首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A two-phase beamforming solution for secure communication using untrusted relay nodes is presented. To thwart eavesdropping attempts of participant relay nodes, we deliberately introduce artificial noise in the source message. We observe that for certain scenarios, the source node prefers to allocate its full power to the message signal and, therefore, in the absence of artificial noise, such transmissions will be vulnerable to eavesdropping. Therefore, we provide a signal-to-noise ratio (SNR) based framework for secure communication. We intend to bring down the SNR at each of the untrusted relay nodes below a certain predefined threshold; whereas, using beamforming, we want to boost the SNR at the destination. With this motive, we evaluate the optimal scaling vector for the beamforming phase, which not only nullifies the artificial noise transmitted initially, but also maximizes the SNR at the destination. We discuss both the total and individual power constraint scenarios and provide an analytical optimal solution and an iterative algorithm, respectively.  相似文献   

2.
Mobile ad hoc routing protocols fails in intermittently connected networks (ICN) (i.e. characterized by short-range communication and absence of connected path from source to destination). However, Epidemic routing techniques ensures eventual message delivery from source to destination even where there is never a connected path or when a network partition exists at the origin of message. Epidemic Routing uses random pair-wise messages exchanges between nodes with goals to maximize message delivery rate, minimize message latency, and the total resources consumed in message delivery. Epidemic routing uses summary vector to avoid useless transmission and redundancy. Further,to make summery vector efficient, epidemic routing can use bloom filter to significantly reduce the useless transmissions associated with the summary vector. However, the challenge for epidemic routing remains opens is to optimal design of summary vector size for finite buffer while keeping the benefits of infinite buffer space. This paper proposes an improved scheme of Bloom filter (named it modified bloom filter MBLF), which is tailored according to epidemic routing. We performed simulation to support our clam and observed that delivery ratio of MBLF with epidemic routing is 19 % higher then the traditional bloom filter. In this paper, we have proposed a bloom filter based epidemic forwarding for ICNs.  相似文献   

3.
Owing to the uncertainty of transmission opportunities between mobile nodes, the routing in delay tolerant networks (DTNs) exploits the mechanism of store‐carry‐and‐forward. In this routing mechanism, mobility plays an important role, and we need to control the mobility of nodes around the network to help with carrying messages from the source to the destination. This is a difficult problem because the nodes in the network may move arbitrarily and it is difficult for us to determine when the nodes should move faster to help the data transmission while considering the complicated energy consumption in such a network. At the same time, for most DTNs, the system energy is limited, and energy efficient algorithms are crucial to maximizing the message delivery probability while reducing the delivery cost. In this paper, we investigate the problem of energy efficient mobility speed control in epidemic routing of DTN. We model the message dissemination process under variable mobility speed by a continuous‐time Markov model. With this model, we then formulate the optimization problem of the optimal mobility control for epidemic routing and obtain the optimal policy from the solution of this optimization problem. Furthermore, extensive numerical results demonstrate that the proposed optimal policy significantly outperforms the static policy with constant speed, in terms of energy saving. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

4.

In vehicular ad-hoc network, vehicles are move very speedy thus their topology is changing frequently and intermittent connectivity occur often. The intermittent connectivity network (delay and disruption-tolerant network) resulting is end to end path is absent. In this intermittent network connectivity areas, during emergency event occurs, emergency rescue message (Example: Fire, Accident, etc.,) are sent to a rescue team is most necessary. Due to these constraints, general ad hoc protocol approaches is not suitable and, as a result, alternative protocol must be deliberated. This leads to the make a specific protocol mechanisms able to deliver both fast and trustworthiness in-order delivery emergency message needed. Thus we introduce the DFEMDR protocol, it follow the vehicular delay tolerant network (VDTN) common technique store carry-forward method and message replicas. This paper describes an efficient Delay tolerant Fast Emergency Message Dissemination Routing Protocol, called DFEMD routing protocol. This protocol enables in VDTN, the source node broadcast an emergency message to all available node in its communication range. The source node allocates a message replicas and message time to live to the neighbour nodes (forwarded node) based on that node has credence value. Credence value is calculated to all nodes based on two values; the first value is visited level estimation, it is calculated based on the number of nodes previously visited by the node. The second value is Destination Reaches Level Estimation (DLE); it is calculated based on the number of times the node successfully delivered the message to the destination. Finally, each node credence value is calculated, from this visited level and destination reaches level estimation values. Finally, the trust authority received emergency messages and evaluate the trustworthiness of message based on message reputation value or message confidence value.

  相似文献   

5.
An efficient distributed fault‐tolerant routing algorithm for the hypercube is proposed based on the existence of a complete set of node‐disjoint paths between any two nodes. Node failure and repairs may occur dynamically provided that the total number of faulty nodes at any time is less than the node‐connectivity n of the n‐cube. Each node maintains for each possible destination which of the associated node‐disjoint paths to use. When a message is blocked by a node failure, the source node is warned and requested to switch to a different node‐disjoint path. The methods used to identify the paths, to propagate node failure information to source nodes, and to switch from one routing path to another incur little communication and computation overhead. We show that if the faults occur reasonably apart in time, then all messages will be routed on optimal or near optimal paths. In the unlikely case where many faults occur in a short period, the algorithm still delivers all messages but via possibly longer paths. An extension of the obtained algorithm to handle link failures in addition to node failures is discussed. We also show how to adapt the algorithm to n‐ary n‐cube networks. The algorithm can be similarly adapted to any interconnection network for which there exists a simple characterization of node‐disjoint paths between its nodes. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

6.
Most schemes in mobile social networks (MSNs) assume that nodes simply forward messages without considering selfishness. We therefore first devise social preference-based selfishness for MSNs by which nodes decide to drop or keep (forward) and replace messages to save buffer space according to the message preference and the communities of nodes. We then propose a novel cooperative forwarding scheme for social preference-based selfishness in MSNs, the social preference-aware forwarding scheme (SPF) incorporates the proposed message forwarding scheme and a buffer replacement policy for the message preference. It takes advantage of social information with the home-cell community-based mobility model. Considering the contact probability and buffer replacement policy for the message preferences, SPF, therefore, efficiently delivers messages to the destination by reflecting the degree of selfishness to which nodes cooperatively manage their buffer spaces and how frequently and how recently they meet. Consequently, all nodes can cooperatively drop or keep (forward) and replace the messages in the buffer spaces for the message preferences in SPF. SPF outperforms Epidemic, PRoPHET, and SimBet in terms of delivery ratio, network traffic, buffer space, hop count, and replacement frequency.  相似文献   

7.
Energy harvesting from the working environment has received increasing attention in the research of wireless sensor networks. Recent developments in this area can be used to replenish the power supply of sensors. However, power management is still a crucial issue for such networks due to the uncertainty of stochastic replenishment. In this paper, we propose a generic mathematical framework to characterize the policy for single hop transmission over a replenishable sensor network. Firstly, we introduce a Markov chain model to describe different modes of energy renewal. Then, we derive the optimal transmission policy for sensors with different energy budgets. Depending on the energy status of a sensor and the reward for successfully transmitting a message, we prove the existence of optimal thresholds that maximize the average reward rate. Our results are quite general since the reward values can be made application-specific for different design objectives. Compared with the unconditional transmit-all policy, which transmits every message as long as the energy storage is positive, the proposed optimal transmission policy is shown to achieve significant gains in the average reward rate.  相似文献   

8.
An optimal energy efficiency routing strategy based on community was proposed,which minimized the network energy consumption under the given delay constraint.Firstly the expected energy consumption and delay of message delivery in the connected network were obtained through Markov chain.Then the comprehensive cost function for delivering message from source node to destination node was designed,which was combined with energy consumption and delay.Thus,the optimization function to comprehensive cost of relay node delivering message was obtained,and further the reward function of relay node was gotten.Finally the optimal expected reward of optimal relay node was achieved using the optimal stopping theory,so as to realize the optimal energy efficiency routing strategy.In simulations,the average energy consumption,the average delay and the average delivery ratio of routing optimization strategy were compared with those of other routing strategies in related literatures.The results show that the strategy proposed has smaller average energy consumption,shorter average delay and higher average delivery ratio,gaining better energy consumption optimization effect.  相似文献   

9.
Because of the uncertainty of transmission opportunity in delay tolerant networks (DTN), routing algorithms in DTN often need nodes to serve as relays for others to carry and forward messages. One classic policy is the Epidemic routing (ER) algorithm. To reduce the overhead, the hop‐limited ER protocol is proposed. This method can get better performance through controlling the message hop count. However, because of the energy constraint or other factors, each node may forward only limited times, that is, both the message hop count and the forwarding times may be limited. This paper proposes a unifying framework to evaluate the performance of ER with the aforementioned constraints. Simulations based on both synthetic and real motion traces show the accuracy of the framework. In addition, we explore the impact of many parameters (e.g., message hop count) through extensive numerical results. For example, numerical results show that both the message hop count and the forwarding times can have certain impact on the routing performance, but their impact is related with many other factors (e.g., the number of nodes). Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

10.
Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics of intermittent node connectivity. Different protocols (single-, multi-copy, erasure-coding-based etc.) utilizing store-carry-and-forward paradigm have been proposed to achieve routing of messages in such environments by opportunistic message exchanges between nodes that are in the communication range of each other. The sparsity and distributed nature of these networks together with the lack of stable connectivity between source destination pairs make these networks vulnerable to malicious nodes which might attempt to learn the content of the messages being routed between the nodes. In this paper, we study DTNs in which malicious nodes are present, to which we refer to as compromised DTNs. We discuss and analyze the effects of presence of malicious nodes on routing of messages in compromised DTNs. We propose a two period routing approach which aims at achieving the desired delivery ratio by a given delivery deadline in presence of malicious nodes. Our simulation results with both random networks and real DTN traces show that, with proper parameter setting, the proposed method can achieve delivery ratios which surpass those reached by other algorithms by a given delivery deadline.  相似文献   

11.
QoS Routing is crucial for QoS provisioning in high‐speed networks. In general, QoS routing can be classified into two paradigms: source routing and hop‐by‐hop routing. In source routing, the entire path to the destination node of a communication request is locally computed at the source node based on the global state that it maintains, which does not scale well to large networks. In hop‐by‐hop routing, a path‐selecting process is shared among intermediate nodes between the source node and the destination node, which can largely improve the protocol scalability. In this paper, we present the design of hop‐by‐hop routing with backup route information such that each intermediate node can recursively update the best known feasible path, if possible, by collectively utilizing the routing information gathered thus far and the information that it locally stores. Such a route is kept as a backup route and its path cost is used as a reference to guide the subsequent routing process to search for a lower‐cost constrained path and avoid performance degradation. In this way, the information gathered is maximally utilized for improved performance. We prove the correctness of our presented algorithm and deduce its worst message complexity to be O(∣V2), where ∣V∣ is the number of network nodes. Simulation results indicate that, however, the designed algorithm requires much fewer messages on average. Therefore it scales well with respect to the network size. Moreover, simulation results demonstrate that the cost performance of our algorithm is near‐optimal. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

12.

In Wireless Sensor Network (WSN), securable data transmission is one of the most challenges. During the transmission between the source and a destination node, routing information of the particular path may be misbehaved by the particular nodes which are known as wormhole nodes/attackers. The paths which include the wormhole nodes are known as wormhole attacked paths. For improving security in WSN, these wormhole attacked paths should be identified. To achieve this, wormhole attack detection method and optimal or secure path selection are presented in this paper. Initially, ‘K’ paths or multiple paths are generated between source and destination using Ad-hoc On demand Multipath Distance Vector (AOMDV) routing protocol. Then, the source node identifies the wormhole attacked path by verifying the Detection Packet (DP) and Feedback Packet (FP) from the destination. After detecting the wormhole attacked paths, the source node selects the optimal path among the attacker free paths using Particle Swarm Optimization (PSO) algorithm. Simulation results show that the performance of the proposed approach improves energy efficiency and network lifetime of the network.

  相似文献   

13.
刘春蕊  张书奎  贾俊铖  林政宽 《电子学报》2016,44(11):2607-2617
机会网络是一种不需要在源节点和目的节点之间存在完整路径,利用节点移动带来的相遇机会实现网络通信的延迟容忍自组织网络,它以“存储-携带-处理-转发”的模式进行.为实现互不相交簇间的信息传输,本文设计了一种带阈值的簇移动模型CMMT,并提出了一种基于摆渡(Ferry)节点与簇节点协作的路由算法(CBSW).该算法减少了冗余的通信和存储开销,以及在Spray阶段簇节点没有遇到目的节点或摆渡节点,进入Wait阶段携带消息的节点采用直接分发方式只向目的节点传输等问题.仿真实验表明,CBSW算法能够增加传输成功率,减少网络开销和传输延迟.  相似文献   

14.
We present an efficient message delivery framework, called MeDeHa, which enables communication in an internet connecting heterogeneous networks that is prone to disruptions in connectivity. MeDeHa is complementary to the IRTF’s Bundle Architecture: besides its ability to store messages for unavailable destinations, MeDeHa can bridge the connectivity gap between infrastructure-based and multi-hop infrastructure-less networks. It benefits from network heterogeneity (e.g., nodes supporting more than one network and nodes having diverse resources) to improve message delivery. For example, in IEEE 802.11 networks, participating nodes may use both infrastructure- and ad-hoc modes to deliver data to otherwise unavailable destinations. It also employs opportunistic routing to support nodes with episodic connectivity. One of MeDeHa’s key features is that any MeDeHa node can relay data to any destination and can act as a gateway to make two networks inter-operate or to connect to the backbone network. The network is able to store data destined to temporarily unavailable nodes till the time of their expiry. This time period depends upon current storage availability as well as quality-of-service needs (e.g., delivery delay bounds) imposed by the application. We showcase MeDeHa’s ability to operate in environments consisting of a diverse set of interconnected networks and evaluate its performance through extensive simulations using a variety of scenarios with realistic synthetic and real mobility traces. Our results show significant improvement in average delivery ratio and a significant decrease in average delivery delay in the face of episodic connectivity. We also demonstrate that MeDeHa supports different levels of quality-of-service through traffic differentiation and message prioritization.  相似文献   

15.
Wavelength-division multiplexing (WDM) local-area networks based on the optical passive-star coupler have traditionally been classified as being either single-hop or multihop. A single-hop network provides a direct connection between the source and the destination of a packet during the packet transfer duration, but may require some amount of coordination between the nodes which may involve tuning of the transmitters or receivers at each node. Since the time required to tune a tunable optical transmitter or receiver may be high, a single-hop network may incur significant overhead. On the other hand, a typical multihop network requires little or no tuning, but a packet may traverse a number of intermediate nodes between the source and destination nodes. Each hop incurs additional queueing delays at each node and also increases the overall load on each link and on the network. In this paper, we propose a new class of multiconfiguration multihop protocols (MMPs) which use tunable transmitters and receivers to cycle through a number of configurations which together make up a multihop logical topology. This class of protocols offers a trade-off between the tuning required in a single-hop network and the number of hops required in a multihop network. We present a generalized framework for comparing the proposed protocols with existing single-hop and multihop protocols, and we show that these protocols may offer significant performance gains for systems with high tuning delays and a limited number of transmitters and receivers at each node  相似文献   

16.
Cooperative transmissions have received recent attention and research papers have demonstrated their benefits for wireless networks. Such benefits include improving the reliability of links through diversity and/or increasing the reach of a link compared to a single transmitter transmitting to a single receiver (single-input single-output or SISO). In one form of cooperative transmissions, multiple nodes can act as virtual antenna elements and provide diversity gain or range improvement using space-time coding. In a multi-hop ad hoc or sensor network, a source node can make use of its neighbors as relays with itself to reach an intermediate node with greater reliability or at a larger distance than otherwise possible. The intermediate node will use its neighbors in a similar manner and this process continues till the destination is reached. Thus, for the same reliability of a link as SISO, the number of hops between a source and destination may be reduced using cooperative transmissions as each hop spans a larger distance. However, the presence of malicious or compromised nodes in the network impacts the benefits obtained with cooperative transmissions. Using more relays can increase the reach of a link, but if one or more relays are malicious, the transmission may fail. However, the relationships between the number of relays, the number of hops, and success probabilities are not trivial to determine. In this paper, we analyze this problem to understand the conditions under which cooperative transmissions fare better or worse than SISO transmissions. We take into consideration additional parameters such as the path-loss exponent and provide a framework that allows us to evaluate the conditions when cooperative transmissions are better than SISO transmissions. This analysis provides insights that can be employed before resorting to simulations or experimentation.  相似文献   

17.
The need for routing based on store-and-carry forwarding has been motivated in sparse vehicular ad hoc networks (VANETs), since the traditional end-to-end unicast routing is infeasible due to the network disconnection problem. In store-and-carry based routing, the end-to-end message delivery delay is dominated by the store-and-carry procedure rather than the wireless transmission. Therefore, the end-to-end delay in such sparse VANETs can be further reduced by replicating multiple copies of the message to other nodes when possible, i.e., multi-copy routing, to increase the chance of finally finding the destination, which we call this gain as multi-copy diversity. In this paper, we present an analytic framework to evaluate the performance of routing by assessing the multi-copy diversity gain in sparse VANETs. By using this model, we first derive an upper and lower-bound of end-to-end routing delay in sparse VANETs. Our analytic results show that a high level of multi-copy diversity gain is achieved when the network is partially connected, which is in contrast to the conventional expectation that multi-copy routing performs better in severely disconnected networks. Second, we propose a new adaptive multi-copy VANET routing scheme called AMR by exploiting these analytic results. AMR adapts to the local network connectivity and increases the level of multi-copy diversity at significantly reduced routing overhead compared to the well known epidemic routing. We validate the accuracy of our analytic model and the performance of AMR via simulation studies.  相似文献   

18.
We deal in this article with the content forwarding problem in delay tolerant networks (DTNs). We first formulate the content delivery interaction as a noncooperative satisfaction game. On one hand, the source node seeks to ensure a delivery probability above some given threshold. On the other hand, the relay nodes seek to maximize their own payoffs. The source node offers a reward (virtual coins) to the relay, which caches and forwards the file to the final destination. Each relay has to solve the dilemma of accepting/rejecting to cache the source's file. Cooperation incurs energy cost due to caching, carrying, and forwarding the source's file. Yet when a relay accepts to cooperate, it may receive some reward if it succeeds to be the first relay to forward the content to the destination. Otherwise, the relay may receive some penalty in the form of a constant regret; the latter parameter is introduced to make incentive for cooperation. Next, we introduce the concept of satisfaction equilibrium (SE) as a solution concept to the induced game. Now, the source node is solely interested in reaching a file delivery probability greater than some given threshold, while the relays behave rationally to maximize their respective payoffs. Full characterizations of the SEs for both pure and mixed strategies are derived. Furthermore, we propose two learning algorithms allowing the players (source/relays) to reach the SE strategies. Finally, extensive numerical investigations and some learning simulations are carried out to illustrate the behavior of the interacting nodes and to give some insightful thoughts on how to fine‐tune the network setting.  相似文献   

19.
Selective Message Forwarding in Delay Tolerant Networks   总被引:3,自引:0,他引:3  
It is challenging to deliver messages in a network where no instant end-to-end path exists, so called delay-tolerant network (DTN). Node encounters are used for message forwarding. In this paper, we propose a DTN routing protocol SMART. SMART utilizes the travel companions of the destinations (i.e. nodes that frequently meet the destination) to increase the delivery opportunities while limiting message overhead to a bounded number. Our approach differs from related work in that it does not propagate node encounter history nor the delivery probabilities derived from the encounter history. In SMART, a message source injects a fixed number of message copies into the network to forward the message to a companion of the destination, which only forwards the message to a fixed number of the destination’s companions. Our analysis and simulation results show that SMART has a higher delivery ratio and a smaller delivery latency than the schemes that only use controlled opportunistically-forwarding mechanism and has a significantly smaller routing overhead than a pure flooding scheme.  相似文献   

20.

Delay tolerant networks (DTNs) are a newest class of networks that have the ability to provide connectivity to areas that are yet to be served by conventional networks. Routing in DTN is a tough task because nodes have no prior information about the partitioned network and transfer opportunities between peer nodes are limited. A node in a DTN delivers messages to the destination using the store and forward strategy. Messages are transmitted to multiple intermediate relay nodes encountered in order to increase the opportunity for the message to reach the destination. Encounter duration is the time period in which a pair or more mobile nodes move into the communication range of each other and hence are able to transfer messages between them. Since the node movements are arbitrary, the encounter duration is unpredictable. This research work proposes a novel encounter based fuzzy logic routing (EFLR) scheme to maximize message delivery with reduced overhead. The fuzzy based utility computation is used for finding a better node to forward messages as well as to drop messages from buffer. Simulation results reveal that EFLR performs better than other existing DTN routing protocols.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号