首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Disruption‐tolerant network (DTN) implementation is subject to many routing constraints like limited knowledge of the network and intermittent connections with no end‐to‐end path existence. In this paper, the researchers propose trusted‐cluster–based routing protocol (TCR) for routing in DTN. TCR uses the experiential learning model that integrates neural network‐based bipolar sigmoid activation function to form trusted‐cluster DTN. TCR works in two phases: firstly to form a trusted‐cluster and secondly to identify cluster heads to direct network traffic through them. After the formation of the trusted‐cluster, a cluster head is chosen for a set period, thus instigating stability in the network. These trust values are attached to the node's route cache to make competitive routing decisions by relaying a message to the other trusted intermediate nodes only. With negative trust value, any node is deprived of participation in the network. This way, TCR eliminates malicious or selfish nodes to participate in the DTN network and minimizes the number of messages forwarded in a densely populated DTN. Also, this implementation conserves sufficient buffer memory to reach the destined node. The TCR's performance with other DTN routing schemes, namely, epidemic and trust‐based routing, is compared using multiple simulations runs. The proposed work is verified using mobility traces from Community Resource for Archiving Wireless Data At Dartmouth, and the experimental result shows the elimination of selfish nodes participating in the DTN. The simulation result shows an increase of 19% in message delivery by forwarding only to a trusted intermediate node possible.  相似文献   

2.
Energy efficiency has become an important design consideration in geographic routing protocols for wireless sensor networks because the sensor nodes are energy constrained and battery recharging is usually not feasible. However, numerous existing energy‐aware geographic routing protocols are energy‐inefficient when the detouring mode is involved in the routing. Furthermore, most of them rarely or at most implicitly take into account the energy efficiency in the advance. In this paper, we present a novel energy‐aware geographic routing (EAGR) protocol that attempts to minimize the energy consumption for end‐to‐end data delivery. EAGR adaptively uses an existing geographic routing protocol to find an anchor list based on the projection distance of nodes for guiding packet forwarding. Each node holding the message utilizes geographic information, the characteristics of energy consumption, and the metric of advanced energy cost to make forwarding decisions, and dynamically adjusts its transmission power to just reach the selected node. Simulation results demonstrate that our scheme exhibits higher energy efficiency, smaller end‐to‐end delay, and better packet delivery ratio compared to other geographic routing protocols. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

3.
Opportunistic Networks (OppNets) are intermittently connected infrastructure less wireless networks. There is no continuous end‐to‐end connection between the sender and the receiver, and hence nodes follow a store‐carry‐forward mechanism. The routing algorithm is required to be adaptive to the changing topology of the network. In this work, Q‐Routing technique has been used with forwarding probability and incorporated using Poisson's probability for decision making and controlling transmission energy. The algorithm refines the forwarding decision of finding the next suitable hop by exploiting the characteristics of nodes such as daily routines, mobility pattern, etc. In simulations, the performance of PBQ‐Routing is compared with Q‐Routing, Epidemic Routing, PRoPHET (Probabilistic Routing Protocol using History of Encounters and Transitivity), and HBPR (History Based Prediction Routing) for OppNets. The use of Poisson's distribution improves the effectiveness of the probabilistic forwarding decision. The findings show that the delivery probability of PBQ‐Routing almost gets doubled and overhead ratio reduces to half in comparison with that of Q‐Routing when used in OppNets. PBQ‐Routing outperforms other Q‐Routing based algorithms over Poisson's distribution. As there is less replication in case of PBQ‐Routing, it also saves the transmission energy.  相似文献   

4.
Opportunistic Networks (OppNets) is a system of wirelessly connected nodes in a varying network topology. Routing in OppNets is a challenge. To overcome the problem of routing, an intelligent dynamic strategy to select next best node for forwarding a message is required. This paper proposes an intelligent routing mechanism based on Intelligent Water Drop (IWD) Algorithm which is used in tandem with Neural Networks (NNs) as an optimization technique to solve the problem of routing in such networks. The nature–inspired IWD algorithm provides robustness, whereas the neural network base of the algorithm helps it to make intelligent routing decisions. The weights in the Neural Network model are calculated by IWD Algorithm using training data consisting of inputs that are characteristic parameters of nodes, such as buffer space, number of successful deliveries and energy levels along with transitive parameters such as delivery probabilities. The proposed protocol Intelligent Water Drop Neural Network (IWDNN) is compared with other protocols that use similar ideologies such as MLProph, K‐nearest neighbour classification based routing protocol (KNNR), Cognitive Routing Protocol for Opportunistic Network (CRPO), and Inheritance Inspired Context Aware Routing Protocol (IICAR), as well as the standard protocol Prophet. IWDNN is shown to outperform all other protocols with an average message delivery ratio of 60%, which is a significant improvement of over 10% in comparison to other similarly conceived algorithms. It has one of the lowest latency among the protocols studied, in a range of 3000 to 4000 s, and incurs comparably low overhead costs in the range of 15 to 30. The drop ratios are one of the lowest, staying near six and approaching zero as buffer size is increased. Average amount of time a message stayed in the buffer was the lowest, with a mean of 1600 s.  相似文献   

5.
Opportunistic networks (OppNets) are composed of wireless nodes opportunistically communicating with each other. These networks are designed to operate in a challenging environment characterized by high delay, intermittent connectivity, and no guarantee of fixed path between the sender and the destination nodes. One of the most vital issues in designing and maintaining practical networks over a time period is the security of the messages flowing in OppNets. This paper proposes a new method called message trust‐based secure multipath routing protocol (MT‐SMRP) for opportunistic networks. Various routing protocols such as ProPHet, Epidemic, and HiBOp, to name a few, have been proposed for OppNets, but none of these have applied a secure multipath routing technique. The proposed MT‐SMRP scheme relays the message to the destination through the disjoint paths, each applying a soft‐encryption technique to prevent message fabrication attacks. Simulations are conducted using the Haggle Infocom'06 real mobility data traces, showing that when time‐to‐live is varied, (1) the proposed MT‐SMRP scheme outperforms D‐MUST by 18.10%, 7.55%, 3.275%, respectively, in terms of delivery probability, messages dropped, and average latency; (2) it also outperforms SHBPR by 21.30%, 7.44%, and 4.85%, respectively, in terms of delivery probability, messages dropped, and average latency. Under similar performance metrics, the performance of MT‐SMRP is also shown to be better than that of D‐MUST and SHBPR when the buffer size (respondents. the message generation interval) is varied.  相似文献   

6.
Wireless networks are now very essential part for modern ubiquitous communication systems. The design of efficient routing and scheduling techniques for such networks have gained importance to ensure reliable communication. Most of the currently proposed geographic routing protocols are designed for 2D spatial distribution of user nodes, although in many practical scenarios user nodes may be deployed in 3D space also. In this paper, we propose 3D routing protocols for multihop wireless networks that may be implemented in two different ways depending on how the routing paths are computed. When the routing paths to different user nodes from the base station in the wireless network are computed by the base station, we call it centralized protocol (3DMA‐CS). A distributed routing (3DMA‐DS) protocol is implemented when respective routing path of each user node to the base station is computed by the user node. In both of these protocols, the user (base station) selects the relay node to forward packets in the direction of destination, from the set of its neighbours, which makes minimum angle with the reference line drawn from user (base station) to the base station (user), within its transmission range. The proposed protocols are free from looping problem and can solve the void node problem (VNP) of multihop wireless networks. Performance analysis of the proposed protocol is shown by calculating end‐to‐end throughput, average path length, end‐to‐end delay, and energy consumption of each routing path through extensive simulation under different network densities and transmission ranges.  相似文献   

7.
Designing a safe and reliable way for communicating the messages among the devices and humans forming the Opportunistic Internet of Things network (OppIoT) has been a challenge since the broadcast mode of message sharing is used. To contribute toward addressing such challenge, this paper proposes a Random Forest Classifier (RFC)‐based safe and reliable routing protocol for OppIoT (called RFCSec) which ensures space efficiency, hash‐based message integrity, and high packet delivery, simultaneously protecting the network against safety threats viz. packet collusion, hypernova, supernova, and wormhole attacks. The proposed RFCSec scheme is composed of two phases. In the first one, the RFC is trained on real data trace, and based on the output of this training, the second phase consists in classifying the encountered nodes of a given node as belonging to one of the output classes of nodes based on their past behavior in the network. This helps in proactively isolating the malicious nodes from participating in the routing process and encourages the participation of the ones with good message forwarding behavior, low packet dropping rate, high buffer availability, and a higher probability of delivering the messages in the past. Simulation results using the ONE simulator show that the proposed RFCSec secure routing scheme is superior to the MLProph, RLProph, and CAML routing protocols, chosen as benchmarks, in terms of legitimate packet delivery, probability of message delivery, count of dropped messages, and latency in packet delivery. The out‐of‐bag error obtained is also minimal  相似文献   

8.
In vehicular ad hoc networks, vehicles may use a routing protocol to inform emergent events, for example, car accidents or traffic jams. Hence, many of the researchers are focused on minimizing the end‐to‐end delay of the routing protocol. However, some applications, for example, email or ftp, are not time critical, and radio spectrum is a limited resource. Hence, delay‐bounded routing protocol, whose goal is to deliver messages to the destination within user‐defined delay and minimize the usage of radio, has become an important issue. The delay‐bounded routing protocols deliver message to the destination by the hybrid of data muling (carried by the vehicle) and forwarding (transmitted through radio). When the available time is enough, the message will be delivered by muling; otherwise, it will be delivered by forwarding. However, in an urban area, there are many traffic lights, which may greatly affect the performance of the delay‐bounded routing protocols. Existing works do not consider the effect of traffic lights, and hence, it may adopt an improper delivery strategy and thus wastes much available time. To improve previous works, we propose a novel delay‐bounded routing protocol, which has considered the effect of traffic lights. Whenever a vehicle passes an intersection, it will gather the information of the traffic light and traffic load of the next road section, and thus, it can make a more accurate prediction and adopt a more proper strategy to deliver message. Simulation results show that the proposed protocol can make a better usage of the available time and uses less radio resource to deliver the message in time. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

9.
Recently, underwater wireless sensor networks (UWSNs) have attracted much research attention to support various applications for pollution monitoring, tsunami warnings, offshore exploration, tactical surveillance, etc. However, because of the peculiar characteristics of UWSNs, designing communication protocols for UWSNs is a challenging task. Particularly, designing a routing protocol is of the most importance for successful data transmissions between sensors and the sink. In this paper, we propose a reliable and energy‐efficient routing protocol, named R‐ERP2R (Reliable Energy‐efficient Routing Protocol based on physical distance and residual energy). The main idea behind R‐ERP2R is to utilize physical distance as a routing metric and to balance energy consumption among sensors. Furthermore, during the selection of forwarding nodes, link quality towards the forwarding nodes is also considered to provide reliability and the residual energy of the forwarding nodes to prolong network lifetime. Using the NS‐2 simulator, R‐ERP2R is compared against a well‐known routing protocol (i.e. depth‐based routing) in terms of network lifetime, energy consumption, end‐to‐end delay and delivery ratio. The simulation results proved that R‐ERP2R performs better in UWSNs.Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

10.
Unlike terrestrial sensor networks, underwater sensor networks (UWSNs) have salient features such as a long propagation delay, narrow bandwidth, and high packet loss over links. Hence, path setup‐based routing protocols proposed for terrestrial sensor networks are not applicable because a large latency of the path establishment is observed, and packet delivery is not reliable in UWSNs. Even though routing protocols such as VBF (vector based forwarding) and HHVBF (hop‐by‐hop VBF) were introduced for UWSNs, their performance in terms of reliability deteriorates at high packet loss. In this paper, we therefore propose a directional flooding‐based routing protocol, called DFR, in order to achieve reliable packet delivery. DFR performs a so‐called controlled flooding, where DFR changes the number of nodes which participate in forwarding a packet according to their link quality. When a forwarding node has poor link quality to its neighbor nodes geographically advancing toward the sink, DFR allows more nodes to participate in forwarding the packet. Otherwise, a few nodes are enough to forward the packet reliably. In addition, we identify two types of void problems which can occur during the controlled flooding and introduce their corresponding solutions. Our simulation study using ns‐2 simulator proves that DFR is more suitable for UWSNs, especially when links are prone to packet loss. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

11.
In this paper, we propose a cross‐layer optimized geographic node‐disjoint multipath routing algorithm, that is, two‐phase geographic greedy forwarding plus. To optimize the system as a whole, our algorithm is designed on the basis of multiple layers' interactions, taking into account the following. First is the physical layer, where sensor nodes are developed to scavenge the energy from environment, that is, node rechargeable operation (a kind of idle charging process to nodes). Each node can adjust its transmission power depending on its current energy level (the main object for nodes with energy harvesting is to avoid the routing hole when implementing the routing algorithm). Second is the sleep scheduling layer, where an energy‐balanced sleep scheduling scheme, that is, duty cycle (a kind of node sleep schedule that aims at putting the idle listening nodes in the network into sleep state such that the nodes will be awake only when they are needed), and energy‐consumption‐based connected k‐neighborhood is applied to allow sensor nodes to have enough time to recharge energy, which takes nodes' current energy level as the parameter to dynamically schedule nodes to be active or asleep. Third is the routing layer, in which a forwarding node chooses the next‐hop node based on 2‐hop neighbor information rather than 1‐hop. Performance of two‐phase geographic greedy forwarding plus algorithm is evaluated under three different forwarding policies, to meet different application requirements. Our extensive simulations show that by cross‐layer optimization, more shorter paths are found, resulting in shorter average path length, yet without causing much energy consumption. On top of these, a considerable increase of the network sleep rate is achieved. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

12.
In this paper, we study the issue of routing in a vehicular ad hoc network with the assistance of sparsely deployed auxiliary relay nodes at some road intersections in a city. In such a network, vehicles keep moving, and relay nodes are static. The purpose of introducing auxiliary relay nodes is to reduce the end‐to‐end packet delivery delay. We propose a sparsely deployed relay node assisted routing (SRR) algorithm, which differs from existing routing protocols on how routing decisions are made at road intersections where static relay nodes are available such that relay nodes can temporarily buffer a data packet if the packet is expected to meet a vehicle leading to a better route with high probability in certain time than the current vehicles. We further calculate the joint probability for such a case to happen on the basis of the local vehicle traffic distribution and also the turning probability at an intersection. The detailed procedure of the protocol is presented. The SRR protocol is easy to implement and requires little extra routing information. Simulation results show that SRR can achieve high performance in terms of end‐to‐end packet delivery latency and delivery ratio when compared with existing protocols. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

13.
Because of the uncertainty of transmission opportunity in delay tolerant networks (DTN), routing algorithms in DTN often need nodes to serve as relays for others to carry and forward messages. One classic policy is the Epidemic routing (ER) algorithm. To reduce the overhead, the hop‐limited ER protocol is proposed. This method can get better performance through controlling the message hop count. However, because of the energy constraint or other factors, each node may forward only limited times, that is, both the message hop count and the forwarding times may be limited. This paper proposes a unifying framework to evaluate the performance of ER with the aforementioned constraints. Simulations based on both synthetic and real motion traces show the accuracy of the framework. In addition, we explore the impact of many parameters (e.g., message hop count) through extensive numerical results. For example, numerical results show that both the message hop count and the forwarding times can have certain impact on the routing performance, but their impact is related with many other factors (e.g., the number of nodes). Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

14.
Opportunistic networking enables users to communicate in an environment where connectivity is intermittent or unstable. However, such networking scheme assumes that mobile nodes voluntary cooperate, which cannot be guaranteed. Some nodes can simply exhibit selfish behavior and thus diminish the effectiveness of the approach. In this paper, a game scenario is formulated in which the nodes try to convince each other to participate in packets forwarding. Each node is considered as a player in this game. When a node comes in the communication range of another, a bargaining game starts between them as part of the message forwarding process. Both players try to have a mutual agreement on a price for message forwarding. We present a new incentive mechanism called evolutionary bargaining‐based incentive scheme (EBIS) to motivate selfish nodes to cooperate in data forwarding. In EBIS, a node negotiates with other nodes to obtain an agreeable amount of credit for its forwarding service. Nodes apply a sequential bargaining game and then adapt their strategies using an evolutionary model to maximize the probability of reaching an agreement. Unlike classical bargaining games, nodes in our model are boundedly rational. In addition, we use the evolutionary stable strategy (ESS) concept to determine the adaptive strategies for the nodes. The comparison of EBIS with a benchmarked model demonstrates that EBIS performs better in terms of packet delivery ratio and average latency.  相似文献   

15.
In opportunistic networks,a successful message transmission between node pairs depends on the message size,the transmission speed and the connection duration time.This paper proposes a new message forwarding algorithm to improve the message delivery ratio and reduce the energy consumption.Previous encounter characteristics between nodes are used to estimate future connection duration time using a three point estimation method.Furthermore,the buffer utilization of nodes is used as a weight for the likelihoods to meet destinations according to the hop count of messages stored in the buffer.The simulation results show that the proposed forwarding algorithm achieves higher delivery ratio and less overhead ratio than the other four popular routing protocols.In addition,the proposed algorithm gains a better average residual energy performance among all the compared protocols.  相似文献   

16.
In this paper, we propose a new mobicast routing protocol, called the HVE-mobicast (hierarchical-variant-egg-based mobicast) routing protocol, in wireless sensor networks (WSNs). Existing protocols for a spatiotemporal variant of the multicast protocol called a “mobicast” were designed to support a forwarding zone that moves at a constant velocity, \(\stackrel{\rightarrow}{v}\), through sensornets. The spatiotemporal characteristic of a mobicast is to forward a mobicast message to all sensor nodes that are present at time t in some geographic zone (called the forwarding zone) Z, where both the location and shape of the forwarding zone are a function of time over some interval (t start ,t end ). Mobicast routing protocol aims to provide reliable and just-in-time message delivery for a mobile sink node. To consider the mobile entity with the different moving speed, a new mobicast routing protocol is investigated in this work by utilizing the cluster-based approach. The message delivery of nodes in the forwarding zone of the HVE-mobicast routing protocol is transmitted by two phases; cluster-to-cluster and cluster-to-node phases. In the cluster-to-cluster phase, the cluster-head and relay nodes are distributively notified to wake them up. In the cluster-to-node phase, all member nodes are then notified to wake up by cluster-head nodes according to the estimated arrival time of the delivery zone. The key contribution of the HVE-mobicast routing protocol is that it is more power efficient than existing mobicast routing protocols, especially by considering different moving speeds and directions. Finally, simulation results illustrate performance enhancements in message overhead, power consumption, needlessly woken-up nodes, and successful woken-up ratio, compared to existing mobicast routing protocols.  相似文献   

17.
In this paper, an orthogonal frequency division multiple access (OFDMA)‐based minimum end‐to‐end delay (MED) distributed routing scheme for mobile backhaul wireless mesh networks is proposed. The proposed scheme selects routing paths based on OFDMA subcarrier synchronization control, subcarrier availability, and delay. In the proposed scheme, OFDMA is used to transmit frames between mesh routers using type‐I hybrid automatic repeat request over multipath Rayleigh fading channels. Compared with other distributed routing algorithms, such as most forward within radius R, farthest neighbor routing, nearest neighbor routing, and nearest with forwarding progress, simulation results show that the proposed MED routing can reduce end‐to‐end delay and support highly reliable routing using only local information of neighbor nodes.  相似文献   

18.
Delay/disruption tolerant networks (DTNs) are potentially applicable in the challenged scenarios like post‐disaster environments. In such networks, data forwarding generally relies on the mutual cooperation of the nodes. However, in reality, despite the availability of necessary resources for data forwarding, a node could misbehave by dropping messages received from other nodes with whom it has no strong social ties. Such a node is called a socially selfish node, which would cause a poor delivery ratio in the network. In this paper, we aim to address the problem of multicast data forwarding in the presence of such selfish nodes, by means of efficient relay selection in DTNs. First, we define a realistic reputation model, in contrast to existing models, to define the socially selfish/misbehaving nodes in the network. Further, a game‐theoretic analysis is carried out that implies data forwarding cost is also an influential parameter in handling selfishness/misbehavior. Subsequently, the problem is formulated as a constrained optimization problem, which is NP hard. Therefore, a heuristic is proposed by combining the reputation of a node and the cost of message forwarding to appropriately identify relay nodes, thus improve the performance of the multicast message delivery in the network. We utilize a social metric, centrality to minimize the message forwarding cost in terms of the number of relay nodes. Finally, the comparative performance evaluation in ONE simulator with practical scenarios shows the superiority of the proposed scheme over the other prominent schemes.  相似文献   

19.
Deep Space Networks (DSNs) are a class of DTNs. In such networks, owing to limited radio range and node mobility, end‐to‐end paths between source and destination nodes are not available. Messages are relayed by store‐and‐forward strategy and may be buffered for long periods before being forwarded to the next hop. Therefore, the buffer of message carriers may overflow, and congestion follows. To address this issue, this paper proposes an early detection and rejection probability‐based congestion control algorithm, named ERBA, in which every intermediate node estimates rejection probability when a new message arrives and refuses to receive the message with the rejection probability, so as to avoid congestion. To validate its effectiveness, ERBA is merged into static routing (SR) and dynamic routing (DR). SR and DR are classical routing algorithms for DSNs. The simulation results show that when working with ERBA, the routing overhead of SR and DR decreases rapidly. However, the message delivery ratio also decreases. To deal with this problem, we propose a buffer‐compensation mechanism that effectively reduces the routing overhead for SR and DR without causing the reduction of the message delivery ratio.Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

20.
Recently, underwater acoustic sensor networks (UASNs) have been considered as a promising approach for monitoring and exploring the oceans in lieu of traditional underwater wireline instruments. As a result, a broad range of applications exists ranging from oil industry to aquaculture and includes oceanographic data collection, disaster prevention, offshore exploration, assisted navigation, tactical surveillance, and pollution monitoring. However, the unique characteristics of underwater acoustic communication channels, such as high bit error rate, limited bandwidth, and variable delay, lead to a large number of packet drops, low throughput, and significant waste of energy because of packets retransmission in these applications. Hence, designing an efficient and reliable data communication protocol between sensor nodes and the sink is crucial for successful data transmission in underwater applications. Accordingly, this paper is intended to introduce a novel nature‐inspired evolutionary link quality‐aware queue‐based spectral clustering routing protocol for UASN‐based underwater applications. Because of its distributed nature, link quality‐aware queue‐based spectral clustering routing protocol successfully distributes network data traffic load evenly in harsh underwater environments and avoids hotspot problems that occur near the sink. In addition, because of its double check mechanism for signal to noise ratio and Euclidean distance, it adopts opportunistically and provides reliable dynamic cluster‐based routing architecture in the entire network. To sum up, the proposed approach successfully finds the best forwarding relay node for data transmission and avoids path loops and packet losses in both sparse and densely deployed UASNs. Our experimental results obtained in a set of extensive simulation studies verify that the proposed protocol performs better than the existing routing protocols in terms of data delivery ratio, overall network throughput, end‐to‐end delay, and energy efficiency.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号