共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
移动自组网中基于预测的路由协议研究 总被引:1,自引:0,他引:1
由于移动自组网中的节点可以任意的运动,导致网络中传输路径的频繁断裂,大量的重路由操作降低了网络性能,并占用了有限的网络资源。而基于预测的路由协议能够有效地减少网络拓扑结构的变化对于路由操作的影响。文章主要讨论了目前已经提出的几种节点运动预测方案.以及基于预测的路由协议,并提出了进一步的研究方向。 相似文献
3.
分析了移动自组网的先应式路由协议DSDV和按需路由协议AODV与DSR,并通过网络仿真软件ns2进行了仿真实验,对其分组投递率,端到端平均时延、吞吐量、路由开销等方面的性能进行了分析和比较.实验结果表明,按需路由协议具有更好的性能. 相似文献
4.
目前的移动自组网研究主要针对运动速度较慢的地面网络。本文研究由高速节点组成的高动态移动自组网的路由协议,提出了一个结合表驱动路由和地理位置路由的混合路由协议TOPOS,在局部使用表驱动路由加快数据包的转发,而在全局使用地理位置路由以适应快速变化的网络拓扑。在OPNET仿真平台上对TOPOS和已有的AODV及GRP协议的性能比较表明,TOPOS对于节点的运动速度和网络规模具有更好的适应性。 相似文献
5.
6.
7.
8.
9.
10.
董文华 《电子技术与软件工程》2022,(16):32-36
本文分析了无线自组网面临的安全风险,介绍了现有安全路由与不足之处,提出了一个以可信计算为基础、信任机制为辅助的可信路由方案,对其中涉及的具体问题进行了分析和研究。 相似文献
11.
12.
移动ad hoc网络(MANET)路由和分组转发功能需要节点间的相互合作,自私节点为节约能量而不参与合作,将会影响网络的正常工作.因此本文将针对自私节点危害和解决方法展开分析,并提出一种改进解决方法——基于可信任中心服务器和邻居监测的合作增强机制,该方法不但能够激励节点间的相互合作,而且有效地解决了自私节点改变用户身份的欺骗攻击.最后,仿真结果表明这种合作增强机制对自私节点安全问题是有效的,并且易于实用化. 相似文献
13.
1 IntroductionMobileadhocnetworksareasetofmobilenodeswhichformandself configurethenetworkwithoutthepre deployedcentraladministrativein frastructure (e.g .thebasestationofWLAN) .Thedemandforadhocnetworkshasbeenbloominginthepastyearsinthecommercialandmilitaryappli cations ,becauseonlyadhocnetworkscanbeappliedinthesituationswherethecentraladministrativein frastructurecan tbe pre installed (e .g .battlefields,disasterrescue)orisnoteconomicaltoinstallbecauseoftemporaryuse (e .g .ameetingintherent… 相似文献
14.
移动Ad hoc网络路由协议标准 总被引:4,自引:0,他引:4
通过重点说明互联网工程任务组(IETF)已通过的两个移动Ad hoc网络路由协议标准,使得相关工程人员在对应用于此种网络的路由协议有一个整体认识基础之上,进一步加深对移动Ad hoc网络原理的理解. 相似文献
15.
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks 总被引:9,自引:0,他引:9
An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes, and also prevents many types of Denial-of-Service attacks. In addition, Ariadne is efficient, using only highly efficient symmetric cryptographic primitives. 相似文献
16.
17.
参考IP Sec的核心思想,并结合MANET的具体实际,提出了一种安全的IP协议SIM(secure IP protocol for manet)。通过在网络层和数据链路层之间添加一个无连接的安全层,对进出协议栈的数据报文进行安全处理。通过将IP Sec的安全协定SA简化为轻量级的适合MANET的SSA,在保持IP安全性的同时降低了协议开销和部署复杂度。进行了基于Linux的协议栈设计和原型系统实现。 相似文献
18.
Maha Abdelhaq Rosilah Hassan Mahamod Ismail 《International Journal of Communication Systems》2014,27(12):4328-4345
A mobile ad hoc network (MANET) is an open wireless network that comprises a set of mobile, decentralized, and self‐organized nodes. Its properties render its environment susceptible to different types of attacks, which can paralyze the mobile nodes in MANET. A particularly dangerous type of attack is run primarily under flooding bogus packet mechanisms, such as hello floods, routing table overflows, exploitation of node penalizing schemes, and resource consumption attack (RCA). Flooding‐based attacks impose severe effects because they are intended to consume MANET resources, such as bandwidth, node memory, and battery power. Therefore, identifying such effects facilitates the development of countermeasures against the intrusions. In this paper, we introduce a simulation‐based study on the effects of RCA on MANET. Qual Net v5.0.2 is used to examine the severity of the effects on MANET performance metrics in terms of throughput, end‐to‐end delay, energy consumption, and routing overhead. The effects of RCA are also monitored under two combinations of four factors: we first vary the number of attackers and attackers' positions, and then modify the attackers' radio range and flooding rate. We also examine the effect of flooding mechanism on the energy consumed by resource consumption attackers. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
19.