Computer Science ›› 2022, Vol. 49 ›› Issue (9): 268-274.doi: 10.11896/jsjkx.210700220
• Computer Network • Previous Articles Next Articles
GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang
CLC Number:
[1]HE F.airborne network technology foundation [M].National Defense Industry Press.2018:224-225. [2]PETER R J,NATARAJAN K.Performance Evaluation ofWireless Protocols for Avionics Wireless Network [J].Aepospace Information Systems,2020,17(3):1-5. [3]AYSEGUL A,ANDREAS B.Dynamic Reconfigurability ofWireless Sensor and Actuator Networks in Aircraft[C]//International Conference on Wireless for Space and Extreme Environments(WISEE).2017:10-12. [4]ROBLES R,TOVAR E,CINTRA J,et al.Wireless avionics intra-communications:current trends and design issues[C]//Ele-venth International Conference on Digital Information Management.2016:266-273. [5]AKRAM R N,MARKANTONAKIS K,MAYES K,et al.Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks [J].IEEE Internet of Things Journal,2016,19(5):20-31. [6]PARK P,DI MARCO P,NAH J,et al.Wireless avionics intra-communications:a survey of benefits,challenges,and solutions[J].IEEE Internet of Things Journal,2020,7( 99):1-23. [7]FRANK L,DIMITRI T,SERGIO B.Wireless in-cabin communication for aircraft infrastructure[J].Springer Science & Business Media,2011,56(4):28-31. [8]DANG D K,MIFDAOUI A,GAYRAUD T.Fly-By-Wireless for next generation aircraft Challenges and potential solutions[C]//Wireless Days.IEEE,2012:1-8. [9]DANG D K.Timing Analysis of TDMA-based Networks using Network [C]//Calculus and Integer Linear Programming.2014:26-30. [10]ZHANG C,XIAO J,ZHAO L.Wireless asynchronous transfer mode based fly-by-wireless avionics network[C]//Digital Avio-nics Systems Conference.IEEE,2013:1-15. [11]LI S N,FAN X H,LIU Z Z.Status and Analysis of WirelessAvionics Intra-Communications Network Protocol [J].Journal of Beijing University of Posts and Telecommunications,2021,44(3):1-10. [12]ROLAND W.Distributed platform of integrated modular avio-nics system [M].Beijing:Aviation Industry Press,2015. [13]XIONG H G,WANG Z H.Advanced avionics integrated technology [M].Beijing:National Defense Industry Press,2009. [14]RAMANATT P R,NATARAJAN K,SHOBHA K R.Challenges inimplementing a wireless avionics network[J].Aircraft Engineering and Aerospace Technology,2020,92(3):482-494. [15]SAMBOU B,PEYRARD F.Scheduling avionicsflows on anIEEE 802.11e HCCA and AFDX hybrid network[J].Procee-dings of International Symposium on Computers and Communications,2011,31(5):205-212. [16]AKRAM R N,MARKANT-ONAKIS K.Security and Perfor-mance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks[C]//International Conference on Wireless for Space and Extreme Environments(WISEE).2016:25-29. [17]BANG I,NAM H,CHANG W,et al.Channel measurementand feasibility test for wireless avionics intra-communication[J].Sensors,2019,19( 6):1-15. [18]BAYKAS T,SUM C S,LAN Z,et al.IEEE802.15.3c:the first IEEE wireless standard for data rates over 1 Gb/s[J].Communications Magazine IEEE,2011,49(7):114-121. [19]ALLIANCE W.ECMA-368 High Rate Ultra-Wideband PHYand MAC Standard[S].ECMA Std,2018:12-15. [20]ZUO Y J,LI Q,XONG H G,et al.Analysis and simulation ofavionics MB-OFDM-UWB wireless interconnection channel[J].Acta Aeronautica et Astronautica Sinica,2019,40( 7):1-10. [21]HE F.Theory and approach to avionics system integrated sche-duling[M].Beijing:Tsinghua University Press,2017. [22]WANG W,WU G Y,GUO Z,et al.Data Scheduling and Resource Optimization for Fog Computing Architecture in Industrial IoT[C]//2019 International Conference on Distributed Computing and Internet Technology.2019:141-149. [23]ZHAO L X,POP P,LI Q.Timing analysis of rate-constrained traffic in TTE thernet using network calculus[J].Real-Time System,2017,53(2):254-287. |
[1] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[2] | GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316. |
[3] | CHENG Xue-lin, YANG Xiao-hu, ZHUO Chong-kui. Research and Implementation of Data Authority Control Model Based on Organization [J]. Computer Science, 2021, 48(6A): 558-562. |
[4] | PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319. |
[5] | CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190. |
[6] | HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584. |
[7] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[8] | WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65. |
[9] | GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403. |
[10] | PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318. |
[11] | WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291. |
[12] | TU Yuan-fei,ZHANG Cheng-zhen. Secure and Efficient Electronic Health Records for Cloud [J]. Computer Science, 2020, 47(2): 294-299. |
[13] | QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101. |
[14] | WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun. Client Puzzle Based Access Control Model in Public Blockchain [J]. Computer Science, 2019, 46(4): 129-136. |
[15] | HUANG Mei-rong, OU Bo, HE Si-yuan. Access Control Method Based on Feature Extraction [J]. Computer Science, 2019, 46(2): 109-114. |
|