming YU Min
Journal of Computer Applications    2014, 34 (6): 1567-1572.   DOI: 10.11772/j.issn.1001-9081.2014.06.1567
Abstract297)      PDF (892KB)(590)       Save

In the traditional false data filtering schemes of Wireless Sensor Networks (WSN), only the false data reports are filtered, while the compromised nodes still can continuously inject false data to WSN which wastes network resources. In order to cut off the source of false data generating, a new false data filtering scheme based on trust management mechanism was proposed. The conspiracy forged false data generated from multiple captured nodes were limited within a cluster by using clustering method, then the trust management mechanism was used to detect whether the node was compromised, hence isolated the compromised node. The analysis results show that the proposed scheme can not only filter false data effectively, but also isolate compromised nodes, and has a strong ability of tolerating compromised nodes.

Reference | Related Articles | Metrics