• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhu Lin, Meng Kun, Lin Chuang, Xu Kun. TH-award:A Performance and Security Test Platform for Wireless Multi-Hop Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 661-670. DOI: 10.7544/issn1000-1239.2015.20131320
Citation: Zhu Lin, Meng Kun, Lin Chuang, Xu Kun. TH-award:A Performance and Security Test Platform for Wireless Multi-Hop Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 661-670. DOI: 10.7544/issn1000-1239.2015.20131320

TH-award:A Performance and Security Test Platform for Wireless Multi-Hop Networks

More Information
  • Published Date: February 28, 2015
  • Wireless multi-hop network technology paves a way of ad hoc communication among nodes and facilitates users to access Internet. However, due to the natures of wireless media and distributed operation mode, more performance and security challenges in wireless multi-hop networks are faced, and designing efficient protocols are one of the main research objectives in this field. To solve the problem of relying much on simulation to aid protocols design, the paper proposes an integrated platform, the testbed for high-level analysis of wireless ad-hoc routing design(TH-award), helps to test and analyze the performance and security of designed protocols through implementing them on it. TH-award consists of commercial routers, servers and embedded development boards. By analyzing the work mechanisms of protocols, TH-award is designed with a protocol rule library, a parameter library and a test and analysis library, which permits users not only to customize and deploy their designed protocols, but also to easily get the results in terms of performance and security of them. In the end, we implement comprehensive experiments by TH-award to verify its feasibility.
  • Related Articles

    [1]Lei Xiangxin, Yang Zhiying, Huang Shaoyin, Hu Yunfa. Mining Frequent Subtree on Paging XML Data Stream[J]. Journal of Computer Research and Development, 2012, 49(9): 1926-1936.
    [2]Zhu Ranwei, Wang Peng, and Liu Majin. Algorithm Based on Counting for Mining Frequent Items over Data Stream[J]. Journal of Computer Research and Development, 2011, 48(10): 1803-1811.
    [3]Hu Wenyu, Sun Zhihui, Wu Yingjie. Study of Sampling Methods on Data Mining and Stream Mining[J]. Journal of Computer Research and Development, 2011, 48(1): 45-54.
    [4]Yang Bei, Huang Houkuan. Mining Top-K Significant Itemsets in Landmark Windows over Data Streams[J]. Journal of Computer Research and Development, 2010, 47(3): 463-473.
    [5]Xu Zhen, Sha Chaofeng, Wang Xiaoling, Zhou Aoying. A Semi-Supervised Learning Algorithm from Imbalanced Data Based on KL Divergence[J]. Journal of Computer Research and Development, 2010, 47(1): 81-87.
    [6]Mao Guojun and Zong Dongjun. An Intrusion Detection Model Based on Mining Multi-Dimension Data Streams[J]. Journal of Computer Research and Development, 2009, 46(4): 602-609.
    [7]Wang Tao, Li Zhoujun, Yan Yuejin, Chen Huowang. A Survey of Classification of Data Streams[J]. Journal of Computer Research and Development, 2007, 44(11): 1809-1815.
    [8]Liu Xuejun, Xu Hongbing, Dong Yisheng, Qian Jiangbo, Wang Yongli. Mining Frequent Closed Patterns from a Sliding Window over Data Streams[J]. Journal of Computer Research and Development, 2006, 43(10): 1738-1743.
    [9]Liu Xuejun, Xu Hongbing, Dong Yisheng, Wang Yongli, Qian Jiangbo. Mining Frequent Patterns in Data Streams[J]. Journal of Computer Research and Development, 2005, 42(12): 2192-2198.
    [10]Yang Yidong, Sun Zhihui, Zhang Jing. Finding Outliers in Distributed Data Streams Based on Kernel Density Estimation[J]. Journal of Computer Research and Development, 2005, 42(9): 1498-1504.

Catalog

    Article views (1394) PDF downloads (592) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return