共查询到20条相似文献,搜索用时 0 毫秒
1.
This paper presents several distributed algorithms that cause a token to continually circulate through all the nodes of a mobile ad hoc network. An important application of such algorithms is to ensure total order of message, delivery in a group communication service. Some of the proposed algorithms are aware of, and adapt to changes in the ad hoc network topology. When using a token circulation algorithm, a round is said to complete when every node has been visited at least once. Criteria for comparing the algorithms include the average time, required to complete a round, number of bytes sent per round, and number of nodes visited per round. Comparison between the proposed algorithms is performed using simulation results obtained from a detailed simulation model (with ns-2 simulator). We also give a rigorous worst-case analysis of the proposed LR algorithm, which gives the best overall performance in the simulation. 相似文献
2.
Security and Cooperation in clustered mobile ad hoc networks with centralized supervision 总被引:1,自引:0,他引:1
Vassilaras S. Vogiatzis D. Yovanof G.S. 《Selected Areas in Communications, IEEE Journal on》2006,24(2):329-342
Although individual node cooperation is necessary for the correct execution of network protocols in mobile ad hoc networks (MANETs), it is not always guaranteed. In this paper, we present a node reputation scheme aiming at reinforcing node cooperation in MANETs with centralized control. This scheme was designed for centralized ad hoc network architecture (CANA), an ad hoc enhancement to the HIPERLAN/2 WLAN standard. Misbehavior detection techniques for protocol attacks in both the cluster formation and data transmission phases of the network operation are developed. Statistical methods for selecting the optimal parameters of the reputation scheme are investigated and their efficiency is illustrated through theoretical analysis and simulation results. Throughout this paper, the specific aspects of CANA that impose particular design decisions are outlined and the applicability of our scheme to other network architectures is discussed. 相似文献
3.
Cooperative communications in mobile ad hoc networks 总被引:2,自引:0,他引:2
《Signal Processing Magazine, IEEE》2006,23(5):18-29
4.
Distributed quality-of-service routing in ad hoc networks 总被引:10,自引:0,他引:10
In an ad hoc network, all communication is done over wireless media, typically by radio through the air, without the help of wired base stations. Since direct communication is allowed only between adjacent nodes, distant nodes communicate over multiple hops. The quality-of-service (QoS) routing in an ad hoc network is difficult because the network topology may change constantly, and the available state information for routing is inherently imprecise. In this paper, we propose a distributed QoS routing scheme that selects a network path with sufficient resources to satisfy a certain delay (or bandwidth) requirement in a dynamic multihop mobile environment. The proposed algorithms work with imprecise state information. Multiple paths are searched in parallel to find the most qualified one. Fault-tolerance techniques are brought in for the maintenance of the routing paths when the nodes move, join, or leave the network. Our algorithms consider not only the QoS requirement, but also the cost optimality of the routing path to improve the overall network performance. Extensive simulations show that high call admission ratio and low-cost paths are achieved with modest routing overhead. The algorithms can tolerate a high degree of information imprecision 相似文献
5.
ATCP: TCP for mobile ad hoc networks 总被引:23,自引:0,他引:23
Transport connections set up in wireless ad hoc networks are plagued by problems such as high bit error rates, frequent route changes, and partitions. If we run the transmission control protocol (TCP) over such connections, the throughput of the connection is observed to be extremely poor because TCP treats lost or delayed acknowledgments as congestion. We present an approach where we implement a thin layer between Internet protocol and standard TCP that corrects these problems and maintains high end-to-end TCP throughput. We have implemented our protocol in FreeBSD, and we present results from extensive experimentation done in an ad hoc network. We show that our solution improves the TCP's throughput by a factor of 2-3 相似文献
6.
Xiaodong Lin Rongxing Lu Chenxi Zhang Haojin Zhu Pin-Han Ho Xuemin Shen 《Communications Magazine, IEEE》2008,46(4):88-95
Vehicular communication networking is a promising approach to facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this article we first review the current standardization process, which covers the methods of providing security services and preserving driver privacy for wireless access in vehicular environments (WAVE) applications. We then address two fundamental issues, certificate revocation and conditional privacy preservation, for making the standards practical. In addition, a suite of novel security mechanisms are introduced for achieving secure certificate revocation and conditional privacy preservation, which are considered among the most challenging design objectives in vehicular ad hoc networks. 相似文献
7.
Jie Li Ruidong Li Jien Kato 《Communications Magazine, IEEE》2008,46(4):108-114
In mobile ad hoc networks nodes should collaborate with each other to support the functions of the network. The trust management framework, which evaluates the trust of participating nodes, is used to force nodes to cooperate in a normal way. We make an effort to design a robust and attack-resistant trust management framework for the future. In this article we describe the vulnerabilities of and possible attacks on existing frameworks. An objective trust management framework is proposed to overcome these vulnerabilities. We provide a theoretical basis and skeleton for this framework. The performance evaluation and security analysis are provided showing the effectiveness and robustness of the OTMF compared with existing frameworks. 相似文献
8.
Secure routing for mobile ad hoc networks 总被引:3,自引:0,他引:3
《Communications Surveys & Tutorials, IEEE》2005,7(3):2-21
9.
All existing routing protocols of Mobile Ad Hoc networks (MANET) assume that IP addresses of hosts are already configured before they join the network. In traditional schemes, this task is delegated to the dynamic host configuration protocol (DHCP [R. Droms, Dynamic host configuration protocol, RFC 2131, March 1997]), which allots an IP address to each requesting node. However, this process can not be applied in the context of MANET because of the lack of infrastructure and the great mobility that characterize them. A manual management of the addresses can be considered as long as the number of nodes remains reasonable. On the other hand, it is not possible any more since the network reaches a certain size. Some works proposed solutions to allow an automatic configuration of the nodes, i.e. without human intervention. Unfortunately these processes, often inspired of the traditional wired networks, are not always well adapted to MANET and appear relatively greedy concerning for example the delay, the address space or the bandwidth. Moreover, they apply only to ideal networks in which all nodes can trust each other. In this manner, they do absolutely not consider the security aspects and are thus not adapted to a real use in potentially hostile environment. In this paper, we propose a node auto-configuration scheme which uses the buddy system technique to allocate the addresses, as well as an algorithm allowing to authenticate the participants inside the network. 相似文献
10.
We propose an innovative resource management scheme for TDMA based mobile ad hoc networks. Since communications between some
important nodes in the network are more critical, they should be accepted by the network with high priority in terms of network
resource usage and quality of service (QoS) support. In this scheme, we design a location-aware bandwidth pre-reservation
mechanism, which takes advantage of each mobile node’s geographic location information to pre-reserve bandwidth for such high
priority connections and thus greatly reduces potential scheduling conflicts for transmissions. In addition, an end-to-end
bandwidth calculation and reservation algorithm is proposed to make use of the pre-reserved bandwidth. In this way, time slot
collisions among different connections and in adjacent wireless links along a connection can be reduced so that more high
priority connections can be accepted into the network without seriously hurting admissions of other connections. The salient
feature of our scheme is the collaboration between the routing and MAC layer that results in the more efficient spatial reuse
of limited resources, which demonstrates how cross-layer design leads to better performance in QoS support. Extensive simulations
show that our scheme can successfully provide better communication quality to important nodes at a relatively low price. Finally,
several design issues and future work are discussed.
Xiang Chen received the B.E. and M.E. degrees in electrical engineering from Shanghai Jiao Tong University, Shanghai, China, in 1997
and 2000, respectively. Afterwards, he worked as a MTS (member of technical staff) in Bell Laboratories, Beijing, China. He
is currently working toward the Ph.D. degree in the department of Electrical and Computer Engineering at the University of
Florida. His research is focused on protocol design and performance evaluation in wireless networks, including cellular networks,
wireless LANs, and mobile ad hoc networks. He is a member of Tau Beta Pi and a student member of IEEE.
Wei Liu received the BE and ME degrees in electrical engineering from Huazhong University of Science and Technology, Wuhan, China,
in 1998 and 2001, respectively. He is currently pursuing the P.hD. degree in the Department of Electrical and Computer Engineering,
University of Florida, Gainesville, where he is a research assistant in the Wireless Networks Laboratory (WINET). His research
interest includes QoS, secure and power efficient routing, and MAC protocols in mobile ad hoc networks and sensor networks.
He is a student member of the IEEE.
Hongqiang Zhai received the B.E. and M.E. degrees in electrical engineering from Tsinghua University, Beijing, China, in July 1999 and January
2002 respectively. He worked as a research intern in Bell Labs Research China from June 2001 to December 2001, and in Microsoft
Research Asia from January 2002 to July 2002. Currently he is pursuing the Ph.D. degree in the Department of Electrical and
Computer Engineering, University of Florida. He is a student member of IEEE.
Yuguang Fang received a Ph.D. degree in Systems and Control Engineering from Case Western Reserve University in January 1994, and a Ph.D.
degree in Electrical Engineering from Boston University in May 1997. From June 1997 to July 1998, he was a Visiting Assistant
Professor in Department of Electrical Engineering at the University of Texas at Dallas. From July 1998 to May 2000, he was
an Assistant Professor in the Department of Electrical and Computer Engineering at New Jersey Institute of Technology. In
May 2000, he joined the Department of Electrical and Computer Engineering at University of Florida where he got the early
promotion to Associate Professor with tenure in August 2003 and to Full Professor in August 2005. He has published over 180
papers in refereed professional journals and conferences. He received the National Science Foundation Faculty Early Career
Award in 2001 and the Office of Naval Research Young Investigator Award in 2002. He is currently serving as an Editor for
many journals including IEEE Transactions on Communications, IEEE Transactions on Wireless Communications, IEEETransactions
on Mobile Computing, and ACM Wireless Networks. He is also actively participating in conference organization such as the Program
Vice-Chair for IEEE INFOCOM’2005, Program Co-Chair for the Global Internet and Next Generation Networks Symposium in IEEE
Globecom’2004 and the Program Vice Chair for 2000 IEEE Wireless Communications and Networking Conference (WCNC’2000). 相似文献
11.
Hierarchical techniques have long been known to afford scalability in networks. By summarizing topology detail via a hierarchical map of the network topology, network nodes are able to conserve memory and link resources. Extensive analysis of the memory requirements of hierarchical routing was undertaken in the 1970s. However, there has been little published work that assesses analytically the communication overhead incurred in hierarchical routing. This paper assesses the scalability, with respect to increasing node count, of hierarchical routing in mobile ad hoc networks (MANETs). The performance metric of interest is the number of control packet transmissions per second per node (/spl Phi/). To derive an expression for /spl Phi/, the components of hierarchical routing that incur overhead as a result of hierarchical cluster formation and location management are identified. It is shown here that /spl Phi/ is only polylogarithmic in the node count. 相似文献
12.
Secure data communication in mobile ad hoc networks 总被引:2,自引:0,他引:2
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectively cope with arbitrary malicious disruption of data transmissions, we propose and evaluate the secure message transmission (SMT) protocol and its alternative, the secure single-path (SSP) protocol. Among the salient features of SMT and SSP is their ability to operate solely in an end-to-end manner and without restrictive assumptions on the network trust and security associations. As a result, the protocols are applicable to a wide range of network architectures. We demonstrate that highly reliable communication can be sustained with small delay and small delay variability, even when a substantial portion of the network nodes systematically or intermittently disrupt communication. SMT and SSP robustly detect transmission failures and continuously configure their operation to avoid and tolerate data loss, and to ensure the availability of communication. This is achieved at the expense of moderate transmission and routing overhead, which can be traded off for delay. Overall, the ability of the protocols to mitigate both malicious and benign faults allows fast and reliable data transport even in highly adverse network environments. 相似文献
13.
Wireless Networks - Flooding is one of the most important operations in mobile ad hoc networks. There are two strategies for existing flooding algorithms to make the forwarding decision. The first... 相似文献
14.
Secure routing in mobile wireless ad hoc networks 总被引:3,自引:0,他引:3
We discuss several well known contemporary protocols aimed at securing routing in mobile wireless ad hoc networks. We analyze each of these protocols against requirements of ad hoc routing and in some cases identify fallibilities and make recommendations to overcome these problems so as to improve the overall efficacy of these protocols in securing ad hoc routing, without adding any significant computational or communication overhead. 相似文献
15.
Murat Yuksel Jayasri Akella Shivkumar Kalyanaraman Partha Dutta 《Wireless Networks》2009,15(3):295-312
Existence of line of sight (LOS) and alignment between the communicating antennas is one of the key requirements for free-space-optical
(FSO) communication. To ensure uninterrupted data flow, auto-aligning transmitter and receiver modules are necessary. We propose
a new FSO node design that uses spherical surfaces covered with transmitter and receiver modules for maintaining optical links
even when nodes are in relative motion. The spherical FSO node provides angular diversity in 3-dimensions, and hence provides
an LOS at any orientation as long as there are no obstacles in between the communicating nodes. For proof-of-concept, we designed
and tested an auto-configurable circuit, integrated with light sources and detectors placed on spherical surfaces. We demonstrated
communication between a stationary and a mobile node using these initial prototypes of such FSO structures. We also performed
the necessary theoretical analysis to demonstrate scalability of our FSO node designs to longer distances as well as feasibility
of denser packaging of transceivers on such nodes.
相似文献
Partha DuttaEmail: |
16.
17.
PACMAN: passive autoconfiguration for mobile ad hoc networks 总被引:4,自引:0,他引:4
Mobile ad hoc networks (MANETs) enable the communication between mobile nodes via multihop wireless routes without depending on a communication infrastructure. In contrast to infrastructure-based networks, MANET's support autonomous and spontaneous networking and, thus, should be capable of self-organization and -configuration. This paper presents passive autoconfiguration for mobile ad hoc network (PACMAN), a novel approach for the efficient distributed address autoconfiguration of mobile ad hoc networks. Special features of PACMAN are the support for frequent network partitioning and merging, and very low protocol overhead. This is accomplished by using cross-layer information derived from ongoing routing protocol traffic, e.g., address conflicts are detected in a passive manner based on anomalies in routing protocol traffic. Furthermore, PACMAN assigns Internet protocol (IP) addresses in a way that enables their compression, which can significantly reduce the routing protocol overhead. The performance of PACMAN is analyzed in detail based on various simulation results. 相似文献
18.
Both spectrum sensing and power allocation have crucial effects on the performance of wireless cognitive ad hoc networks. In order to obtain the optimal available subcarrier sets and transmission powers, we propose in this paper a distributed resource allocation framework for cognitive ad hoc networks using the orthogonal frequency division multiple access (OFDMA) modulation. This framework integrates together the constraints of quality of service (QoS), maximum powers, and minimum rates. The fairness of resource allocation is guaranteed by introducing into the link capacity expression the probability that a subcarrier is occupied. An incremental subgradient approach is applied to solve the optimization problems that maximize the weighted sum capacities of all links without or with fairness constraints. Distributed subcarrier selection and power allocation algorithms are presented explicitly. Simulations confirm that the approach converges to the optimal solution faster than the ordinary subgradient method and demonstrate the effects of the key parameters on the system performance. It has been observed that the algorithms proposed in our paper outperform the existing ones in terms of the throughput and number of secondary links admitted and the fairness of resource allocation. 相似文献
19.
Xuejun Tian Yuguang Fang Ideguchi T. 《Wireless Communications, IEEE Transactions on》2006,5(3):612-621
Wireless mobile ad hoc networks (MANETs) have received considerable attention in the last few years. Most research works focus on single-channel MANETs with a single power-level in order to simplify the network design and analysis. How to take advantage of multiple channels and multiple power levels in MANETs poses a serious challenging problem. Recently, a few multichannel transmission protocols such as collision-avoidance transmission scheduling (CATS) have been proposed to harvest the advantage of high transmission efficiency when multiple channels are deployed. Although such protocols do provide ways to coordinate the use of multiple channels, there exist some serious problems such as the throughput fast drop-off under heavy traffic loads. In this paper, we propose a new protocol, namely, multichannel time-spread scheduling (MATS), which attempts to tackle these problems. In MATS, nodes with transmission requests are divided into three groups, which carry out channel reservations in parallel and can simultaneously support unicasting, multicasting and broadcasting at the link level. MATS ensures successful and collision-free data transmissions using the reserved channels and allows multicasting and broadcasting high priorities over unicasting. Both theoretical analysis and extensive simulation studies are carried out which show that the performance of MATS under high traffic loads significantly outperforms the existing schemes. 相似文献
20.
Hao Yang Shu J. Xiaoqiao Meng Songwu Lu 《Selected Areas in Communications, IEEE Journal on》2006,24(2):261-273
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper, we describe SCAN, a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach. SCAN does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to the malicious nodes. In SCAN, local neighboring nodes collaboratively monitor each other and sustain each other, while no single node is superior to the others. SCAN also adopts a novel credit strategy to decrease its overhead as time evolves. In essence, SCAN exploits localized collaboration and information cross-validation to protect the network in a self-organized manner. Through both analysis and simulation results, we demonstrate the effectiveness of SCAN even in a highly mobile and hostile environment. 相似文献