首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于不对称密钥预分配和哈希函数,提出了一种新的移动异构传感器网络的密钥管理方案。该方案主要对网络不同子区域使用单独分开的密钥池,并为簇头节点从存储密钥池中选出密钥和为普通节点从存储密钥池中选出密钥的派生密钥,提高了现有方案的安全连通率和抗节点捕获攻击能力。同时,利用区域种子密钥和哈希函数实现了对移动簇头的认证,有效防止了伪造攻击。分析和仿真表明:该方案不仅能明显提高移动异构传感器网络的安全性能,而且能有效减少资源消耗。  相似文献   

2.
移动自组织网络中,建立从源端到目的端路径的过程比较困难。提出了许多方法用来寻找从源端到目的端的路径,但都没有考虑节点稳定性和它的链路生存时间。这就会对网络数据传输效率、延时、能量消耗等方面的性能造成影响。为了提高移动自组织网路的性能,设计移动自组织网络路由协议时,应当把网络生存时间、能量消耗、以及中间节点同时考虑进来。这将会提高数据传输效率,减少端到端延时。根据节点的剩余能量和节点能量消耗速率,测量了节点的生存时间。根据节点的生存时间,结合可变功率传输技术,为了减少节点的过度利用,设计了一种新的能量优化路由机制。通过NS2仿真,与AODV和LER相比,证实了提出的算法提高了网络生存时间和数据传输效率。并且降低了能量消耗和端到端延时,另外也控制了RREQ包的数量。  相似文献   

3.
为了减少无线传感器网络节点能耗,延长网络生存时间,在PEGASIS算法的基础上,针对PEGASIS算法中节点之间容易产生长链和簇头选择没有考虑节点剩余能量的问题,提出了一种基于禁忌算法的PEGASIS算法改进。建链阶段采用禁忌算法代替原有的贪婪算法,防止了长链的产生,减小了节点传输距离;同时引入基于剩余能量的簇头选择机制,均衡了节点之间的能耗,延长了节点的生存时间。仿真结果表明,改进算法较PEGASIS算法第1个节点的死亡时间延长了约7倍,半数节点的死亡时间也得到了延长,从而提高了整个网络的生存时间。  相似文献   

4.
本文将Rabin的公钥加密方案和Diffie-Hellman的密钥交换方案相结合,提出了适用于数字移动通信网的一种安全密钥分配协议。该协议有以下特点:(1)在进行密钥交换时,增加了网络对通信双方的认证;(2)用户没有向网络中心泄漏任何秘密信息;(3)由于在协议中采用了Diffie-Hellman密钥交换系统,使得用户在安全性方面和计算复杂性方面取得了折中。最后,本文对该协议的安全性进行了分析。  相似文献   

5.
由于移动Ad Hoc网络具有无需基础设施,可以快速部署,很难完全被摧毁等优点,被作为数字化战场通信的优先选择,设计实现了一种适用于低速率移动Ad Hoc网络的安全路由协议——LSRP,它适用于分层架构的低速移动电台自组网,可以在网络资源有限的情况下,防御来自外部和内部两方面的攻击。LSRP协议利用分布式门限RSA签名方案来阻止非授权接入,防范来自网络外部的攻击;利用邻节点信任度评估机制,进行恶意节点检测和剪除,防范来自网络内部的攻击,增强了网络的安全性。  相似文献   

6.
Ad Hoc网络可以不依赖于现有网络基础设施,快速搭建起一个移动通信网络,然而其灵活性又使其安全性面临着严峻的挑战.密钥管理是Ad Hoc网络安全的关键技术,在分析现有的Ad Hoc网络分布式信任方案基础上,提出一种有效的基于簇的密钥管理方案.该方案实现了节点之间的双向认证,具有较强的抗假冒攻击能力,密钥分发过程简单,...  相似文献   

7.
针对卫星网络组密钥管理的重要性,提出了一个可认证的基于门限秘密共享的组密钥管理方案.结合卫星网络的动态拓扑结构特点,将地面站作为组成员的身份注册中心,以实现对组成员的身份认证,确保节点的合法性.为了提高组密钥的生成效率,选取≠一1颗可见时间长的卫星构建组密钥份额分发中心,降低了组密钥联合生成过程中的通信量.组密钥协商无需安全信道,节省了系统资源.安全性及性能分析表明,该方案不仅具有较强的安全性,而且还具有计算和通信量小的优点.参数分析表明,门限值k与组密钥更新周期T是影响方案安全性的2个重要因子.  相似文献   

8.
为了满足用户对移动IP服务的安全性、低时延方面的要求,弥补现有移动IPv4协议中切换方案的不足,在移动IP/AAA模型的基础上,提出了一种基于VMN(虚拟移动节点)的移动IP快速切换方法。该方法增强了移动IP联合AAA的基本模型,并在MA(移动代理)上构建了一种新的数据结构;通过在NFA和OFA之间建立一个新的双向隧道,将VMN中的数据报文进行快速转移,在没有数据报文丢失的情况下,实现了快速低时延的切换;通过分发新的临时安全关联以及认证票据,有效地提高了移动IP在注册和切换过程中的安全,同时有效地降低了AAAH和AAAF之间的网络负载;通过对该方法进行安全性分析和仿真试验表明,我们提交的方法是安全有效的。  相似文献   

9.
针对典型DES具有密钥短等缺点,提出了一种基于Logistic映射的改进型DES算法,提高了密钥空间,增强了密文输出的混乱特性。同时,将该算法应用于远程装备监控系统中,有效地增强了数据传输的安全性。  相似文献   

10.
针对传统的基于静态节点的无线传感器网络(wireless sensor network,WSN)电池容量有限、节点移动受限的问题,提出了一种基于条件后验克拉美-罗下界(conditional posterior cramer-rao lower bounds,CPCRLB)的混合WSN的目标跟踪调度算法。该算法引入移动节点来参与目标跟踪,根据目标预测位置对移动节点进行运动控制,同时利用基于CPCRLB的信息效用函数选择静态节点,实现每一时刻目标的动态成簇策略。此外,还提出了一种基于运动学的预测机制,利用分区域管理的方法进一步提高跟踪精度,减少能量消耗,并能够有效避免目标丢失现象。仿真结果表明,该算法可以有效地对目标进行跟踪,在保证跟踪精度的同时相比静态网络节省了大量的能耗。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

20.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号