Embedded Dynamic Security Networking Technology Based on Fast Jump and Trust Degree

Article Preview

Abstract:

The traditional embedded system networking technology ignores the security of network systems, either ignores fast networking requirements of network system, these requirements can be achieved at the same time. A embedded dynamic security networking technology based on fast jump and trust degree is proposed, when systems is networking, the use of random beating from multiple network nodes and fast switching optimize network search methods. Experimental results show that the proposed method can detect distribution of systems security risks accurately, and has a good application value for network security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2773-2775

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Zhou Yahui, Li Yun, Liu Zhanjun, et al. Analysis of connectivity in wireless multi-hop network [J]. Computer engineering, 2009, 35(8): 143-146.

Google Scholar

[2] Yao Yubin. Determination of network topology by fast quasi-square of the adjacency matrix [J]. Power system protection and control, 2012, 40(6):17-21.

Google Scholar

[3] F Farahmand, et al. Relay node placement in vehicular delay-tolerant networks[C]. IEEE Global Telecommunications Conference (GLOBECOM), New Orleans, USA: IEEE, 2008: 1-5.

DOI: 10.1109/glocom.2008.ecp.483

Google Scholar

[4] Zhou Lin, Chen Yu, Feng Tingting. Self-healing network organization and protocol implementation based on ZigBee technology [J]. Communication technology, 2012, 45(2): 1-4.

Google Scholar

[5] L Pan, et al. Optimal placement of gateways in vehicular networks [J]. IEEE Trans Veh Technol, 2007, 56(6): 3421-3430.

DOI: 10.1109/tvt.2007.907230

Google Scholar

[6] Li Xiaohui, et al. An Improved ZigBee Routing Strategy for Monitoring System[C]. First International Conference on Intelligent Networks and Intelligent, 2009: 255-258.

DOI: 10.1109/icinis.2008.118

Google Scholar