首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 922 毫秒
1.

Delay tolerant networks (DTNs) are a newest class of networks that have the ability to provide connectivity to areas that are yet to be served by conventional networks. Routing in DTN is a tough task because nodes have no prior information about the partitioned network and transfer opportunities between peer nodes are limited. A node in a DTN delivers messages to the destination using the store and forward strategy. Messages are transmitted to multiple intermediate relay nodes encountered in order to increase the opportunity for the message to reach the destination. Encounter duration is the time period in which a pair or more mobile nodes move into the communication range of each other and hence are able to transfer messages between them. Since the node movements are arbitrary, the encounter duration is unpredictable. This research work proposes a novel encounter based fuzzy logic routing (EFLR) scheme to maximize message delivery with reduced overhead. The fuzzy based utility computation is used for finding a better node to forward messages as well as to drop messages from buffer. Simulation results reveal that EFLR performs better than other existing DTN routing protocols.

  相似文献   

2.
In opportunistic networks,a successful message transmission between node pairs depends on the message size,the transmission speed and the connection duration time.This paper proposes a new message forwarding algorithm to improve the message delivery ratio and reduce the energy consumption.Previous encounter characteristics between nodes are used to estimate future connection duration time using a three point estimation method.Furthermore,the buffer utilization of nodes is used as a weight for the likelihoods to meet destinations according to the hop count of messages stored in the buffer.The simulation results show that the proposed forwarding algorithm achieves higher delivery ratio and less overhead ratio than the other four popular routing protocols.In addition,the proposed algorithm gains a better average residual energy performance among all the compared protocols.  相似文献   

3.
In delay-tolerant networks (DTN), node connection time and message transmission time are two important influencing factors that can improve the delivery rate. In this paper, we first define a new concept called communication capability (CC) and then apply this concept to the delivery predictability formulation in Prophet and improve it. Then, in Prophet, the selection of relay nodes relies only on the delivery predictability and ignores the caching and forwarding capability of the node. Therefore, we combine delivery predictability, buffering, and forwarding capability to develop a new adaptive relay node selection strategy. Subsequently, we define two metrics called message priority (MP) and message strength (MS). The node forwards messages sequentially based on message priority and discards messages based on message strength. Finally, we present a probabilistic routing algorithm based on node communication capability and message strength (CAMS). The simulation results show that compared with traditional routing algorithms, the CAMS can effectively improve the message delivery rate, reduce the overhead ratio, and keep average hop counts low.  相似文献   

4.
Delay/disruption tolerant networks (DTNs) are potentially applicable in the challenged scenarios like post‐disaster environments. In such networks, data forwarding generally relies on the mutual cooperation of the nodes. However, in reality, despite the availability of necessary resources for data forwarding, a node could misbehave by dropping messages received from other nodes with whom it has no strong social ties. Such a node is called a socially selfish node, which would cause a poor delivery ratio in the network. In this paper, we aim to address the problem of multicast data forwarding in the presence of such selfish nodes, by means of efficient relay selection in DTNs. First, we define a realistic reputation model, in contrast to existing models, to define the socially selfish/misbehaving nodes in the network. Further, a game‐theoretic analysis is carried out that implies data forwarding cost is also an influential parameter in handling selfishness/misbehavior. Subsequently, the problem is formulated as a constrained optimization problem, which is NP hard. Therefore, a heuristic is proposed by combining the reputation of a node and the cost of message forwarding to appropriately identify relay nodes, thus improve the performance of the multicast message delivery in the network. We utilize a social metric, centrality to minimize the message forwarding cost in terms of the number of relay nodes. Finally, the comparative performance evaluation in ONE simulator with practical scenarios shows the superiority of the proposed scheme over the other prominent schemes.  相似文献   

5.
When two opportunistic network peers encounter, utility functions are generally employed to select the messages that have to be exchanged, with the purpose of maximizing message delivery probability and reduce congestion. These functions compute weighted sums of various parameters, like centrality, similarity, and trust. Most of the existing solutions statically compute the weights based on offline observations and apply the same values regardless of a node’s context. However, mobile networks are not necessarily constant in terms of behavior and characteristics, so the classic approach might not be suitable. The network might be split into sub-networks, which behave differently from each other. Thus, in this paper, we show that, by dynamically adjusting the behavior of a node based on its context, through the adjustment of the utility function on the fly, the opportunistic forwarding process can be improved. We show that nodes behave differently from each other and have different views of the network. Through real-life trace-based simulations, we prove that our solution is feasible and is able to improve an opportunistic network’s performance from the standpoint of hit rate, latency, and delivery cost.  相似文献   

6.
Selective Message Forwarding in Delay Tolerant Networks   总被引:3,自引:0,他引:3  
It is challenging to deliver messages in a network where no instant end-to-end path exists, so called delay-tolerant network (DTN). Node encounters are used for message forwarding. In this paper, we propose a DTN routing protocol SMART. SMART utilizes the travel companions of the destinations (i.e. nodes that frequently meet the destination) to increase the delivery opportunities while limiting message overhead to a bounded number. Our approach differs from related work in that it does not propagate node encounter history nor the delivery probabilities derived from the encounter history. In SMART, a message source injects a fixed number of message copies into the network to forward the message to a companion of the destination, which only forwards the message to a fixed number of the destination’s companions. Our analysis and simulation results show that SMART has a higher delivery ratio and a smaller delivery latency than the schemes that only use controlled opportunistically-forwarding mechanism and has a significantly smaller routing overhead than a pure flooding scheme.  相似文献   

7.
Designing a safe and reliable way for communicating the messages among the devices and humans forming the Opportunistic Internet of Things network (OppIoT) has been a challenge since the broadcast mode of message sharing is used. To contribute toward addressing such challenge, this paper proposes a Random Forest Classifier (RFC)‐based safe and reliable routing protocol for OppIoT (called RFCSec) which ensures space efficiency, hash‐based message integrity, and high packet delivery, simultaneously protecting the network against safety threats viz. packet collusion, hypernova, supernova, and wormhole attacks. The proposed RFCSec scheme is composed of two phases. In the first one, the RFC is trained on real data trace, and based on the output of this training, the second phase consists in classifying the encountered nodes of a given node as belonging to one of the output classes of nodes based on their past behavior in the network. This helps in proactively isolating the malicious nodes from participating in the routing process and encourages the participation of the ones with good message forwarding behavior, low packet dropping rate, high buffer availability, and a higher probability of delivering the messages in the past. Simulation results using the ONE simulator show that the proposed RFCSec secure routing scheme is superior to the MLProph, RLProph, and CAML routing protocols, chosen as benchmarks, in terms of legitimate packet delivery, probability of message delivery, count of dropped messages, and latency in packet delivery. The out‐of‐bag error obtained is also minimal  相似文献   

8.
A lightweight opportunistic routing forwarding strategy (MOR) was proposed based on Markov chain.In the scheme,the execute process of network was divided into a plurality of equal time period,and the random encounter state of node in each time period was represented by activity degree.The state sequence of a plurality of continuous time period constitutes a discrete Markov chain.The activity degree of encounter node was estimated by Markov model to predict its state of future time period,which can enhance the accuracy of activity degree estimation.Then,the method of comprehensive evaluating forwarding utility was designed based on the activity degree of node and the average encounter interval.MOR used the utility of node for making a routing forwarding decision.Each node only maintained a state of last time period and a state transition probability matrix,and a vector recording the average encounter interval of nodes.So,the routing forwarding decision algorithm was simple and efficient,low time and space complexity.Furthermore,the method was proposed to set optimal number of the message copy based on multiple factors,which can effectively balance the utilization of network resources.Results show that compared with existing algorithms,MOR algorithm can effectively increase the delivery ratio and reduce the delivery delay,and lower routing overhead ratio.  相似文献   

9.
This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.  相似文献   

10.
提出利用连接质量估计节点间消息成功转发的概率,并证明了节点间相关度越高,消息转发率越高。在此基础上,提出基于连接质量和节点相关度的机会网络路由机制。路由计算节点转发效用值时,综合了连接质量和节点相关度;消息转发时,不断向相对于目的节点转发效用值高的节点转发消息。仿真结果表明,与传统路由相比,在消息送达率相同的前提下,该路由消息延迟更小、消耗的总能量更少。  相似文献   

11.
In delay tolerant vehicular networks, gossip is an efficient forwarding scheme, which significantly reduces the message transmission overhead while maintaining a relatively high transmission rate in the high mobility vehicular environment. This mechanism requires vehicles as the network nodes to forward messages according to the system-defined gossip probability in a cooperative and selfless way among all the vehicles in the system. However, in the real word vehicular networks, most of the vehicular nodes exhibit selfish and non-collaboration behaviors to reduce the gossip probability in order to save their own energy and other limited resources in the vehicular nodes. In this paper, we study how node selfishness influences the performance of energy-constrained gossip forwarding based vehicular networks. We consider two typical forms of selfishness in the realistic vehicular networks: individual selfishness and social selfishness, and study the networking performance by focusing on the average message transmission delay and mean transmission cost. First, we model the message transmission process with selfish behaviors in the gossip forwarding based delay tolerant vehicular networks using a continuous time Markov chain. Based on this useful model, we derive closed-form formulae for average message transmission delay and mean transmission cost. Then, we give extensive numerical results to analyze the impact of selfishness on system performance of the vehicular networks. The results show that gossip forwarding in delay tolerant vehicular networks is robust to selfish behaviors since even when they increase the message transmission delay, there is a gain on the message transmission cost.  相似文献   

12.
Many routing protocols have been proposed for wireless ad hoc networks, and most of them are based on some variants of flooding. Thus many routing messages are propagated through the network unnecessarily despite various optimizations. Gossip based routing method has been used and re-investigated to reduce the number of messages in both wired networks and wireless ad hoc networks. However, the global gossiping still generates many unnecessary messages in the area that could be far away from the line between sender node and receiver node. We propose a regional gossip approach, where only the nodes within some region forward a message with some probability, to reduce the overhead of the route discovery in the network. We show how to set the forwarding probability based on the region and the network density both by theoretical analysis and by extensive simulations. Our simulations show that the number of messages generated using this approach is much less than the simple global gossiping method, which already saves many messages compared with global flooding. We expect that the improvement should be even more significant in larger networks.  相似文献   

13.
合理利用节点间的协作关系及相邻节点的缓存资源可有效提高机会网络中节点缓存的利用率与消息的投递率。该文提出一种节点状态感知的分布式协作缓存机制,通过感知消息扩散程度动态估计消息的重要程度,确定消息在缓存操作中的优先级。进而根据节点的活跃度及相对粘度获知给定消息与其目标节点的相遇概率,并针对消息源节点的差异设计分区协作缓存方法,同时在本地缓存处于存满状态时动态选取协作节点,实现本地消息到相邻节点的转移,以达到高效利用缓存资源的目的。结果表明,所提出的协作缓存机制能够有效地利用节点有限的缓存资源,并大幅度地改善消息投递率及节点缓存利用率。  相似文献   

14.
提出一种基于分层的水下传感器网络路由协议(Layered-DBR, layered-depth based routing)。节点进行一次信息广播后,只允许指定深度范围内的节点进行消息接收,以达到控制网络副本的目的,最终建立与网络冗余相关的网络分层模型。在分层网络中,节点首先需要计算消息转发前后的相对深度距离与相对剩余能量,进而计算出消息的转发概率。同时,建立一种消息队列管理机制,该队列同时具有消息转发管理和历史记录管理的功能,并给出消息的入列和出列方法。仿真实验表明,Layered-DBR能够有效地控制网络冗余,与DBR和Flooding算法相比,Layered-DBR能有效地减少网络能耗,延长网络寿命。  相似文献   

15.
The routing efficiency in delay tolerant networks is degraded due to intermittent connection and high latency. Additionally, socially selfish nodes in social networks refuse to provide message forwarding service since there are limited resources. To solve these problems, an improved routing algorithm based on the social link awareness is proposed. In this algorithm, multiple social features of the nodes’ behaviors are utilized to quantify the nodes pairs’ social links. The social links of the nodes pairs are computed based on their encounter history. These social links can be used to construct the friendship communities of the nodes. The intra-community and inter-community forwarding mechanisms are implemented to raise the successful delivery ratio with low overhead and decrease the transmission delay. Simulation results show that the proposed algorithm shortens the routing delay and increases the successful delivery ratio, thereby improving the routing efficiency.  相似文献   

16.

Internet of Things (IoT) is a heterogeneous network of interconnected things where users, smart devices and wireless technologies, collude for providing services. It is expected that a great deal of devices will get connected to the Internet in the near future. Opportunistic networks(OppNet) are a class of disruption tolerant networks characterized by uncertain topology and intermittent connectivity between the nodes. Opportunistic Internet of Things(OppIoT) is an amalgamation of the OppNet and IoT exploiting the communication between the IoT devices and the communities formed by humans. The data is exposed to a wide unfamiliar audience and the message delivery is dependent on the residual battery of the node, as most of the energy is spent on node discovery and message transmission. In such a scenario where a huge number of devices are accommodated, a scalable, adaptable, inter-operable, energy-efficient and secure network architecture is required. This paper proposes a novel defense mechanism against black hole and packet fabrication attacks for OppIoT, GFRSA, A Green Forwarding ratio and RSA (Rivest, Shamir and Adleman) based secure routing protocol. The selection of the next hop is based on node’s forwarding behavior, current energy level and its predicted message delivery probability. For further enhancing the security provided by the protocol, the messages are encrypted using asymmetric cryptography before transmission. Simulations performed using opportunistic network environment (ONE) simulator convey that GFRSA provides message security, saves energy and outperforms the existing protocols, LPRF-MC (Location Prediction-based Forwarding for Routing using Markov Chain) and RSASec (Asymmetric RSA-based security approach) in terms of correct packet delivery by 27.37%, message delivery probability is higher by 34.51%, number of messages dropped are reduced by 15.17% and the residual node energy is higher by 14.08%.

  相似文献   

17.
移动自组织网络资源有限,且节点之间共享无线信道并以协作的方式完成消息转发,导致所传输消息的机密性较为脆弱。为保护消息内容的机密性,该文提出一种间断连接移动自组织网络中的消息转发机制。各节点对原始消息进行切割,并利用多副本消息转发过程的冗余性和节点相似性控制各片段消息在不相交的路径上进行转发,进而由网络中的摆渡节点收集、检验并还原、加密得到仅目的节点能够解密的完整消息,确保转发过程中消息的机密性、完整性。数值分析表明所提机制在保障网络性能前提下,能有效保护消息的机密性。  相似文献   

18.
In opportunistic networks (OppNets), which are characterized by intermittent end‐to‐end connections, the messages are routed in a store‐carry‐and‐forward fashion using the locally inferred knowledge about the behavior of nodes. As such, most OppNets routing protocols use social metrics that are dependent on the nodes' past information. But the participation of nodes in the message forwarding process is not guaranteed without incentivizing them because most nodes are reluctant in sharing their private resources for public uses. In this paper, some socially derived psychological attributes of a node are introduced to ensure their trustworthy participation in the message forwarding process, leading to the design of an altruism‐dependent trust‐based data forwarding mechanism for OppNets (called ATDTN). In this protocol, each node is associated with a dynamically changing altruism value representing its trust in the network, which is used to determine its status with regard to its participation in message forwarding. Through trace‐driven simulations using the ONE simulator, it is shown that ATDTN outperforms IronMan and SimBet protocols for routing in OppNets (respectively, 18% and 48% improvement), in terms of delivery ratio, end‐to‐end delay, overhead count, and average number of hops, under varying buffer size and time‐to‐live.  相似文献   

19.
Due to the instability and intermittent connectivity of links among the nodes and the lack of connectivity in opportunistic network, it is not feasible to use common routing for delivering messages. The only practical method for routing and delivering messages is to use the store-carry-forward routing method. As a case in point, spray and wait is considered to be one of the most appropriate routing methods. The efficiency of this method depends directly on the proper selection of the next hop and the number of copies when it encounters a node. In this paper, a method was proposed that constantly selects the next node and considers the number of copies a node can deliver. In the proposed method, the selection of the next node and the number of message copies to be transmitted by the next hop are based on message carrying time and the probability of message delivery. The network model, based on Markov chain, is extended for analysis. Simulation and analysis results showed that significant enhancement is obtained with the proposed method when measuring metrics such as delay, delivery ratio and copy do comparisons with similar methods.  相似文献   

20.

Delay Tolerant Networks are a type of challenging, uninterrupted network in which there is not an end-to-end path between the source and the destination. These networks play a key role in managing crises in natural disasters such as earthquakes, fires, floods, and more. Due to limited resources, nodes may be reluctant to cooperate in the message relaying and may behave selfishly. Eventually, this lack of cooperation can result in performance degradation. Game theory is one of the mathematical tools to motivate the intermediate nodes to forward messages. In this paper, we use the theory of auction between relay nodes to motivate them to collaborate in forwarding messages. Based on the second-price sealed-bid auction mechanism, the node that does not cooperate in forwarding messages fails to acquire utility. In this way, if the node itself intends to send a message to another node, it will not be able to do so due to a lack of budget. Thus, the selfish behavior of the node causes it to be harmed. Our simulations using the ONE simulator shows that the performance of the proposed method in moderate traffic is improved in terms of significant criteria such as delivery ratio, average buffer usage, hop count, overhead, and so on. The results also show that under intense traffic conditions, the performance of the proposed method is far better than that of moderate traffic.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号