用户名: 密码: 验证码:
无线自组织网络中的可靠服务研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计算机网络在现代社会的应用越来越广泛。计算机软硬件的功能不仅仅在单一的机器环境中发挥作用及价值,并且逐步走向分布式、网络的计算环境,进一步发挥出前所未有的巨大效用。无线自组织网络(Wireless Ad-hoc Network)是一种分布式的、无中心的网络,具有拓扑结构动态变化、易于构建等特点,不需要任何基础设施支持,使得网络用户可以在任何时间,任何地点利用计算能力和访问网络服务。它一般由一组自主的无线设备构成,并利用中间节点的参与协作实现网络中点到点的动态互联。在缺乏固定有效的基础设施的区域环境中,无线自组织网络有着广阔的应用前景,特别是各种商业、军事和突发灾害场景。
     在无线自组织网络中,各个节点不仅在数据传输层面上需要相互协作以完成网络互联和数据中继传输,而且由于每个节点的资源受限且功能有限,所以在应用层面上更需要相互协作以相互补充和增强整个网络的服务能力。而服务恰恰为无线自组织网络中自主节点的异质资源的抽象化和接口统一表示提供了一种重要的技术手段。然而,无线自组织网络无中心、拓扑动态变化、不可靠等特性却给服务的可靠性带来了很大的挑战。因此,如何在复杂多变的无线自组织网络中实现可靠的服务变成一个具有重要理论研究和应用价值的问题。
     本文对服务的可靠性进行了定义,并从服务生命周期的角度对多个环节的服务的可靠性保证方法进行了深入研究,包括:可靠的服务发现和选择方法,服务的执行时恢复策略与方法,服务的可信性保证等。本文的主要创新点如下:
     首先,提出了一种基于服务磁场(SMF)概念的全新的、高效的服务发现方法。这种方法不仅能够让服务请求者(服务消费者)发现和选择更可靠的服务,而且该方法的效率很高,且可伸缩性好。
     其次,针对服务执行过程可能遇到的异常,提出了两种服务恢复策略和方法。一种是基于备份的恢复策略,一种是基于服务磁场协议扩展的新型服务恢复策略和方法。
     最后,服务的可信性也是实现服务可靠运行的基础。本文针对无线自组织网络的特点,提出一种在基于信誉的可信服务模型。除了探讨了名誉空间到信任空间的转换方式,还提出了一种基于信誉信任模型的可信服务评价算法,并分析了其中的核心问题。
In modern society, computer networks are widely used. Computer software and hardware not only function on one single machine, but gradually becoming available in a distributed computing environment, which have been playing an important role in both academia and industry. A wireless ad-hoc network (WAN) is a wireless network with distributed, uncentralized and dynamic topology. It is infrastructureless, so as to be easily organized, and able to provide computing power and network accessibility to the users. A WAN is usually comprised of a set of independent wireless devices, and supports the cooperation of the intermediate nodes to achieve a peer-to-peer dynamic interconnection. In regions where no fixed infrastructures are available, such as business, military and disaster relief scenarios, WANs have broad application prospects.
     In WANs, it is not enough for the nodes to cooperate on the data transmission tier to accomplish the network interconnection, cooperation on application tier is also needed to enhance the ability of the entire network as the resources and functions of a single node are always limited. Service technology provides a proper and important technique for the abstraction and universal interface of the heterogeneous resources held by the independent nodes in WANs. However, the uncentralized and dynamic topology of WANs yields a huge challenge to the reliability of the services. How to deploy reliable services in the complex and changeable WANs is of great value from the aspects of theory and application.
     This thesis presents a definition of the reliability of services, and studies how to guarantee the reliability of the services from the service life cycle aspect. We discuss approaches for reliable service discovery and selection, strategies for service recovery, and methods to guarantee the credibility of services. The main contribution of this thesis includes:
     First, we propose a "Service-Magnetic-Field (SMF)" based service discovery protocol. This protocol allows service requesters (service consumers) to discover and selects more reliable services, and is of high efficiency and scalability.
     Next, we focus on the possible failures or exceptions in the process of service execution and present two service recovery approaches, one is based on the backup strategy, and another is an extension on the basis of the SMF protocol.
     In the end, we propose a reputation-based credible service model for WANs. We discuss the conversion from the reputation space to the trust space, and propose a credible service evaluation algorithm basing on a reputation and trust model. Additionally, some core issues are also analyzed in this thesis.
引文
[1]I. F. Akyildiz, T. Melodia, and K. R. Chowdhury. A survey on wireless sensor networks[J]. Computer Networks,51(4):921-960,2007.
    [2]Ian F. Akyildiz, Xudong Wang, and Weilin Wang. Wireless mesh networks:a survey [J]. Computer Networks,47(4):445-487,2005.
    [3]W. An, H. Y. Luo, S. Ci, and J. J. Lin. The maximized relay capacity and optimal data transmission for wireless sensor networks [A]. In GLOBECOM[C], pages 1-5,2011.
    [4]Ad hoc On-Demand Distance Vector Routing. http://tools.ietf.org/html/rfc3561,July 2003.
    [5]Michael Armbrust. Armando Fox, Rean Griffith. Anthony D. Joseph. Randy Katz. Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. A view of cloud computing[J]. Commun. ACM,53(4):50-58, April 2010.
    [6]Ken Arnold, Robert Scheifler, Jim Waldo, Bryan O'Sullivan, and Ann Wollrath. Jini Speci-fication[M]. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA,1st edition, 1999.
    [7]P. Basu, W. Ke, and T. D. C. Little. Scalable service composition in mobile ad hoc networks using hierarchical task graphs[A]. In Proc.1st Annual Mediterranean Ad Hoc Networking Workshop[C],2002.
    [8]M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management [A]. In Security and Privacy,1996. Proceedings.,1996 IEEE Symposium on[C], pages 164-173, may 1996.
    [9]Lucas Bordeaux and Gwen Salaun. Using process algebra for web services:Early results and perspectives [J]. In Ming-Chien Shan, Umeshwar Dayal, and Meichun Hsu, editors, Technologies for E-Services, volume 3324 of Lecture Notes in Computer Science, pages 54-68. Springer Berlin/Heidelberg,2005.
    [10]S. Buchegger and J.-Y. Le Boudee. Self-policing mobile ad hoc networks by reputation sys-tems[J]. Communications Magazine, IEEE,43(7):101-107, july 2005.
    [11]Sonja Buchegger and Jean-Yves Le Boudec. Performance analysis of the confidant protocol[A]. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, MobiHoc'02[C], pages 226-236, New York, NY, USA,2002. ACM.
    [12]Sonja Buchegger and Jean-Yves Le Boudec. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks [A]. In P2PEcon 2004[C],2004.
    [13]Tevfik Bultan, Xiang Fu, Richard Hull, and Jianwen Su. Conversation specification:a new approach to design and analysis of e-service composition [A]. In Proceedings of the 12th in-ternational conference on World Wide Web, WWW'03[C], pages 403-410, New York, NY, USA,2003. ACM.
    [14]Peter Buxmann, Thomas Hess, and Sonja Lehmann. Software as a service[J]. WIRTSCHAFTSINFORMATIK,50:500-503,2008.10.1007/s11576-008-0095-0.
    [15]A. S. Cacciapuoti, I. F. Akyildiz, and L. Paura. Correlation-aware user selection for coopera-tive spectrum sensing in cognitive radio ad hoc networks[J]. IEEE Journal on Selected Areas in Communications,30(2):297-306,2012.
    [16]C. L. Cai. S. Ci, S. Guizani, and A. I. Al-Fuqaha. Constructing an efficient mobility profile of ad-hoc node for mobility-pattern-based anomaly detection in manet[A]. In GLOBECOM[C], pages 901-905,2006.
    [17]George Casella and Roger L. Berger. Statistical Inference[M]. Duxbury Press,2 edition, June 2001.
    [18]D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin. Gsd:a novel group-based service dis-covery protocol for manets[A]. In Mobile and Wireless Communications Network,2002.4th International Workshop on[C], pages 140-144,2002.
    [19]D. Chakraborty, F. Perich, A. Joshi, T. W. Finin, and Y. Yesha. A reactive service composition architecture for pervasive computing environments.
    [20]Dipanjan Chakraborty, Anupam Joshi, Tim Finin, and Yelena Yesha. Service composition for mobile environments[J]. Mob. Netw. Appl.,10(4):435-451, August 2005.
    [21]Haiguang Chen, Peng Han, Bo Yu, and Chuanshan Gao. A new kind of session keys based on message scheme for sensor networks [A]. In Microwave Conference Proceedings,2005. A PMC 2005. Asia-Pacific Conference Proceedings[C], volume 1, page 4 pp., dec.2005.
    [22]Haiguang Chen, Peng Han, Xi Zhou, and Chuanshan Gao. Lightweight anomaly intrusion detection in wireless sensor networks[J]. In Christopher Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, and Hsinchun Chen, editors, Intelligence and Security Informatics, volume 4430 of Lecture Notes in Computer Science, pages 105-116. Springer Berlin/Heidelberg,2007.
    [23]W. Chen, Z. He, G. Ren, and W. Sun. Service recovery for composite service in manets. pages 1-4,2008.
    [24]W. Chen, W. Sun, J. Dong, Z. Zhang, and Y. Xu. Discovering and selecting reliable service in mobile ad hoc networks, pages 181-186,2008.
    [25]W. T. Chen, P. Y. Chen, C. H. Wu, and C. F. Huang. A load-balanced guiding navigation protocol in wireless sensor networks [A]. In GLOBECOM[C], pages 61-66,2008.
    [26]Weiyu Chen, Zhenying He, Gang Ren, and Weiwei Sun. Service recovery for composite service in manets [A]. In Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08.4th International Conference on[C], pages 1-4, oct.2008.
    [27]Sudha Chinni, Johnson Thomas, Gheorghita Ghinea, and Zhengming Shen. Trust model for certificate revocation in ad hoc networks[J]. Ad Hoc Networks,6(3):441-457,2008.
    [28]Song Ci. Mining and visualising wireless sensor network data[J]. International Journal of Sensor Networks,5(6):350-357,2007.
    [29]Jing Deng, Richard Han, and Shivakant Mishra. A performance evaluation of intrusion-tolerant routing in wireless sensor networks[J]. In Feng Zhao and Leonidas Guibas, editors, Information Processing in Sensor Networks, volume 2634 of Lecture Notes in Computer Sci-ence, pages 552-552. Springer Berlin/Heidelberg,2003.
    [30]X. J. Du, Y. Xiao, S. Ci, M. Guizani, and H. H. Chen. A routing-driven key management scheme for heterogeneous sensor networks [A]. In ICC[C], pages 3407-3412,2007.
    [31]Thomas Erl. Service-Oriented Architecture:Concepts, Technology, and Design. Prentice Hall PTR, Upper Saddle River, NJ, USA,2005.
    [32]A. Erradi, P. Maheshwari, and V. Tosic. Recovery policies for enhancing web services reliabil-ity [A]. In Web Services.2006. ICWS'06. International Conference on [C], pages 189-196, sept.2006.
    [33]Diego Gambetta. Trust:Making and Breaking Cooperative Relations [M]. Blackwell Publish-ers, February 1990.
    [34]S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, and M. B. Srivastava. Location and identity based secure event report generation for sensor networks. May 2004.
    [35]Saurabh Ganeriwal and Mani B. Srivastava. Reputation-based framework for high integrity sensor networks. In In SASN'04:Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 66-77. ACM Press,2004.
    [36]J.A. Garcia-Macias and D.A. Torres. Service discovery in mobile ad-hoc networks:better at the network layer? [A] In Parallel Processing.2005. ICPP 2005 Workshops. International Conference Workshops on [C], pages 452-457, June 2005.
    [37]P. Guenter, W. Reinhold, S.Reiner, and K. Gerald. Fuzzy-based support for service composi-tion in mobile ad hoc networks, pages 379-384,2007.
    [38]Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitratos, and S. Sajama. Wireless ad hoc networks,2002.
    [39]S. Helal, N. Desai, V. Verma, and Choonhwa Lee. Konark-a service discovery and delivery protocol for ad-hoc networks, volume 3, pages 2107-2113 vol.3,2003.
    [40]Y. Y. Hsu, Y. C. Tseng, C. C. Tseng, C. F. Huang, J. H. Fan, and H. L. Wu. Design and im-plementation of two-tier manets with seamless roaming and load-balancing routing capability. Pervasive and Mobile Computing,2(3):286-299,2006.
    [41]C. F. Huang, L. C. Lo, Y. C. Tseng, and W. T. Chen. Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks. In ISCAS, pages 640-643,2005.
    [42]C. F. Huang, L. C. Lo, Y. C. Tseng, and W. T. Chen. Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks [J]. A CM Transactions on Sensor Networks,2(2):182-187,2006.
    [43]C.-F. Huang and Y.-C. Tseng. The coverage problem in a wireless sensor network [J]. Mobile Networks and Applications,10(4):519-528,2005.
    [44]S. Jiang, X. Yuan, and C. S. Douglas. Minimum disruption service composition and recovery over mobile ad hoc networks [J]. pages 1-8,2007.
    [45]Shanshan Jiang, Yuan Xue, and Douglas C. Schmidt. Minimum disruption service composi-tion and recovery in mobile ad hoc networks [J].2008.
    [46]Audun Josang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation sys-tems for online service provision [J]. Decision Support Systems,43(2):618-644,2007. (?)ce:title(?)merging Issues in Collaborative Commerce(?)/ce:title(?).
    [47]Swaroop Kalasapur, Mohan Kumar, and Behrooz Shirazi. Seamless service composition (sesco) in pervasive environments [A]. In Proceedings of the first ACM international work-shop on Multimedia service composition, MSC'05[C], pages 11-20, New York, NY, USA, 2005. ACM.
    [48]Chris Karlof, Naveen Sastry, and David Wagner. Tinysec:a link layer security architecture for wireless sensor networks [A]. In Proceedings of the 2nd international conference on Embedded networked sensor systems, SenSys'04 [C], pages 162-175, New York, NY, USA,2004. ACM.
    [49]R. Koodli and C.E. Perkins. Service discovery in on-demand ad hoc networks. Internet draft, draft-koodli-manet-servicediscovery-00.txt,2002.
    [50]U.C Kozat and L. Tassiulas. Network layer support for service discovery in mobile ad hoc networks [A]. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies [C], volume 3, pages 1965-1975 vol.3, march-3 april 2003.
    [51]W. Y. Lee and I. F. Akyildiz. Spectrum-aware mobility management in cognitive radio cellular networks [J]. volume 11, pages 529-542,2012.
    [52]李刚,孙红梅,李智,and余海燕.资源受限web服务[J].计算机学报,33(2):193208,2010.
    [53]李景峰.移动自组织网络关键安全问题的研究[D].中国人民解放军信息工程大学,2006.
    [54]Genping Liu, Kai-Juan Wong, Bu sung Lee, Boon chong Seet, Chuan heng Foh, and Lijuan Zhu. Patch:A novel local recovery mechanism for mobile ad-hoc networks[A]. In Proc. of IEEE Vehicular Technology Conference [C], pages 2995-2999,2003.
    [55]D.L. Mcguinness, R. Fikes, J. Hendler, and L.A. Stein. Daml+oil:an ontology language for the semantic web [J]. Intelligent Systems. IEEE,17(5):72-80, sep/oct 2002.
    [56]Pietro Michiardi and Refik Molva. Core:A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks [J]. pages 107-121,2001.
    [57]Sonia Mokhtar, Nikolaos Georgantas, and Valerie Issarny. Ad hoc composition of user tasks in pervasive computing environments [J]. In Thomas Gschwind, Uwe A?mann, and Oscar Nierstrasz, editors, Software Composition, volume 3628 of Lecture Notes in Computer Science, pages 31-46. Springer Berlin/Heidelberg,2005.
    [58]Q. Ni and M. Sloman. An ontology-enabled service oriented architecture for pervasive comput-ing[A]. In Information Technology:Coding and Computing,2005. ITCC 2005. International Conference on[C], volume 2, pages 797-798 Vol.2, april 2005.
    [59]C.S. Oh, Y.B. Ko. and Y.S. Roh. An integrated approach for efficient routing and service discovery in mobile ad hoc networks, pages 184-189,2005.
    [60]B. Peng, W. Sun, J. Dong, and P. Yu. A self-adaptive service discover approach in mobile ad hoc networks[J].2008.
    [61]Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler. Spins: security protocols for sensor networks[J]. Wirel. Netw.,8:521-534, September 2002.
    [62]Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. Spins:Security protocols for sensor networks [J]. In Wireless Networks, pages 189-199,2001.
    [63]Jr. Pires, W.R., T.H. de Paula Figueiredo, H.C. Wong, and A.A.F. Loureiro. Malicious node detection in wireless sensor networks [A]. In Parallel and Distributed Processing Symposium, 2004. Proceedings.18th International [C], page 24, april 2004.
    [64]A.A. Pirzada and C. McDonald. Trusted route discovery with tora protocol [A], In Commu-nication Networks and Services Research,2004.Proceedings. Second Annual Conference on [C], pages 121-130, may 2004.
    [65]Version Bluetooth Provides, Brent Miller, Ericsson Mobile, Communications Ab, Robert Pas-coe, and Salutation Consortium. Mapping salutation architecture apis to bluetooth service discovery layer. In Bluetooth Consortium 1.C.118/1.0.1999.
    [66]quality of service. http://www.ibm.com/developerworks/cn/webservices/ws-quality/, January 2002.
    [67]Lars Rasmusson and Sverker Jansson. Simulated social control for secure internet commerce [A]. In Proceedings of the 1996 workshop on New security paradigms, NSPW'96[C], pages 18-25, New York, NY, USA,1996. ACM.
    [68]O. Ratsimor and D. Chakraborty. Allia:Alliance-based service discovery for ad-hoc environ-ments[J], pages 1-9,2002.
    [69]Dumitru Roman, Uwe Keller, Holger Lausen, Jos de Bruijn. Ruben Lara, Michael Stollberg, Axel Polleres, Cristina Feier, Cristoph Bussler, and Dieter Fensel. Web service modeling ontology [J]. Appl. Ontol, 1(1):77-106, January 2005.
    [70]Narayanan Sadagopan, Fan Bai, Bhaskar Krishnamachari, and Ahmed Helmy. PATHS:anal-ysis of PATH duration statistics and their impact on reactive MANET routing protocols [A]. In MobiHoc'03:Proceedings of the 4th ACM international symposium on Mobile ad hoc networking& computing [C], pages 245-256, New York, NY, USA,2003. ACM.
    [71]S. Shakkottai and P. C. Karlsson. Cross-layer design for wireless networks. IEEE Communi-cations Magazine,41(10):74-80,2003.
    [72]Service Location Protocol, Version 2.0. https://trac.tools.ietf.org/html/rfc2608, June 1999.
    [73]Hamid Sharif:Song Ci, Mohsen Guizani. Adaptive clustering in wireless sensor networks by mining sensor energy data. Computer Communications,30(14):2968-2975.2007.
    [74]石鑫鹏.面向服务的自组织网络模型研究及应用[D].东南大学,2010.
    [75]A. Srinivasan, J. Teitelbaum, and Jie Wu. Drbts:Distributed reputation-based beacon trust system. In Dependable, Autonomic and Secure Computing.2nd IEEE International Sympo-sium on, pages 277-283,29 2006-oct.12006.
    [76]J. X. Sun, D. L. Wu, and S. Ci. Battery capacity footprinting and optimization analysis for wireless multimedia communication. In GLOBECOM, page 2011,201-205.
    [77]Z. Sun and I. F. Akyildiz. Spatio-temporal correlation-based density optimization in wireless underground sensor networks. In GLOBECOM, pages 1-5,2011.
    [78]Z. Sun, P. Wang, M. C. Vuran, M. Al-Rodhaan, A. Al-Dhelaan, and I. F. Akyildiz. Border-sense:Border patrol through advanced wireless sensor networks. Ad Hoc Networks,9(3):468-477,2011.
    [79]邵泽才,丁丁,刘磊,and黄宇红.自组织移动通信网络研究概述[A].2008年中国通信学会无线及移动通信委员会学术年会论文集[C],pages 202-205,2008.
    [80]孙践知,韩忠明,陈丹,and李越辉.灾难场景下基于分组策略的机会网络路由算法[J].计算机工程,37(23):79-82,2011.
    [81]Y. C. Tseng, W. T. Lai, C. F. Huang, and F. J. Wu. Using mobile mules for collecting data from an isolated wireless sensor network[A]. In ICPP[C], pages 673-679,2010.
    [82]J. Tyan and Q.H. Mahmoud. A network layer based architecture for service discovery in mobile ad hoc networks [A]. In Electrical and Computer Engineering,2004.Canadian Conference on[C], volume 3, pages 1379-1384 Vol.3, may 2004.
    [83]Internet Gateway Device (IGD) Standardized Device Control Protocol V 1.0. http://www.upnp.org/standardizeddcps/igd.asp, November 2001.
    [84]A. Varshavsky, B. Reid, and E. de Lara. A cross-layer approach to service discovery and selection in manets[A]. In Mobile Adhoc and Sensor Systems Conference,2005. IEEE Inter-national Conference on[C], pages 8 pp.-466, nov.2005.
    [85]C.N. Ververidis and G.C. Polyzos. Extended zrp:a routing layer based service discovery protocol for mobile ad hoc networks[A]. In Mobile and Ubiquitous Systems:Networking and Services,2005. MobiQuitous 2005. The Second Annual International Conference on[C], pages 65-72, july 2005.
    [86]C.N. Ververidis and G.C. Polyzos. Routing layer support for service discovery in mobile ad hoc networks [A]. In Pervasive Computing and Communications Workshops,2005. PerCom 2005 Workshops[C]. Third IEEE International Conference on, pages 258-262, march 2005.
    [87]Bang Wang. Coverage problems in sensor networks:A survey[J]. ACM Computing Surveys, 43(4):321-352,2011.
    [88]王勇.无线ad hoc(?)网络跨层设计与拓扑控制研究[D].山东大学.2008.
    [89]王书生.自组织网络中服务发现机制的研究[D].东南大学,2010.
    [90]P. Wang, R. Dai, and I. F. Akyildiz. Visual correlation-based image gathering for wireless multimedia sensor networks [A]. In INFOCOM[C], pages 2489-2497,2011.
    [91]Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, and Peter Kruus. Tinypk:securing sensor networks with public key technology [A]. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, SASN'04[C], pages 59-64, New York, NY, USA,2004. ACM.
    [92]Mark Weiser. The computer for the 21st century [J]. SIGMOBILE Mob. Comput. Commun. Rev.,3(3):3-11, July 1999.
    [93]D. L. Wu, S. Ci, and H. H. Wang:. Cross-layer optimization for video summary transmission over wireless networks [J]. IEEE Journal on Selected Areas in Communications,25(4):841-850, 2007.
    [94]F. J. Wu, C. F. Huang, and Y. C. Tseng. Data gathering by mobile mules in a spatially separated wireless sensor network[A]. In Tenth International Conference on Mobile Data Management:Systems, Services and Middleware[C], pages 293-298,2009.
    [95]Fan Ye, Haiyun Luo, Songwu Lu, and Lixia Zhang. Statistical en-route filtering of injected false data in sensor networks[A]. In INFOCOM 2004.Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies[C], volume 4, pages 2446-2457 vol.4, march 2004.
    [96]肖百龙,郭伟,刘军,and祝思路.移动自组网路由局部修复算法的研究[J].计算机研究与发展,44(8):1383-1389,2007.
    [97]S.Yoo, K. Chong, D. Kim, Y. Doh, M. L. Pham, E. Choi, and J. Huh. Guaranteeing real-time services for industrial wireless sensor networks with ieee 802.15.4[J]. IEEE Transactions on Industrial Electronics,57(11):3868-3876,2010.
    [98]X. Zeng, R. Bagrodia, and M. Gerla. Glomosim:A library for parallel simulation of large-scale wireless networks, pages 154-161,1998.
    [99]张鹏,崔勇,and孙磊.移动自组织网络服务质量控制机制综述[J].计算机应用,29(3):625-632,2009.
    [100]张鹏and崔勇.移动自组织网络路由选择算法研究进展[J].计算机科学,37(1):10-22,2010.
    [101]Qing Zhang, Huiqiong Chen, Yijun Yu, Zhipeng Xie, and Baile Shi. Dynamically self-organized service composition in wireless ad hoc networks[J]. In Ming-Chien Shan, Umeshwar Dayal, and Meichun Hsu, editors, Technologies for E-Services, volume 3324 of Lecture Notes in Computer Science, pages 95-106. Springer Berlin/Heidelberg,2005.
    [102]Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks [A]. In Proceedings of the 6th annual international conference on Mobile computing and networking, MobiCom'00[C], pages 275-283, New York, NY, USA,2000. ACM.
    [103]F. Zhao and L. Guibas. Wireless sensor networks:an information processing approach[M]. Morgan Kaufmann, San Francisco,2005.
    7. Chongming Zhang, Xi Zhou, Chuanshan Gao, Chunmei Wang, On Improving the Precision of Localization with Gross Error Removal,In Proceedings of The 28th International Conference on Distributed Computing Systems Workshops (ICDCSW 2008), Beijing, China(EI检索,第2作者)
    8. Peng Han, Xi Zhou, Ying Li, Chen Xun, Chuanshan Gao, An Adapative Realtime Routing Scheme for Wireless Sensor Networks, In Proceedings of The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-07), Volume Ⅱ, pp.918-922, Niagara Falls, Canada(EI检索,第2作者)
    9. Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao, Reputation-based Trust In Wireless Sensor Networks. In Proceedings of international Conference on Multimedia and Ubiquitous Engineering (MUE 2007) pp.603-607, April 26-28,Seoul, Korea(EI检索,第3作者)
    10. Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao, Agent-based Trust Model in Wireless Sensor Networks. In Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Par-allel/Distributed Computing (SNPD 2007), pp.119-124, Qingdao, China(EI检索,第3作者)
    11. Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao Key Feature and Rule-based Intrusion Detection for Wireless Sensor Networks. In Proceedings of 2007 IFIP International Workshop on Network and System Security, pp.164-168, Sept 19-20,2007, Dalian, China. (El检索,第3作者)
    12. Haiguang Chen, Peng Han, Xi Zhou and Chuanshan Cao Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks.In Proceedings of Pacific Asian Workshop on Intelligence and security informatics(PAISI 2007), pp.105-116, Chengdu,China(ISTP检索,第3作者)
    13. Yang Min, Zhang Mi, Han Peng, Chen Haiguang, Xi Zhou, Mao Dilin, Gao Chuan-shan, Using a Depth Tree FRAMEWORK to Evaluate Change Impacts of Mod-ifications to IT Infrastructure, In Proceedings of International Joint Conference on e-Business and Telecommunications, In Conjunction with ACM SIGMIS 2006, Setubal, Portugal.
    14.黄锃,杨克峤,周曦,杨珉,ABCE:Java冗余数组越界检查消除,小型微型计算机系统,31(11):2138-2144,2010.
    15.王笛,杨珉,周曦,一种对象粒度的Java程序并发错误检测框架,小型微型计算机系统(已录用).
    16.周波,张源,杨珉,周曦,用代码缓存复用技术提升Android即时编译,小型微型计算机系统(已录用).
    1.负责Healthcare management项目,2009年12月至2010年11月.
    2.负责IT实验试制平台建设方案,2007年7月至2008年12月.
    3.参加863项目2006AA02Z329:转录因子结合位点及其组合模块挖掘.
    4.参加863项目2006AA012234:自组织网络中的组合服务研究.
    5.参加以消费者体验为中心的电子商务测评体系项目,2007年.
    1.以消费者体验为中心的电子商务测评体系,鉴字[教SW2007]第023号,第二完成

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700