首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
Privacy is needed in ad hoc networks. An ad hoc on-demand position-based private routing algorithm, called AO2P, is proposed for communication anonymity. Only the position of the destination is exposed in the network for route discovery. To discover routes with the limited routing information, a receiver contention scheme is designed for determining the next hop. Pseudo identifiers are used for data packet delivery after a route is established. Real identities (IDs) for the source nodes, the destination nodes, and the forwarding nodes in the end-to-end connections are kept private. Anonymity for a destination relies on the difficulty of matching a geographic position to a real node ID. This can be enforced by the use of secure position service systems. Node mobility enhances destination anonymity by making the match of a node ID with a position momentary. To further improve destination privacy, R-AO2P is proposed. In this protocol, the position of a reference point, instead of the position of the destination, is used for route discovery. Analytical models are developed for evaluating the delay in route discovery and the probability of route discovery failure. A simulator based on ns-2 is developed for evaluating network throughput. Analysis and simulation results show that, while AO2P preserves communication privacy in ad hoc networks, its routing performance is comparable with other position-based routing algorithms.  相似文献   

2.
On-demand loop-free routing with link vectors   总被引:1,自引:0,他引:1  
We present the on-demand link vector (OLIVE) protocol, a routing protocol for ad hoc networks based on link-state information that is free of routing loops and supports destination-based packet forwarding. Routers exchange routing information reactively for each destination in the form of complete paths, and each node creates a labeled source graph based on the paths advertised by its neighbors. A node originates a broadcast route request (RREQ) to obtain a route for a destination for which a complete path does not exist in its source graph. When the original path breaks, a node can select an alternative path based on information reported by neighbors, and a node can send a unicast RREQ to verify that the route is still active. A node that cannot find any alternate path to a destination sends route errors reliably to those neighbors that were using it as next hop to the destination. Using simulation experiments in ns2, OLIVE is shown to outperform dynamic source routing, ad hoc on-demand distance vector, optimized link-state routing protocol, and topology broadcast based on reverse-path forwarding, in terms of control overhead, throughput, and average network delay, while maintaining loop-free routing with no need for source routes.  相似文献   

3.
Scalable geographic routing algorithms for wireless ad hoc networks   总被引:1,自引:0,他引:1  
Frey  H. 《IEEE network》2004,18(4):18-22
The design of efficient routing protocols for dynamical changing network topologies is a crucial part of building power-efficient and scalable ad hoc wireless networks. If position information is available due to GPS or some kind of relative positioning technique, a promising approach is given by geographic routing algorithms, where each forwarding decision is based on the positions of current, destination, and possible candidate nodes in vicinity only. About 15 years ago heuristic greedy algorithms were proposed, which in order to provide freedom from loops might fail even if there is a path from source to destination. In recent years planar graph traversal has been investigated as one possible strategy to recover from such greedy routing failures. This article provides a tutorial for this class of geographic routing algorithms, and discusses recent improvements to both greedy forwarding and routing in planar graphs.  相似文献   

4.
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of position-based routing protocols. In this paper, we propose a secure geographic forwarding (SGF) mechanism, which provides source authentication, neighbor authentication, and message integrity by using both the shared key and the TIK protocol. By combining SGF with the Grid Location Service (GLS), we propose a Secure Grid Location Service (SGLS) where any receiver can verify the correctness of location messages. We also propose a Local Reputation System (LRS) aiming at detecting and isolating both compromised and selfish users. We present the performance analysis of both SGLS and LRS, and compare them with the original GLS. Simulation results show that SGLS can operate efficiently by using effective cryptographic mechanisms. Results also show that LRS effectively detects and isolates message dropping attackers from the network.  相似文献   

5.
一种面向高速路车联网场景的自适应路由方法   总被引:1,自引:0,他引:1       下载免费PDF全文
车载自组织网络中节点的高速移动性使得网络拓扑频繁变化,造成路由效率低下.本文提出了一种面向高速路车联网场景的自适应路由方法.本方法采用了贪婪机会转发(GOF)算法,在选择下一跳转发节点时,同时考虑到目的节点的距离计算、节点间的链路状态以及下一跳的有效节点度状况来找出最优转发节点,并提出新的计算连通概率的方法.仿真实验和实际道路场景的测试表明,与相关算法相比在路由稳定性方面表现出较好的效果.  相似文献   

6.
A mobile ad hoc network is a collection of wireless terminals that can be deployed rapidly. Its deficiencies include limited wireless bandwidth efficiency, low throughput, large delays, and weak security. Integrating it with a well-established cellular network can improve communication and security in ad hoc networks, as well as enrich the cellular services. This research proposes a cellular-aided mobile ad hoc network (CAMA) architecture, in which a CAMA agent in the cellular network manages the control information, while the data is delivered through the mobile terminals (MTs). The routing and security information is exchanged between MTs and the agent through cellular radio channels. A position-based routing protocol, the multi-selection greedy positioning routing (MSGPR) protocol, is proposed. At times due to the complicated radio environment, the position information is not precise. Even in these cases, the MT can still find its reachable neighbors (the association) by exchanging hello messages. This association is used in complement with the position information to make more accurate routing decisions. Simulation results show that the delivery ratio in the ad hoc network is greatly improved with very low cellular overhead. The security issues in the proposed architecture and the corresponding solutions are addressed. The experimental study shows that CAMA is much less vulnerable than a pure ad hoc network.  相似文献   

7.
徐方  张沪寅  王晶  徐宁  汪志勇  邓敏 《电子学报》2015,43(5):833-840
无线智能设备的普遍使用促进了机会网络的发展.这类网络处于间歇性连接状态,以自组织方式转发数据.路由协议设计时考虑节点携带者的社会特征和日常行为能够提高机会网络的性能.提出了一种基于社会上下文认知的机会路由算法SCOR,该算法利用网络中的社会上下文信息,通过BP神经网络模型预测节点的移动行为.路由决策过程充分考虑移动节点活动的时间和空间属性,当接收节点与发送节点同时处于网络中的同一连通域时,数据转发采用同步方式,否则采用异步方式.仿真分析和实验结果表明,与其它经典算法相比,SCOR算法提高了数据成功转发的比率,减少了网络的开销.  相似文献   

8.
We consider the problem of localized energy aware routing in mobile ad hoc networks. In localized routing algorithms, each node forwards a message based on the position of itself, its neighbors and the destination. The objective of energy aware routing algorithms is to minimize the total power for routing a message from source to destination or to maximize the total number of routing tasks that a node can perform before its battery power depletes. In this paper we propose new localized energy aware routing algorithms called OLEAR. The algorithms have very high packet delivery rate with low packet forwarding and battery power consumption. In addition, they ensure good energy distribution among the nodes. Finally, packets reach the destination using smaller number of hops. All these properties make our algorithm suitable for routing in any energy constrained environment. We compare the performance of our algorithms with other existing energy and non‐energy aware localized algorithms. Simulation experiments show that our algorithms present comparable energy consumption and distribution to other energy aware algorithms and better packet delivery rate. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

9.
(p,q)-Epidemic routing for sparsely populated mobile ad hoc networks   总被引:3,自引:0,他引:3  
This paper considers (p, q )-Epidemic Routing, a class of store-carry-forward routing schemes, for sparsely populated mobile ad hoc networks. Our forwarding scheme includes Two-Hop Forwarding and the conventional Epidemic Routing as special cases. In such forwarding schemes, the original packet is copied many times and its packet copies spread over the network. Therefore those packet copies should be deleted after a packet reaches the destination. We analyze the performance of (p, q)-Epidemic Routing with VACCINE recovery scheme. Unlike most of the existing studies, we discuss the performance of (p, q)-Epidemic Routing in depth, taking account of the recovery process that deletes unnecessary packets from the network.  相似文献   

10.
This paper is motivated by the observation that traditional ad hoc routing protocols are not an adequate solution for messaging applications (e.g., e-mail) in mobile ad hoc networks. Routing in ad hoc mobile networks is challenging mainly because of node mobility – the more rapid the rate of movement, the greater the fraction of bad routes and undelivered messages. For applications that can tolerate delays beyond conventional forwarding delays, we advocate a relay-based approach to be used in conjunction with traditional ad hoc routing protocols. This approach takes advantage of node mobility to disseminate messages to mobile nodes. The result is the Mobile Relay Protocol (MRP), which integrates message routing and storage in the network; the basic idea is that if a route to a destination is unavailable, a node performs a controlled local broadcast (a relay) to its immediate neighbors. In a network with sufficient mobility – precisely the situation when conventional routes are likely to be non-existent or broken – it is quite likely that one of the relay nodes to which the packet has been relayed will encounter a node that has a valid, short (conventional) route to the eventual destination, thereby increasing the likelihood that the message will be successfully delivered. Our simulation results under a variety of node movement models demonstrate that this idea can work well for applications that prefer reliability over latency.  相似文献   

11.
Active routing for ad hoc networks   总被引:1,自引:0,他引:1  
Ad hoc networks are wireless multihop networks whose highly volatile topology makes the design and operation of a standard routing protocol hard. With an active networking approach, one can define and deploy routing logic at runtime in order to adapt to special circumstances and requirements. We have implemented several active ad hoc routing protocols that configure the forwarding behavior of mobile nodes, allowing data packets to be efficiently routed between any two nodes of the wireless network. Isolating a simple forwarding layer in terms of both implementation and performance enables us to stream delay-sensitive audio data over the ad hoc network. In the control plane, active packets permanently monitor the connectivity and setup, and modify the routing state  相似文献   

12.
Position-based routing in ad hoc networks   总被引:15,自引:0,他引:15  
The availability of small, inexpensive low-power GPS receivers and techniques for finding relative coordinates based on signal strengths, and the need for the design of power-efficient and scalable networks provided justification for applying position-based routing methods in ad hoc networks. A number of such algorithms were developed previously. This tutorial will concentrate on schemes that are loop-free, localized, and follow a single-path strategy, which are desirable characteristics for scalable routing protocols. Routing protocols have two modes: greedy mode (when the forwarding node is able to advance the message toward the destination) and recovery mode (applied until return to greedy mode is possible). We discuss them separately. Methods also differ in metrics used (hop count, power, cost, congestion, etc.), and in past traffic memorization at nodes (memoryless or memorizing past traffic). Salient properties to be emphasized in this review are guaranteed delivery, scalability, and robustness  相似文献   

13.
Vehicular Ad hoc Networks have attracted the interest of the scientific community, since many issues remain open, especially in the research area of routing techniques. In this work we propose a new position-based routing algorithm called Junction-Based Routing. The algorithm makes use of selective greedy forwarding up to the node that is located at a junction and is closer to the destination. If a local optimum is reached, a recovery strategy is applied, the key point of which is our proposed minimum angle method. We evaluate the performance of our routing protocol in real city topology. The simulated scenarios use obstacle modelling and several different Physical layer settings. Simulation results show that our proposal achieves superior performance compared to the well-known Greedy Perimeter Coordinator Routing algorithm.  相似文献   

14.
Contention-based forwarding for mobile ad hoc networks   总被引:10,自引:0,他引:10  
Holger  Jrg  Michael  Martin  Hannes 《Ad hoc Networks》2003,1(4):351-369
Existing position-based unicast routing algorithms which forward packets in the geographic direction of the destination require that the forwarding node knows the positions of all neighbors in its transmission range. This information on direct neighbors is gained by observing beacon messages each node sends out periodically.

Due to mobility, the information that a node receives about its neighbors becomes outdated, leading either to a significant decrease in the packet delivery rate or to a steep increase in load on the wireless channel as node mobility increases. In this paper, we propose a mechanism to perform position-based unicast forwarding without the help of beacons. In our contention-based forwarding scheme (CBF) the next hop is selected through a distributed contention process based on the actual positions of all current neighbors. For the contention process, CBF makes use of biased timers. To avoid packet duplication, the first node that is selected suppresses the selection of further nodes. We propose three suppression strategies which vary with respect to forwarding efficiency and suppression characteristics. We analyze the behavior of CBF with all three suppression strategies and compare it to an existing greedy position-based routing approach by means of simulation with ns-2. Our results show that CBF significantly reduces the load on the wireless channel required to achieve a specific delivery rate compared to the load a beacon-based greedy forwarding strategy generates.  相似文献   


15.
Explicit Multicasting for Mobile Ad Hoc Networks   总被引:1,自引:0,他引:1  
In this paper we propose an explicit multicast routing protocol for mobile ad hoc networks (MANETs). Explicit multicasting differs from common approaches by listing destination addresses in data packet headers. Using the explicit destination information, the multicast routing protocol can avoid the overhead of employing its own route construction and maintenance mechanisms by taking advantage of unicast routing table. Our protocol – termed Differential Destination Multicast (DDM) – is an explicit multicast routing protocol specifically designed for MANET environment. Unlike other MANET multicasting protocols, instead of distributing membership control throughout the network, DDM concentrates this authority at the data sources (i.e. senders) thereby giving sources knowledge of group membership. In addition, differentially-encoded, variable-length destination headers are inserted in data packets which are used in combination with unicast routing tables to forward multicast packets towards multicast receivers. Instead of requiring that multicast forwarding state to be stored in all participating nodes, this approach also provides the option of stateless multicasting. Each node independently has the choice of caching forwarding state or having its upstream neighbor to insert this state into self-routed data packets, or some combination thereof. The protocol is best suited for use with small multicast groups operating in dynamic MANET environment.  相似文献   

16.
A mobile ad hoc network is a self‐created, self‐organized and self‐administering set of nodes connected via wireless links without the aid of any fixed infrastructure or administrator. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even more challenging in the case of wireless mobile ad hoc networks. In this paper we propose a solution using a triple umpiring system (TUS), which provides security for routing and data‐forwarding operations. In our system each node's behaviour from source to destination is closely monitored by a set of three umpires. If any misbehaviour is noticed, umpires flag off the guilty node from the circuit. We have proposed two enhancements to the basic TUS for salvaging the circuit during disruptions in route reply and data‐forwarding phases. The model with these two enhancements is called ETUS. We have implemented TUS and ETUS by modifying the popular Ad hoc On‐Demand Distance Vector protocol. Extensive simulation studies using QualNet 5.0 establish the soundness of the proposal. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

17.
Pricing for enabling forwarding in self-configuring ad hoc networks   总被引:4,自引:0,他引:4  
The assumption that all nodes cooperate to relay packets for each other may not be realistic for commercial wireless ad hoc networks. An autonomous (selfish) node in a wireless network has two disincentives for forwarding for others: energy expenditure (real cost) and possible delays for its own data (opportunity cost). We introduce a mechanism that "fosters cooperation through bribery" in the context of forwarding in ad hoc networks. Using a microeconomic framework based on game theory, we design and analyze a pricing algorithm that encourages forwarding among autonomous nodes by reimbursing forwarding. Taking a joint network-centric and user-centric approach, the revenue maximizing network and utility (measured in bits-per-Joule) maximizing nodes interact through prices for channel use, reimbursements for forwarding, transmitter power control, as well as forwarding and destination preferences. In a three-node (two-sources, one-access-point) network, the network converges to an architecture that induces forwarding only when the network geometries are such that forwarding is likely to increase individual benefits (network revenue and node utilities). For other geometries, the network converges to architectures that do not favor forwarding. We then generalize to a multinode network, where it is seen that the nodes' willingness to forward decrease for large ratios of the average internodal distance to the smallest distance between the access point and any source node. Pricing with reimbursement generally improves the network aggregate utility (or aggregate bits-per-Joule), as well as utilities and revenue compared with the corresponding pricing algorithm without reimbursement.  相似文献   

18.
Greedy and contention-based forwarding schemes were proposed for mobile ad hoc networks (MANETs) to perform data routing hop-by-hop, without prior discovery of the end-to-end route to the destination. Accordingly, the neighboring node that satisfies specific criteria is selected as the next forwarder of the packet. Both schemes require the nodes participating in the selection process to be within the area that confronts the location of the destination. Therefore, the lifetime of links for such schemes is not only dependent on the transmission range, but also on the location parameters (position, speed and direction) of the sending node and the neighboring node as well as the destination. In this paper, we propose a new link lifetime prediction method for greedy and contention-based routing which can also be utilized as a new stability metric. The evaluation of the proposed method is conducted by the use of stability-based greedy routing algorithm, which selects the next hop node having the highest link stability.  相似文献   

19.
黄晓斌  华蓓 《电子技术》2011,38(8):64-66,63
文章针对节点数量多、密度大的一类移动自组网提出了一种跨层联合设计的MAC/路由协议.在MAC层上采用基于调度的信道分配算法以减少通信冲突,在网络层上结合使用表驱动路由和基于地理位置的路由来提高协议适应动态拓扑的能力,并设计了适合TDMA MAC协议的高效的消息交互机制.在OPNET仿真平台上与AODV/802.11和G...  相似文献   

20.
Stojmenovic  I. 《IEEE network》2006,20(1):21-27
We present a simple framework for designing network layer protocols for sensor networks including localized routing, broadcasting, area coverage, and so on. The framework is general enough and is applicable to a variety of problems, network assumptions, and optimality criteria. Our simple framework is based on optimizing the ratio of the cost of making certain decisions (e.g., selecting a forwarding neighbor for routing) to the progress made in doing so (e.g., reduction in distance to destination). We show how to apply this general guideline for the design of hop count, power awareness, maximal lifetime, beaconless and physical-layer-based routing, minimal energy broadcasting, sensor area coverage, and multicasting protocols. Moreover, we show that in the case of routing, the best known strictly localized position-based techniques are, in almost all cases, special cases of the described general cost-to-progress ratio paradigm.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号