• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhu Lin, Meng Kun, Lin Chuang, Xu Kun. TH-award:A Performance and Security Test Platform for Wireless Multi-Hop Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 661-670. DOI: 10.7544/issn1000-1239.2015.20131320
Citation: Zhu Lin, Meng Kun, Lin Chuang, Xu Kun. TH-award:A Performance and Security Test Platform for Wireless Multi-Hop Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 661-670. DOI: 10.7544/issn1000-1239.2015.20131320

TH-award:A Performance and Security Test Platform for Wireless Multi-Hop Networks

More Information
  • Published Date: February 28, 2015
  • Wireless multi-hop network technology paves a way of ad hoc communication among nodes and facilitates users to access Internet. However, due to the natures of wireless media and distributed operation mode, more performance and security challenges in wireless multi-hop networks are faced, and designing efficient protocols are one of the main research objectives in this field. To solve the problem of relying much on simulation to aid protocols design, the paper proposes an integrated platform, the testbed for high-level analysis of wireless ad-hoc routing design(TH-award), helps to test and analyze the performance and security of designed protocols through implementing them on it. TH-award consists of commercial routers, servers and embedded development boards. By analyzing the work mechanisms of protocols, TH-award is designed with a protocol rule library, a parameter library and a test and analysis library, which permits users not only to customize and deploy their designed protocols, but also to easily get the results in terms of performance and security of them. In the end, we implement comprehensive experiments by TH-award to verify its feasibility.
  • Related Articles

    [1]Shen Jie, Long Biao, Jiang Hao, Huang Chun. Implementation and Optimization of Vector Trigonometric Functions on Phytium Processors[J]. Journal of Computer Research and Development, 2020, 57(12): 2610-2620. DOI: 10.7544/issn1000-1239.2020.20190721
    [2]Fu Liguo, Pang Janming, Wang Jun, Zhang Jiahao, Yue Feng. Optimization of Library Function Disposing in Dynamic Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(8): 1783-1791. DOI: 10.7544/issn1000-1239.2019.20170871
    [3]Wang Ruiwei, Li Zhanshan, Li Hongbo. Optimizing eSTR Algorithm for Solving Constraint Satisfaction Problems[J]. Journal of Computer Research and Development, 2016, 53(7): 1586-1595. DOI: 10.7544/issn1000-1239.2016.20150284
    [4]Huang Guangqiu, Sun Siya, Lu Qiuqin. SEIRS Epidemic Model-Based Function Optimization Method—SEIRS Algorithm[J]. Journal of Computer Research and Development, 2014, 51(12): 2671-2687. DOI: 10.7544/issn1000-1239.2014.20130814
    [5]Feng Xiang, Ma Meiyi, and Yu Huiqun. Lake-Energy Optimization Algorithm for Travelling Salesman Problem[J]. Journal of Computer Research and Development, 2013, 50(9): 2015-2027.
    [6]Wu Jianhui, Zhang Jing, Li Renfa, Liu Zhaohua. A Multi-Subpopulation PSO Immune Algorithm and Its Application on Function Optimization[J]. Journal of Computer Research and Development, 2012, 49(9): 1883-1898.
    [7]Cai Shaobin, Gao Zhenguo, Pan Haiwei, Shi Ying. Localization Based on Particle Swarm Optimization with Penalty Function for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2012, 49(6): 1228-1234.
    [8]Gong Wenyin and Cai Zhihua. Research on an ε-Domination Based Orthogonal Differential Evolution Algorithm for Multi-Objective Optimization[J]. Journal of Computer Research and Development, 2009, 46(4): 655-666.
    [9]Qi Yutao, Liu Fang, and Jiao Licheng. A Pheromone Meme Based Immune Clonal Selection Algorithm for Function Optimization[J]. Journal of Computer Research and Development, 2008, 45(6).
    [10]Hao Zhongxiao, Li Yanjuan. Study on Membership Problem with Respect to Temporal Functional Dependencies and Temporal Multivalued Dependencies[J]. Journal of Computer Research and Development, 2006, 43(7): 1267-1272.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return