Entity

Time filter

Source Type


Liu J.,Northeastern University China | Chen H.,Northeastern University China | Zhen Z.,Academy of Equipment Command and Technology | Sha M.,Allwin Telecommunication Co.
Advances in Intelligent Systems and Computing | Year: 2014

The wormhole attack is a kind of attack that is focusing on routing protocols and having big destructiveness. We propose a path-tracking method based on detecting nodes. It deploys a number of detecting nodes on the edge of the network to find all disjoint paths between them, then to identify a suspicious path that has the smallest hops according to the characteristic of wormhole attack. The detecting node sends a tracing packet to intermediate nodes through the suspicious path, to find and isolate infected nodes. Simulation results show that this detection algorithm resists the wormhole attack effectively and ensures the network security. © Springer India 2014. Source


Liu J.,Northeastern University China | Liu X.,Northeastern University China | Sha M.,Allwin Telecommunication Co.
Advances in Intelligent Systems and Computing | Year: 2014

We propose a detection algorithm based on time delay and topology. Node uses RTT to detect its suspicious neighbors and establish its neighbor list. Then, node finds the abnormal network topology with its neighborhood information. If three or more nodes occur, which are mutually non-1-hop neighbors, in the intersection of the two nodes which are 2-hop neighbors, there is wormhole attack. Then, the false neighbors are isolated. The simulation results show that the algorithm has high detection rate. © Springer India 2014. Source


Liu Q.-Q.,Shenyang Ligong University | Liu Q.-Q.,CAS Shenyang Institute of Automation | Liu Q.-Q.,Allwin Telecommunication Co. | Shen W.-R.,Shenyang Ligong University | Li D.-D.,Shenyang Ligong University
ICIC Express Letters | Year: 2014

This paper investigates quantized feedback stabilization problems for discretetime linear time-invariant systems over noisy, bandwidth-limited digital communication channels. The packet dropout process of the channel is modeled as a Markov process. In particular, the case with limited data rates is considered. An observer-based control and quantization scheme is presented. A sufficient condition on the data rate for stabilization of the MIMO system is derived. An illustrative example is given to demonstrate the effectiveness of the proposed method. © 2014 ISSN 1881-803X. Source


Liu Q.-Q.,Shenyang Ligong University | Liu Q.-Q.,CAS Shenyang Institute of Automation | Liu Q.-Q.,Allwin Telecommunication Co. | Shen W.-R.,Shenyang Ligong University
ICIC Express Letters | Year: 2013

This paper addresses the state feedback stabilization problem for linear timeinvariant systems, where the sensors and the controller are geographically separated and connected over a digital communication network. In particular, the case with the channel propagation delays is considered. A quantizer-controller pair is constructed to stabilize the unstable plant in the mean square sense. The sufficient condition on the data rate of the channel for stabilization is derived. An illustrative example is given to demonstrate the effectiveness of the proposed method. © 2013 ICIC International. Source


Ji C.,Northeastern University China | Wang Y.-R.,Northeastern University China | Sha M.-B.,Allwin Telecommunication Co. | Yang Z.-Y.,94816 PLA Troops
Dongbei Daxue Xuebao/Journal of Northeastern University | Year: 2014

High order FastICA(fast independent component analysis) algorithm has the characteristics of simple form and quick convergence. However, the algorithm is sensitive to its initial value which affects the convergence effect and even results in non-convergence if it is not chosen appropriately. In order to solve this problem, a relaxation factor is introduced into high order Newton iterative method. Through the appropriate correction, the improved high order FastICA algorithm can be obtained, which can not only guarantee the convergence speed, but also effectively overcome the initial value sensitivity problem. Applying the algorithm to the separation experiment of speech signals, the result shows that the proposed algorithm effectively separates the mixed signal, and reduces the dependence on the initial value. Source

Discover hidden collaborations