Computer Science ›› 2022, Vol. 49 ›› Issue (9): 268-274.doi: 10.11896/jsjkx.210700220

• Computer Network • Previous Articles     Next Articles

Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft

GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang   

  1. School of Automation,Northwestern Polytechnical University,Xi'an 710129,China
  • Received:2021-07-23 Revised:2022-01-03 Online:2022-09-15 Published:2022-09-09
  • About author:GUO Peng-jun,born in 1996,postgra-duate.His main research interests include airborne communication network and wireless communication network.
    ZHANG Jing-zhou,born in 1960,professor,master supervisor.His main research interests include computer networks,airborne network,computer control and computer measurement.

Abstract: With the rapid development of avionics system,a large number of devices and sensors are connected to the in-plane network,which makes the architecture of the in-plane communication network complex and heavy.Wireless communication network can effectively solve many problems,such as complicated wiring,heavy weight and difficult line fault detection.However,wireless network still has certain limitations in real-time and reliability,which is precisely the most concerned problem of airborne interconnection system.In this paper,the existing wired communication network architecture is analyzed,a hybrid communication network architecture of wireless access network and wired backbone network is designed according to its communication characteristics.The candidate wireless communication schemes are evaluated and selected.The fixed time slot of wireless network access is improved to dynamic allocation according to traffic,the mathematical model of dynamic time slot allocation is established,and the TDMA period and the optimal time slot allocation strategy are designed.Finally,a typical airborne network task shows that the strategy can improve the network utilization rate from 36.5% to 41.8% on the premise of ensuring that the system is schedulable,which verifies the effectiveness of the method.

Key words: Avionics wireless communication networks, Ultra-wideband communication, Time division multiple access, Time slot allocation, Access control

CLC Number: 

  • TP393
[1]HE F.airborne network technology foundation [M].National Defense Industry Press.2018:224-225.
[2]PETER R J,NATARAJAN K.Performance Evaluation ofWireless Protocols for Avionics Wireless Network [J].Aepospace Information Systems,2020,17(3):1-5.
[3]AYSEGUL A,ANDREAS B.Dynamic Reconfigurability ofWireless Sensor and Actuator Networks in Aircraft[C]//International Conference on Wireless for Space and Extreme Environments(WISEE).2017:10-12.
[4]ROBLES R,TOVAR E,CINTRA J,et al.Wireless avionics intra-communications:current trends and design issues[C]//Ele-venth International Conference on Digital Information Management.2016:266-273.
[5]AKRAM R N,MARKANTONAKIS K,MAYES K,et al.Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks [J].IEEE Internet of Things Journal,2016,19(5):20-31.
[6]PARK P,DI MARCO P,NAH J,et al.Wireless avionics intra-communications:a survey of benefits,challenges,and solutions[J].IEEE Internet of Things Journal,2020,7( 99):1-23.
[7]FRANK L,DIMITRI T,SERGIO B.Wireless in-cabin communication for aircraft infrastructure[J].Springer Science & Business Media,2011,56(4):28-31.
[8]DANG D K,MIFDAOUI A,GAYRAUD T.Fly-By-Wireless for next generation aircraft Challenges and potential solutions[C]//Wireless Days.IEEE,2012:1-8.
[9]DANG D K.Timing Analysis of TDMA-based Networks using Network [C]//Calculus and Integer Linear Programming.2014:26-30.
[10]ZHANG C,XIAO J,ZHAO L.Wireless asynchronous transfer mode based fly-by-wireless avionics network[C]//Digital Avio-nics Systems Conference.IEEE,2013:1-15.
[11]LI S N,FAN X H,LIU Z Z.Status and Analysis of WirelessAvionics Intra-Communications Network Protocol [J].Journal of Beijing University of Posts and Telecommunications,2021,44(3):1-10.
[12]ROLAND W.Distributed platform of integrated modular avio-nics system [M].Beijing:Aviation Industry Press,2015.
[13]XIONG H G,WANG Z H.Advanced avionics integrated technology [M].Beijing:National Defense Industry Press,2009.
[14]RAMANATT P R,NATARAJAN K,SHOBHA K R.Challenges inimplementing a wireless avionics network[J].Aircraft Engineering and Aerospace Technology,2020,92(3):482-494.
[15]SAMBOU B,PEYRARD F.Scheduling avionicsflows on anIEEE 802.11e HCCA and AFDX hybrid network[J].Procee-dings of International Symposium on Computers and Communications,2011,31(5):205-212.
[16]AKRAM R N,MARKANT-ONAKIS K.Security and Perfor-mance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks[C]//International Conference on Wireless for Space and Extreme Environments(WISEE).2016:25-29.
[17]BANG I,NAM H,CHANG W,et al.Channel measurementand feasibility test for wireless avionics intra-communication[J].Sensors,2019,19( 6):1-15.
[18]BAYKAS T,SUM C S,LAN Z,et al.IEEE802.15.3c:the first IEEE wireless standard for data rates over 1 Gb/s[J].Communications Magazine IEEE,2011,49(7):114-121.
[19]ALLIANCE W.ECMA-368 High Rate Ultra-Wideband PHYand MAC Standard[S].ECMA Std,2018:12-15.
[20]ZUO Y J,LI Q,XONG H G,et al.Analysis and simulation ofavionics MB-OFDM-UWB wireless interconnection channel[J].Acta Aeronautica et Astronautica Sinica,2019,40( 7):1-10.
[21]HE F.Theory and approach to avionics system integrated sche-duling[M].Beijing:Tsinghua University Press,2017.
[22]WANG W,WU G Y,GUO Z,et al.Data Scheduling and Resource Optimization for Fog Computing Architecture in Industrial IoT[C]//2019 International Conference on Distributed Computing and Internet Technology.2019:141-149.
[23]ZHAO L X,POP P,LI Q.Timing analysis of rate-constrained traffic in TTE thernet using network calculus[J].Real-Time System,2017,53(2):254-287.
[1] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[2] GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316.
[3] CHENG Xue-lin, YANG Xiao-hu, ZHUO Chong-kui. Research and Implementation of Data Authority Control Model Based on Organization [J]. Computer Science, 2021, 48(6A): 558-562.
[4] PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319.
[5] CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190.
[6] HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584.
[7] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[8] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[9] GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403.
[10] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[11] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[12] TU Yuan-fei,ZHANG Cheng-zhen. Secure and Efficient Electronic Health Records for Cloud [J]. Computer Science, 2020, 47(2): 294-299.
[13] QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101.
[14] WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun. Client Puzzle Based Access Control Model in Public Blockchain [J]. Computer Science, 2019, 46(4): 129-136.
[15] HUANG Mei-rong, OU Bo, HE Si-yuan. Access Control Method Based on Feature Extraction [J]. Computer Science, 2019, 46(2): 109-114.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!