共查询到20条相似文献,搜索用时 328 毫秒
1.
In this paper, we consider the issue of efficient broadcasting in mobile ad hoc networks (MANETs) using network coding and directional antennas. Network coding-based broadcasting focuses on reducing the number of transmissions each forwarding node performs in the multiple source/multiple message broadcast application, where each forwarding node combines some of the received messages for transmission. With the help of network coding, the total number of transmissions can be reduced compared to broadcasting using the same forwarding nodes without coding. We exploit the usage of directional antennas to network coding-based broadcasting to further reduce energy consumption. A node equipped with directional antennas can divide the omnidirectional transmission range into several sectors and turn some of them on for transmission. In the proposed scheme using a directional antenna, forwarding nodes selected locally only need to transmit broadcast messages, original or coded, to restricted sectors. We also study two extensions. The first extension applies network coding to both dynamic and static forwarding node selection approaches. In the second extension, we design two approaches for the single source/single message issue in the network coding-based broadcast application. Performance analysis via simulations on the proposed algorithms using a custom simulator and ns2 is presented. 相似文献
2.
Efficient forwarding scheme for downlink broadcast messages in IEEE 802.16j multi-hop relay networks
Although the IEEE 802.16j standard introduces a connection identifier (CID)-based forwarding scheme and a tunnel-based forwarding scheme, these schemes exhibit poor performance when forwarding broadcast messages. This study considers a CID translation strategy and proposes two CID-translated forwarding schemes for IEEE 802.16 multi-hop relay networks. The basic CID-translated forwarding scheme does not require to append the relay MAC header of the tunnel-based scheme to the broadcast messages. The enhanced CID-translated forwarding scheme further divides a broadcast message into a common part and a specific part and forwards these parts in a multicast manner and a broadcast manner, respectively. Simulation results validate that the basic CID-translated forwarding scheme uses fewer resources than the tunnel-based forwarding scheme. Moreover, the enhanced CID-translated forwarding scheme outperforms the basic CID-translated forwarding scheme in terms of the system resources used and transmission latency. 相似文献
3.
Broadcast schemes play an important role in the performance of mobile ad hoc networks, which are a clear example of ubiquitous wireless multi-hop networks where nodes collaborate in a distributed way. They are widely used as a dissemination mechanism and as a part of the discovery phase of routing protocols. The simple flooding algorithm is the usual mechanism employed in mobile ad hoc networks, but its inefficiency has been demonstrated in congested scenarios due to the high number of collisions and contentions. However, these problems can be partially alleviated by using a probabilistic broadcast approach in which every node forwards the incoming packets according to a certain forwarding probability. In this paper, we use a simple probabilistic broadcast protocol to evaluate the effects of congestion on the performance of broadcasting in ad hoc networks through a mediation analysis. We hypothesize that the congestion mediates in the relationship between the forwarding probability (independent variable) and the output metric (dependent variable). We consider several output metrics according to the application of the broadcasting protocol such as reachability, broadcasting delay, packet delivery fraction and end to end delay. The simulation results show the existence of the mediating effects and how such effects may be counterbalanced depending on the target use of the probabilistic broadcast scheme. 相似文献
4.
城市车载网络作为未来智能交通的重要组成部分,为解决城市交通问题提供了有效的解决方案.现有大部分路由方案未能很好地解决车辆高速移动、复杂城市交通环境和不同车流密度三大问题对路由转发的影响,导致路由协议的性能在高效和可靠性方面不足.根据城市交通信号传播环境、红灯等停以及公交运行轨迹固定、周期循环等特性,提出公交移动协助的城市车载网络路由协议,将车车之间的复杂、不确定路由转换为普通车辆-簇头-公交三层节点之间的确定、协作方式,发挥公交周期移动优势,并用簇头策略优化普通车辆与公交之间的通信.设计根据城市信号传播衰减与车辆移动相关的单跳链路筛选与多跳延迟相关的概率转发机制,保证公交转发的高效、可靠,并设计能自适应车流密度的簇头触发策略,仿真实验结果表明,整体方案转发跳数达到一定数量时,能取得较好的数据传输成功率和较低的网络延迟. 相似文献
5.
Recent vehicular routing proposals use real-time road traffic density estimates to dynamically select forwarding paths. Estimating the traffic density in vehicular ad hoc networks requires the transmission of additional dedicated messages increasing the communications load. These proposals are generally based on unicast sender-based forwarding schemes. The greedy nature of sender-based forwarding can result in the selection of forwarders with weak radio links that might compromise the end-to-end performance. To overcome these limitations, this paper presents TOPOCBF, a novel contention-based broadcast forwarding protocol that dynamically selects forwarding paths based on their capability to route packets between anchor points. Such capability is estimated by means of a multi-hop connectivity metric. The obtained results demonstrate that TOPOCBF can provide good packet delivery ratios while reducing the communications load compared to unicast sender-based forwarding schemes using road traffic density estimates. 相似文献
6.
7.
An Overlay Subscription Network for Live Internet TV Broadcast 总被引:2,自引:0,他引:2
《Knowledge and Data Engineering, IEEE Transactions on》2006,18(12):1711-1720
8.
基于身份加密的机会网络安全路由架构 总被引:1,自引:0,他引:1
机会网络整合了容迟网络、移动自组织网络、社会网络等多种概念,可通过移动节点的相遇性机会实现消息的传输与共享,针对机会网络中目前较为流行的基于社会上下文的路由转发协议,设计了基于身份加密的安全架构来保证节点社会上下文的隐私性以及消息的机密性:通过可搜索的加密算法为每一个节点的社会属性设置相应的陷门,使得中继节点在可计算自... 相似文献
9.
Hassan Chizari Majid Hosseini Shaharuddin Salleh Shukor Abd Razak Abdul Hanan Abdullah 《The Journal of supercomputing》2012,59(2):744-761
MultiPoint Relay (MPR) selection algorithm is a flooding technique for propagating a broadcast message inside an ad-hoc network
which reduces the number of unnecessary broadcast messages in order to save more energy in the network, minimize the number
of packet collisions, and speed up the propagation time. In this paper, we demonstrate that MPR selection is an application
of Set Covering Problem (SCP). A few optimization methods are developed in this work to find the optimum solution including
Simulated Annealing (SA), Tabu Search (TS), Genetic Algorithm (GA), and a new greedy algorithm. Extensive simulations are
set up to evaluate the developed methods. The new algorithm is named Energy eFficient MPR or EF-MPR in short. The simulation
results show that EF-MPR can reduce the number of MPR nodes up to 19%. Moreover, EF-MPR algorithm reduces the power-consumption
of network up to 12% and speed up the propagation time by 9%. 相似文献
10.
在节点高速移动的Ad Hoc网络环境中,广播风暴对网络性能的影响尤为重要,且网络拓扑结构的频繁变化极易导致路由中断.传统的AODV路由协议在路由发现阶段直接使用广播转发RREQ(路由请求分组)机制,容易导致广播风暴降低网络性能;同时,协议选择跳数最少的路径作为路由,没有考虑到节点的快速移动导致路由频繁失效,因此无法适应节点高速移动的网络环境.针对上面存在的问题,提出一种对AODV进行改进的协议.该协议在路由发起过程中,基于局部邻居节点数量计算动态转发概率;选择路由时,利用跨层思想,结合网络节点移动速度提出链路权值,依据链路权值选择路由路径.NS2仿真结果表明:该改进协议提高了数据包的投递率,缩短了端到端的传输时延,能够更好地适应节点高速移动的网络环境. 相似文献
11.
车载自组网(VANET)通过自组织分散环境传播交通数据,交通数据的特点使得VANET数据传播方法更适合依赖广播。然而,当在高密度场景下广播数据时,可扩展问题和数据传播冗余问题变得尤为突出,可能导致广播风暴的发生。针对数据传播冗余和广播开销等问题,以最远转发策略和捎带确认机制为基础,提出一种捎带确认的自适应最远转发策略(AckAMFR),根据存储转发的概念进行信息的传输和存储,降低了数据冗余,具有较强的可靠性和较小的广播开销。仿真结果表明,该转发策略具有低广播开销和高数据传输率的特性。 相似文献
12.
13.
Caifen Wang Yahong Li Hui Qiao Li Chen 《Information Security Journal: A Global Perspective》2017,26(3):136-152
Security is a significant issue for ad-hoc networks. Heterogeneous signcryption schemes proposed in recent years satisfy privacy and authentication of messages and reduce cost of computation and communication in a logical step. In this article, we present a new efficient heterogeneous signcryption scheme that shifts between the public key infrastructure (PKI) and the identity-based cryptosystem (IBC). The proposed scheme is suitable for broadcast communication conditions in which senders can signcrypt multiple messages for multiple receivers simultaneously in the ad-hoc networks. This scheme is proved to satisfy confidentiality and unforgeability on the basis of the assumptions of bilinear Diffie-Hellman problem (BDHP), q-Diffie-Hellman inversion problem (q-DHIP), q-bilinear Diffie-Hellman inversion problem (q-BDHIP), and computational Diffie-Hellman problem (CDHP) in the random oracle model. We discuss the efficiency of our scheme theoretically. In the efficiency analysis phase, we show that our scheme is practical and efficient. In the performance analysis phase, we present additional tests, data, and explanations to prove that our scheme can be applied in ad-hoc networks. Finally, we apply our scheme to a simulated ad-hoc network. 相似文献
14.
泛洪被作为实现广播通信的最简单的技术,广泛应用于车联网VANET(vehicular Ad Hoc network)路由.然而,由于VANET中节点的快速移动以及网络拓扑动态变化,简单的泛洪容易导致大量的冗余数据包,并引发广播风暴.为此,以典型的按需式距离矢量路由协议AODV (Ad Hoc on-demand distance vector)为基础,提出基于概率转发的AODV路由协议,记为AODV_P.AODV_P协议利用概率转发机制替代AODV中的泛洪.节点利用距离、密度信息计算转发概率,并依据转发概率设置计时器.计时器时间越短,成为下一跳转发节点的可能性越大.仿真结果表明,提出的AODV_P能够有效降低冗余数据包,缓解广播风暴问题.与AODV协议相比,AODV_P在传输时延、数据包传输率方面得到了有效提高. 相似文献
15.
For maximizing the energy efficiency in a wireless network, we propose two forwarding schemes termed single-link and multi-link energy-efficient forwarding that tradeoff delivery ratios against energy costs. Multi-link forwarding improves the network performance substantially by addressing multiple receivers at once during the packet forwarding process. If the first forwarding node does not receive a packet correctly, other nodes may act as backup nodes and perform the forwarding instead. By means of mathematical analyses, we derive how the energy efficiency of a forwarding path can be computed and how a forwarding tree is established. Routing cycles are explicitly taken into account and prevented by means of sequence numbers. Simulations and real-world experiments provide a comparison to other reference strategies, showing a superior performance of our forwarding scheme in terms of energy efficiency. 相似文献
16.
A Light-Weight Opportunistic Forwarding Protocol with Optimized Preamble Length for Low-Duty-Cycle Wireless Sensor Networks 下载免费PDF全文
In wireless sensor networks, sensed information is expected to be reliably and timely delivered to a sink in an ad-hoc way. However, it is challenging to achieve this goal because of the highly dynamic topology induced from asynchronous duty cycles and temporally and spatially varying link quality among nodes. Currently some opportunistic forwarding protocols have been proposed to address the challenge. However, they involve complicated mechanisms to determine the best forwarder at each hop, which incurs heavy overheads for the resource-constrained nodes. In this paper, we propose a light-weight opportunistic forwarding (LWOF) scheme. Different from other recently proposed opportunistic forwarding schemes, LWOF employs neither historical network information nor a contention process to select a forwarder prior to data transmissions. It confines forwarding candidates to an optimized area, and takes advantage of the preamble in low-power-listening (LPL) MAC protocols and dual-channel communication to forward a packet to a unique downstream node towards the sink with a high probability, without making a forwarding decision prior to data transmission. Under LWOF, we optimize LPL MAC protocol to have a shortened preamble (LWMAC), based on a theoretical analysis on the relationship among preamble length, delivery probability at each hop, node density and sleep duration. Simulation results show that LWOF, along with LWMAC, can achieve relatively good performance in terms of delivery reliability and latency, as a receiver-based opportunistic forwarding protocol, while reducing energy consumption per packet by at least twice. 相似文献
17.
In cooperative ad-hoc networks, nodes belong to the same authority and pursue the common goals, and will usually unconditionally help each other. Consequently, without necessary countermeasures, such networks are extremely vulnerable to insider attacks, especially under noise and imperfect monitoring. In this paper, we present a game theoretic analysis of securing cooperative ad-hoc networks against insider attacks in the presence of noise and imperfect monitoring. By focusing on the most basic networking function, namely routing and packet forwarding, we model the interactions between good nodes and insider attackers as secure routing and packet forwarding games. The worst case scenarios are studied where initially good nodes do not know who the attackers are while insider attackers know who are good. The optimal defense strategies have been devised in the sense that no other strategies can further increase the good nodes' payoff under attacks. Meanwhile, the optimal attacking strategies and the maximum possible damage that can be caused by attackers have been discussed. Extensive simulation studies have also been conducted to evaluate the effectiveness of the proposed strategies 相似文献
18.
We investigate a network routing problem where a probabilistic local broadcast transmission model is used to determine routing. We discuss this model's key features, and note that the local broadcast transmission model can be viewed as soft handoff for an ad-hoc network. We present results showing that an index policy is optimal for the routing problem. We extend the network model to allow for control of transmission type, and prove that the index nature of the optimal routing policy remains unchanged. We present three distributed algorithms which compute an optimal routing policy, discuss their convergence properties, and demonstrate their performance through simulation. 相似文献
19.