Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (6): 21-30.doi: 10.11959/j.issn.2096-109x.2021084
• TopicⅠ: Novel Network Technology and Security • Previous Articles Next Articles
Lixia XIE1, Liping YAN1, Hongyu YANG1,2
Revised:
2021-05-24
Online:
2021-12-15
Published:
2021-12-01
Supported by:
CLC Number:
Lixia XIE, Liping YAN, Hongyu YANG. Aeronautical Ad Hoc network node failure analysis method[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 21-30.
[1] | RANA A , KUMAR V . Aircraft ad-hoc network (AANET)[J]. International Journal of Innovative Research in Computer and Communication Engineering, 2019,3(5): 6679-6684. |
[2] | ZHANG J K , CHEN T H , ZHONG S D ,et al. Aeronautical networking for the Internet above the clouds[J]. Proceedings of the IEEE, 2019,107(5): 868-911. |
[3] | VEY Q , PIROVANO A , RADZIK J ,et al. Aeronautical ad hoc network for civil aviation[M]. Lecture Notes in Computer Science. Cham: Springer, 2014: 81-93. |
[4] | BULDYREV S V , PARSHANI R , PAUL G ,et al. Catastrophic cascade of failures in interdependent networks[J]. Nature, 2010,464(7291): 1025-1028. |
[5] | DESHPANDE A A , CHIARIOTTI F , ZANELLA A . SMURF:reliable multipath routing in flying Ad-Hoc networks[C]// Proceedings of 2020 Mediterranean Communication and Computer Networking Conference (MedComNet). 2020: 1-8. |
[6] | GUILLEN-PEREZ A , MONTOYA A M , SANCHEZ-AARNOUTSE J C , ,et al. A comparative performance evaluation of routing protocols for flying Ad-Hoc networks in real conditions[J]. Applied Sciences, 2021,11(10): 4363. |
[7] | MIRZAEINIA A , MIRZAEINIA M , SHEKARAMIZ M ,et al. Adaptive retransmission time out in flying Ad-Hoc network by LSTM machine learning:round trip time prediction[C]// Proceedings of AIAA Scitech 2020 Forum. 2020:53. |
[8] | SHAO J , BULDYREV S V , HAVLIN S ,et al. Cascade of failures in coupled network systems with multiple support-dependence relations[J]. Physical Review E,Statistical,Nonlinear,and Soft Matter Physics, 2011,83(3): 36116. |
[9] | MA L , WANG Z L , YANG F ,et al. Robust state of charge estimation based on a sequence-to-sequence mapping model with process information[J]. Journal of Power Sources, 2020,474, 228691. |
[10] | LI Y M , ZHAO L M , YU Z Y ,et al. Traffic flow prediction with big data:a learning approach based on SIS-complex networks[C]// Proceedings of 2017 IEEE 2nd Information Technology,Networking,Electronic and Automation Control Conference (ITNEC). 2017: 550-554. |
[11] | WANG Z Y , CHEN G , LIU L ,et al. Cascading risk assessment in power communication interdependent networks[J]. Physica A:Statistical Mechanics and Its Applications, 2020,540, 120496. |
[12] | SHEN Y , REN G , ZHANG N ,et al. Effects of mutual traffic redistribution on robustness of interdependent networks to cascading failures under fluctuant load[J]. Physica A:Statistical Mechanics and Its Applications, 2020,560, 125138. |
[13] | 韩丽, 刘彬, 邓玉静 ,等. 加权无标度网络的级联失效模型[J]. 软件学报, 2017,28(10): 2769-2781. |
HAN L , LIU B , DENG Y J ,et al. Cascading failure model of weighted scale-free networks[J]. Journal of Software, 2017,28(10): 2769-2781. | |
[14] | 谭跃进, 吴俊, 邓宏钟 . 复杂网络中节点重要度评估的节点收缩方法[J]. 系统工程理论与实践, 2006,26(11): 79-83,102. |
TAN Y J , WU J , DENG H Z . Evaluation method for node importance based on node contraction in complex networks[J]. Systems Engineering-Theory & Practice, 2006,26(11): 79-83,102. | |
[15] | ZHANG G D , LI Z , ZHANG B ,et al. Understanding the cascading failures in Indian power grids with complex networks theory[J]. Physica A:Statistical Mechanics and Its Applications, 2013,392(15): 3273-3280. |
[16] | 李树栋 . 复杂网络级联动力学行为机制研究[D]. 北京:北京邮电大学, 2012. |
LI S D . Research on the mechanism of cascading dynamics and behaviors of complex networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2012. | |
[17] | FU X W , YANG Y S , POSTOLACHE O . Invulnerability of clustering wireless sensor networks against cascading failures[J]. IEEE Systems Journal, 2019,13(2): 1431-1442. |
[18] | LUO Q , WANG J F . Multiple QoS parameters-based routing for civil aeronautical Ad Hoc networks[J]. IEEE Internet of Things Journal, 2017,4(3): 804-814. |
[19] | WANG N , JIN Z Y , ZHAO J . Cascading failures of overload behaviors on interdependent networks[J]. Physica A:Statistical Mechanics and Its Applications, 2021,574, 125989. |
[20] | LIU B Y , DENG Y . Risk evaluation in failure mode and effects analysis based on D numbers theory[J]. International Journal of Computers Communications & Control, 2019,14(5): 672-691. |
[21] | LUO Q , WANG J , WANG X ,et al. Aero-Sim:an NS-2 based simulator for aeronautical Ad Hoc networks[J]. KSII Transactions on Internet and Information Systems (TIIS), 2015,9(7): 2548-2567. |
[22] | 陈高平, 邓勇 . 航空无线电导航原理[M]. 北京: 国防工业出版社, 2008. |
CHEN G P , DENG Y . Principle of aeronautical radio navigation[M]. Beijing: National Defense Industry Press, 2008. |
[1] | Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU. Image double fragile watermarking algorithm based on block neighborhood [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48. |
[2] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[3] | Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN. Insider threat detection based on operational attention and data augmentation [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112. |
[4] | Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG. Software diversity evaluating method based on gadget feature analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173. |
[5] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[6] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[7] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[8] | Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG. Intrinsic assurance: a systematic approach towards extensible cybersecurity [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102. |
[9] | Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI. Efficient and fully simulated oblivious transfer protocol on elliptic curve [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 158-166. |
[10] | Fenghua LI, Hui LI, Ben NIU, Weidong QIU. Academic connotation and research trends of privacy computing [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 1-8. |
[11] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[12] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[13] | Jun LIU, Lin YUAN, Zhishang FENG. Survey of key management schemes for cluster networks [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69. |
[14] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[15] | Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU. Lip forgery detection via spatial-frequency domain combination [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 146-155. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|