共查询到19条相似文献,搜索用时 46 毫秒
1.
2.
3.
在多速率Ad hoc网络中,要充分利用多速率的优势,提高网络的整体性能,妊须设计一种适合网络特点以及满足用户需要的多速率路由策略。文中简要分析了多速率路由策略对网络性能的影响,重点介绍了现有的多速率路由策略。论文还给出了后续的工作——对在多频段和多模式的无线网络中采用改进的多速率路由算法的研究。 相似文献
4.
移动Ad hoc网络中的安全问题 总被引:1,自引:0,他引:1
首先分析了Ad hoc网络存在的安全问题和安全目标。然后简单介绍了路由协议的安全隐患,接着详细讨论了Ad hoc网络的安全策略,最后说明了Ad hoc网络安全性面临的挑战。 相似文献
5.
移动Ad hoc网络路由协议标准 总被引:4,自引:0,他引:4
通过重点说明互联网工程任务组(IETF)已通过的两个移动Ad hoc网络路由协议标准,使得相关工程人员在对应用于此种网络的路由协议有一个整体认识基础之上,进一步加深对移动Ad hoc网络原理的理解. 相似文献
6.
移动Ad Hoc网络研究与发展现状 总被引:29,自引:4,他引:25
本文简要介绍移动ad hoc网络发展的历史、理论和技术上的一些热点问题,以及它的一些应用,从而给读者一个概括性的了解,为进一步学习和研究移动ad hoc网络奠定一些基础。为了便于读者跟踪国外先进的研究成果,本文最后介绍了一些在这一领域比较活跃的研究机构以及他们的主要工作。 相似文献
7.
移动Ad hoc网络的路由协议及其性能比较 总被引:3,自引:0,他引:3
本文首先说明了Ad hoc网络中提供高效路由算法的难点,然后讨论了Ad hoc网络中路由协议设计的几种策略,介绍了模拟工具及其所支持的Ad hoc路由协议,最后通过实验分析比较了四种路由协议的性能,并给出了结论。 相似文献
8.
一种新的移动Ad hoc网络的安全路由策略 总被引:3,自引:2,他引:1
本文从各网络节点易受攻击、俘获,各网络节点之间不可信赖的角度出发,引入了可信任第三方的信任分散策略并结合Diffie-Hellman密钥交换算法,提出了一种新的移动Adhoc网络的安全路由策略。 相似文献
9.
移动Ad hoc网络路由协议综述 总被引:2,自引:0,他引:2
摘要文章简单介绍移动Ad hoc网络,详细综述了移动Ad hoc网络中的各种路由协议.包括先验式路由协议、反应式路由协议和混合式路由协议,对它们进行了分类、对比和分析。提出了一个Ad hoc网络新型的路由协议的框架。最后,指出了移动Ad hoc路由协议的研究热点和展望。 相似文献
10.
Ad hoc网络面临的挑战及其对策 总被引:1,自引:0,他引:1
Ad hoc网络是一种多跳的移动计算机网络,有着广阔的应用前景。但是由于自身的复杂性,它也存在很多问题和挑战。本文首先介绍了Ad hoc网络的概念和特点,然后阐述了Ad hoc网络自身的局限性。接着详细了讨论了当前Ad hoc网络面临的诸多挑战,并给出了一些解决方案。最后作者提出了关于Ad hoc网络的一些看法。 相似文献
11.
移动Ad Hoc网络是一种特殊的自组织无中心多跳的无线网络,网内节点所具有的移动和分布特性使得安全成为网络设计的重点。本文首先对移动Ad Hoc网络的特点进行了介绍,然后结合移动Ad Hoc网络的特点分析了移动Ad Hoc网络面临的安全威胁,最后从系统体系结构的角度对移动Ad Hoc网络的安全问题进行了详细讨论。 相似文献
12.
Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique characteristics coupled with the growing concerns for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in mobile ad hoc networks has been primarily focused on routing and mobility aspects rather than securing the ad hoc networks themselves. Due to ever increasing security threats, there is a need to develop schemes, algorithms, and protocols for a secured ad hoc network infrastructure. To realize this objective, we have proposed a practical and effective security model for mobile ad hoc networks. The proposed predictive security model is designed using a fuzzy feedback control approach. The model is based on identifying critical network parameters that are affected by various types of attacks and it continuously monitors those parameters. Once we measure the relative change in these parameter values, we could detect the type of attack accurately and protect the system, without compromising its effectiveness. Experimental results of the model simulated for selected packet mistreatment attacks and routing attacks are very promising. 相似文献
13.
14.
IP address autoconfiguration of mobile nodes is highly desirable in the practical usage of most mobile ad hoc networks (MANETs).
This paper proposes cluster-based autoconfiguration, a novel approach for the efficient address autoconfiguration of MANETs.
The cluster structure derived from clustering techniques is used to manage address assignment and conflict resolution. By
introducing the concept of virtual address agents (AAs), the proposed approach can be applicable to many existing clustering
protocols. Finally, analysis and simulation demonstrate that the proposed scheme outperforms the previous autoconfiguration
approaches.
相似文献
Longjiang LiEmail: |
15.
16.
随着实时多媒体业务向移动Adhoc网络的引入,如何为移动Adhoc网络提供服务质量保证成为当前研究的热点。本文介绍了为移动Adhoc网络提供QoS路由的三种实现机制:MAC层的TDMA资源管理、普通的QoS测量、CDMA的不同传输之间的冲突避免。 相似文献
17.
Mobile Ad hoc Networks (MANETs) rely on the cooperation of nodes for packet routing and forwarding. Much of the existing work
in MANETs assume that mobile nodes (possibly owned by selfish users) will follow prescribed protocols without deviation. However,
a user may misbehave due to several advantages resulting from noncooperation, the most obvious being power saving. As such,
the network availability is severely endangered. Hence, enforcing the cooperation among nodes becomes a very important issue.
Several different approaches have been developed to detect non-cooperative nodes or deal with the non-cooperative behavior
of mobile nodes in MANETs. These protocols are first surveyed in details in this paper. It is found that the proposed approaches
have several concerns that prevent them from really enforcing the node cooperation in MANETs. Thus, a new scheme that can
stimulate and also enforce nodes to cooperate in a selfish ad hoc environment is presented. We also present a mechanism to
detect and exclude potential threats of selfish mobile nodes. The simulation results indicate that by using the proposed scheme,
MANETs can be robust against nodes’ misbehaving and the performance of the network is enhanced many folds when compared to
other existing schemes.
相似文献
Ahmed E. KamalEmail: |
18.
19.
首先分析了Adhoc网络存在的安全问题和安全目标。然后简单介绍了路由协议的安全隐患,接着详细讨论了Adhoc网络的安全策略,最后说明了Adhoc网络安全性面临的挑战。 相似文献