首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 62 毫秒
1.
任智  周佳琦 《电讯技术》2023,63(9):1368-1374
为了解决软件定义无人机自组网(Software-defined Unmanned Aerial Vehicle Ad Hoc Network, SDUANET)中转发黑洞和更新轮次问题,提出了一种软件定义无人机自组网快速一致性更新机制(Software-defined Unmanned Aerial Vehicle Ad Hoc Network Fast Consistent Update Mechanism, SDUANET-FCU)。新机制首先对节点进行分类操作,对可能会导致转发黑洞的发送操作进行约束;其次,针对含有两个规则的节点提出一种基于混合规则的两轮一致性更新策略;最后,将计算得出的Flow-mod发送顺序整合到两轮更新顺序中。仿真结果表明,在软件定义无人机自组网场景下,相比于现有的软件定义网络(Software Defined Network, SDN)更新方法,SDUANET-FCU降低了转发黑洞的概率和控制消息的数量,减少了平均更新轮次。  相似文献   

2.
针对SDN(软件定义网络)环境下的安全问题,文章提出一种在SDN控制器上部署安全策略的方案,主要实现SDN防火墙的网站过滤设计。首先设计用户访问的网站的检测过滤模块,其次通过软件设计API(应用程序编程接口)方式实现网络的安全访问控制,最后设计数据库存储拦截过滤规则和拦截日志。通过系统测试表明该安全架构具有良好的可靠性应用。  相似文献   

3.
杨磊  龙伟 《电讯技术》2024,64(7):1058-1064
传统无线路由方式不能很好地适应无人机自组网通信链路不稳定、节点能量受限等特点,为此,提出了一种新的基于信任的路由方案。首先,考虑了节点传输数据包所产生的能耗,对已有的分簇算法进行优化,选择剩余能量超过阈值的节点作为转发候选。其次,引入转发正确率、节点交互频度、探测成功率等信任因子对节点行为进行建模,由簇头节点汇聚所有的信任信息,并利用贝叶斯理论评估节点信任值。最后,在传统按需路由协议基础上,通过节点剩余能量、节点信任值及跳数来计算整体路由成本,并基于路由成本选择转发节点,确保了路由路径上的节点性能及行为可靠。所提方案有效提高了分组投递率及吞吐量,降低了端到端时延与转发能耗。  相似文献   

4.
黄巍  陈俊良  李犹海 《电讯技术》2022,62(1):138-146
无人机自组网(Unmanned Aerial Vehicle Ad Hoc Network,UAVANET)主要应用于现代数字科技战场,具备传统无线自组织网络的快速组网、多跳传输和多任务协作等特点,同时拥有更高的抗毁性.无人机自组网能确保网络运行的灵活性和顽健性,但是在实际组网过程中,网络结构和组网方式的不同对作战能力...  相似文献   

5.
无人机自组网研究进展综述   总被引:5,自引:0,他引:5  
卓琨  张衡阳  郑博  戚云军 《电信科学》2015,31(4):134-144
随着世界各国对无人机(UAV)运用的不断重视、多无人机协同应用的兴起和无线自组网应用研究的迅猛发展,无人机自组网已成为新的研究热点.首先对无人机自组网的基本概念、主要特点和应用优势进行了总结,进而重点对MAC协议、路由协议、传输协议、跨层设计、机会网络5个方面关键技术的研究进展进行了系统综述,简要介绍了国内外主要研究机构的实验平台开发情况,最后指出了无人机自组网存在的挑战和亟待研究解决的重点问题.  相似文献   

6.
无人机自组网(UAV Ad Hoc Network, UANET)是一种新型的移动自组织网络形式,具有3D空间中高移动性、拓扑结构频繁变化、带宽资源有限等特点,其中路由协议是UANET中一个重要且关键的部分。由于UANET中无人机节点的移动性,不断变化的拓扑结构使得寻找适合应用在UANET中的路由协议的过程比较复杂,网络中的链路中断和无人机节点失效也会导致网络资源的损失,降低了网络的可靠性和稳定性;因此,寻找源节点和目的节点之间的传输路由协议十分必要。结合上述问题,提出了适用于无人机自组网的基于最短路径的改进路由算法,该算法可以实现多路径传输,并且从丢包率、端到端时延和抖动三个方面来评估该算法的性能。仿真结果表明,改进的路由算法在无人机随机分布的高流量场景下,获得了比已有算法更好的性能。  相似文献   

7.
8.
软件定义无人机自组网场景下,相较于软件定义有线网络,其网内节点数量更多导致各节点流表数量爆发式增长。针对原OpenFlow v1.5协议中主动下发流表的机制与flow_mod消息结构对于无线环境与多跳流表下发的不兼容,导致无人机自组网场景下流表下发开销过大以及收包率降低。对于无人机自组网场景下OpenFlow v1.5协议中的问题,通过组播切包组包去尾策略与流表源、目的地址自适应压缩策略,减少了头部开销,提升了无线资源利用率,并减少了冗余的流表项部分,在保证功能不缩减的情况下较显著地减少了开销。OPENET 14.5仿真验证显示,此机制大幅减少了网络控制开销,提高了网络吞吐量,降低了端到端时延与丢包率。  相似文献   

9.
SDFAC:软件定义的流接入控制机制   总被引:1,自引:0,他引:1  
王秀磊  张国敏  胡超  陈鸣  魏祥麟 《通信学报》2015,36(Z1):188-196
SDN控制平面与数据平面分离的体系架构为实现细粒度的流管理以及灵活的中心化控制提供了基础。基于此,提出了一种软件定义的流接入控制机制SDFAC。首先从流的粒度对接入控制进行建模分析,给出了实现细粒度流接入控制所需要满足的条件;其次描述了SDFAC的基本框架和工作原理并设计了一种支持SDFAC功能的流鉴别协议;最后基于原型系统验证了SDFAC的可行性和可用性。  相似文献   

10.
软件定义网络(Software Defined Network,SDN)依靠着其集中控制、可编程性和数控分离等优点,能够有效解决无人机网络(Flying Ad Hoc Network,FANET)面临的任务拓扑高度变化、网络链路连接不稳定、网络安全防护脆弱以及应用程序的异构性等问题,极大地提升FANET的灵活性和可靠性。针对SDN架构与FANET的结合问题,描述了SDN的体系架构,并以SDN控制器部署方式为关注点分类别概括了近几年软件定义无人机网络(Software-defined Flying Ad Hoc Network,SD-FANET)的研究进展,重点阐述了结合移动边缘计算(Mobile Edge Computing,MEC)的SD-FANET研究现状,最后指出了SD-FANET的应用场景和一些具体的未来研究方向。  相似文献   

11.
设计无人机自组网媒体接入控制(Medium Access Control,MAC)协议时,需要考虑其控制开销和数据传输的可靠性。鉴于此,结合现有无线自组网多跳时分多址接入(Time Division Multiple Access,TDMA)协议和无人机自组网特点,提出了一种高效可靠的无人机自组网多跳TDMA协议。首先采用高效负载均衡的时隙请求信息上传机制,选择一个负载较小的节点转发节点时隙请求信息;然后根据相互通信的父节点删除重复节点的时隙请求信息,减少相同节点的时隙请求信息转发次数;最后通过实时更新节点时隙请求信息机制,提高节点时隙请求信息传输的可靠性。仿真结果表明,该协议在数据传输成功率、平均时延、控制开销方面优于现有协议,可较好地应用在无人机自组网中。  相似文献   

12.
赵凯  黄璇  徐华伟  刘斌辉 《电讯技术》2022,62(7):989-993
无人机数据链的有效通信距离是无人机的一项重要指标,如何准确高效地对有效通信距离进行测试表征,对于无人机安全运行和评估系统正常工作的可靠度具有重要意义。在分析无人机数据链通信链路中传输损耗构成的基础上,从测试环境可控性、测试效率、可重复性、贴近业务应用等方面比较了当前主要测试方法之间的优劣,设计了室内拉距测试方法并完成相应测试,最后根据吞吐量指标对有效通信距离与实际业务应用间的关系进行了讨论。所提出的无人机数据链有效通信距离测试方法简单易行,测试结果准确,具有较强的实用价值。  相似文献   

13.
李琳  陈刚 《激光与红外》2018,48(9):1123-1127
针对低空消费级无人机这种低慢小目标,采用理论建模和对实验中飞行温度参数实测的方法,建立了目标红外辐射模型以及背景辐射参数模型,得到了与实测结果比较相符的红外探测距离。指出了对这类低红外辐射目标,对阳光反射和背景噪声必须精细估算才能得到比较准确的红外作用距离。另外,通过对分析结果的讨论,对未来无人机红外探测系统的设计提出了一些建议。  相似文献   

14.
在未来高对抗环境下,夺取空中优势至关重要,无人作战飞机(UCAV)的参战将实现飞行员零伤亡。人工智能(AI)作为无人作战飞机未来发展的颠覆性技术之首,将从力量倍增器或作战支持转变为真正的人类替代者。从AI对UCAV的作用与意义出发,介绍了国外UCAV相关的人工智能项目的研究进展,总结了UCAV相关的AI智能算法,分析了UCAV的发展趋势。随着人工智能技术、机载处理技术以及传感器技术的进步,UCAV将在未来战争中实现智能协同、智能任务与智能飞行,成为空战的主力。  相似文献   

15.
The unmanned aerial vehicle network communication includes all points of interest during the coverage path planning. Coverage path planning in such networks is crucial for many applications, such as surveying, monitoring, and disaster management. Since the coverage path planning belongs to NP-hard issues, researchers in this domain are constantly looking for optimal solutions for this task. The speed, direction, altitude, environmental variations, and obstacles make coverage path planning more difficult. Researchers have proposed numerous algorithms regarding coverage path planning. In this study, we examined and discussed existing state-of-the-art coverage path planning algorithms. We divided the existing techniques into two core categories: Classical and reinforcement learning. The classical algorithms are further divided into subcategories due to the availability of considerable variations in this category. For each algorithm in both types, we examined the issues of mobility, altitude, and characteristics of known and unknown environments. We also discuss the optimality of different algorithms. At the end of each section, we discuss the existing research gaps and provide future insights to overcome those gaps.  相似文献   

16.
This paper considers the channel assignment problem in a multi‐channel MANET environment. We propose a scheme called GRID, by which a mobile host can easily determine which channel to use based on its current location. In fact, following the GSM style, our GRID spends no communication cost to allocate channels to mobile hosts since channel assignment is purely determined by hosts' physical locations. We show that this can improve the channel reuse ratio. We then propose a multi‐channel MAC protocol, which integrates GRID. Our protocol is characterized by the following features: (i) it follows an ‘on‐demand’ style to access the medium and thus a mobile host will occupy a channel only when necessary, (ii) the number of channels required is independent of the network topology, and (iii) no form of clock synchronization is required. On the other hand, most existing protocols assign channels to a host statically even if it has no intention to transmit [IEEE/ACM Trans. Networks 1995; 3 (4):441–449; 1993; 1 (6): 668–677; IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352], require a number of channels which is a function of the maximum connectivity [IEEE/ACM Trans. Networks 1995; 3 (4):441–449; 1993; 1 (6): 668–677; Proceedings of IEEE MILCOM'97, November 1997; IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352], or necessitate a clock synchronization among all hosts in the MANET [IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352; Proceedings of IEEE INFOCOM'99, October 1999]. Through simulations, we demonstrate the advantages of our protocol. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

17.
Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号