首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
针对延迟容忍网络中节点运动状态变化频繁、通信路径不完整,使得转发消息仅能通过节点相遇而获得连接机会来完成,以及在不知节点间相关性的延迟容忍网络中盲目转发消息易导致其转发成功率较低等问题,提出了基于相遇紧密程度动态估测的延迟容忍网络路由策略。通过设计节点间的条件相遇时间间隔和连接持续时间的计算模型,来确定节点间关系的紧密程度;定义延迟容忍网络模型,构造最短路径择取机制,动态地选出条件最短路径,对消息进行转发。仿真数据对比显示,所提策略可有效改善网络性能,提高消息成功投递率,降低传输时延和负载率。  相似文献   

2.
杨鹏  唐洋  舒娜  王汝言 《通信学报》2015,36(Z1):42-52
针对间断连接无线网络中限制消息副本路由机制的低消息投递率与存在恶意节点攻击的问题,提出了一种节点状态实时感知的安全路由机制,采用供给需求模型对节点转发消息的过程进行建模,通过动态感知节点活跃度、邻居节点剩余缓存率和相遇节点声誉值,结合消息生存时间比,建立节点对消息配额的供给需求模型,进而合理分配稀缺的配额资源,并在本地网络状况满足约束条件下,依据消息需求弹性动态更新消息配额,实现可靠的安全路由机制。数值结果表明,所提出的路由机制有效地减小了恶意节点攻击行为的影响,并大幅改善消息投递率和消息平均时延。  相似文献   

3.
刘鑫  金光  江先亮  钮俊 《电信科学》2016,32(11):56-63
针对现有延迟容忍网络路由算法在消息传递过程中分发不灵活的问题,提出基于节点通话历史记录计算预期通断时长以及消息传递延迟值,并根据结果选择节点、分配副本数进行消息转发的路由算法(MDESF)。在算法不同阶段,根据节点的活跃度选择中继节点,再分配传递消息的副本数目,加快分发,降低延迟。同时为保证消息及时传递,在单副本阶段选择最优节点转发。本算法同时提出内存管理策略,提高消息转发成功率。仿真实验表明,该算法相对其他同类算法在投递率、交付时延和网络拥塞比率方面综合表现更优。  相似文献   

4.
由于ProPHET路由没有限制网络中消息数量,因此其网络开销很高。文章提出了新的消息转发度量化函数,并据此给出一种改进的概率路由算法P-DFM(ProPHET Based on DFM)。该算法利用节点与目的节点的接触概率和节点间的相遇频率来计算节点的消息转发度,通过比较节点的DFM决定转发消息的副本数目。采用TheONE对Epidemic路由、ProPHET路由及P-DFM路由进行仿真,结果表明提出的P-DFM算法有效地提高了消息投递率,降低了网络开销的成本。  相似文献   

5.
袁永琼 《电子科技》2013,26(5):135-138
提出了无线自组织网络中一种拥塞意识的多径路由算法。该算法在路由发现过程中,综合节点的队列长度和路径跳数来动态确定路由请求消息的转发概率,可以在保证路由请求消息有一定送达率的条件下,降低路由开销;在路径选择和流量分配过程中,综合考虑节点的队列长度和路径质量作为路由度量,发现流量高吞吐量低拥塞路径,并基于该度量值进行流量分配。仿真结果显示,所提出的多径路由算法能有效提高网络性能。  相似文献   

6.
水下传感网络是开发水域环境的有效技术手段。但在水下环境传输数据,信号衰减快,通信链路质量差,降低了数据包传递率。提出基于链路质量和位置的协作(LQLC)路由。LQLC路由引用协作路由思想,利用链路质量和节点能量信息,构建候选转发节点集;再从候选转发节点集中选择具有最优链路质量的节点作为转发节点;最后在候选转发节点集中选择离转发节点最近的节点作为协作节点。仿真结果表明,提出的LQLC路由提高了数据包传递率。  相似文献   

7.
针对基于P2P通信架构的分布式虚拟环境中的视图一致性问题,在分析有限的网络带宽等影响因素的基础上,提出了一种随机广播算法进行状态消息分发.该算法需预先建立随机几何图结构,并利用给出的通信限制时延进行状态更新消息的发送.结合基于贪心的路由选择算法,通过已获得状态更新消息的节点转发,进而确定节点间的转发路由,获得节点间具有较少通信时延的消息传播时间.经实验分析及验证表明,该算法与其他几种算法相比较而言,在很大程度上减少了时空不一致性事件率,提高了系统性能.  相似文献   

8.
谭劲  张玉娟 《电信科学》2016,32(8):69-76
在动态网络拓扑中,AODV协议通过数据源节点S泛洪广播RREQ消息请求到任意目标节点D的路由,而在无线体域网络中,只有一个sink目标节点,除最短跳数路由上的节点外,其他参与RREQ接收和转发的节点浪费了能量。提出了一种能量平衡的无线体域网络AODV多播路由发现协议,通过在节点广播的hello消息中增加到sink的最小跳数hops、到sink的下一跳节点next和节点本身是否具备转发能力isforward 3 个参数,只选择能到达sink节点的邻居节点参与转发RREQ消息,变广播为多播,有效地降低了路由发现的能量开销,并通过能量平衡延长了WBAN的使用寿命。性能分析与模拟实验表明,该协议在RREQ数量、数据传输率和能量消耗等方面优于相似协议EAAODV。  相似文献   

9.
由于移动自组织网络MANETs中节点的快速移动,使得维持源节点与目的节点间的通信路径成为一项挑战性工作。节点的高速移动导致通信链路频繁断裂。为此,提出基于节点移动度的虚连接的路由(MDVRP)。虚路由为一条动态的逻辑路由,其由一系列的特定地理区域构成。每个区域内的节点依据自己的移动度设置转发数据包的定时器,移动度越小,具有优先转发数据包权。MDVRP通过虚路由策略,在源节点与目的节点间建立了多条传输路通,每个节点能独立选取下一跳转发节点,并利用节点移动度,择优选取转发数据包下一跳节点,从而提高链路的稳定性。仿真结果表明,提出的路由协议在端到端传输时延、路由开销以及数据包传输率性能均得到提高。  相似文献   

10.
针对飞行自组织网络(Flying Ad Hoc Network, FANET)中高动态拓扑变化导致数据丢包率较高的问题,提出一种基于节点移动机会转发的集群路由算法CROF(Cluster Routing-Opportunity Forward)。该算法通过考虑节点相对移动趋势度和剩余能量的综合权值来统一对集群头节点以及集群间机会转发节点进行选择。仿真实验结果表明,CROF算法在高动态自组织网络中可以有效提高消息投递率以及网络生命周期。  相似文献   

11.

Delay tolerant networks (DTNs) are a newest class of networks that have the ability to provide connectivity to areas that are yet to be served by conventional networks. Routing in DTN is a tough task because nodes have no prior information about the partitioned network and transfer opportunities between peer nodes are limited. A node in a DTN delivers messages to the destination using the store and forward strategy. Messages are transmitted to multiple intermediate relay nodes encountered in order to increase the opportunity for the message to reach the destination. Encounter duration is the time period in which a pair or more mobile nodes move into the communication range of each other and hence are able to transfer messages between them. Since the node movements are arbitrary, the encounter duration is unpredictable. This research work proposes a novel encounter based fuzzy logic routing (EFLR) scheme to maximize message delivery with reduced overhead. The fuzzy based utility computation is used for finding a better node to forward messages as well as to drop messages from buffer. Simulation results reveal that EFLR performs better than other existing DTN routing protocols.

  相似文献   

12.
Designing a safe and reliable way for communicating the messages among the devices and humans forming the Opportunistic Internet of Things network (OppIoT) has been a challenge since the broadcast mode of message sharing is used. To contribute toward addressing such challenge, this paper proposes a Random Forest Classifier (RFC)‐based safe and reliable routing protocol for OppIoT (called RFCSec) which ensures space efficiency, hash‐based message integrity, and high packet delivery, simultaneously protecting the network against safety threats viz. packet collusion, hypernova, supernova, and wormhole attacks. The proposed RFCSec scheme is composed of two phases. In the first one, the RFC is trained on real data trace, and based on the output of this training, the second phase consists in classifying the encountered nodes of a given node as belonging to one of the output classes of nodes based on their past behavior in the network. This helps in proactively isolating the malicious nodes from participating in the routing process and encourages the participation of the ones with good message forwarding behavior, low packet dropping rate, high buffer availability, and a higher probability of delivering the messages in the past. Simulation results using the ONE simulator show that the proposed RFCSec secure routing scheme is superior to the MLProph, RLProph, and CAML routing protocols, chosen as benchmarks, in terms of legitimate packet delivery, probability of message delivery, count of dropped messages, and latency in packet delivery. The out‐of‐bag error obtained is also minimal  相似文献   

13.
Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics of intermittent node connectivity. Different protocols (single-, multi-copy, erasure-coding-based etc.) utilizing store-carry-and-forward paradigm have been proposed to achieve routing of messages in such environments by opportunistic message exchanges between nodes that are in the communication range of each other. The sparsity and distributed nature of these networks together with the lack of stable connectivity between source destination pairs make these networks vulnerable to malicious nodes which might attempt to learn the content of the messages being routed between the nodes. In this paper, we study DTNs in which malicious nodes are present, to which we refer to as compromised DTNs. We discuss and analyze the effects of presence of malicious nodes on routing of messages in compromised DTNs. We propose a two period routing approach which aims at achieving the desired delivery ratio by a given delivery deadline in presence of malicious nodes. Our simulation results with both random networks and real DTN traces show that, with proper parameter setting, the proposed method can achieve delivery ratios which surpass those reached by other algorithms by a given delivery deadline.  相似文献   

14.
Mobile ad hoc routing protocols fails in intermittently connected networks (ICN) (i.e. characterized by short-range communication and absence of connected path from source to destination). However, Epidemic routing techniques ensures eventual message delivery from source to destination even where there is never a connected path or when a network partition exists at the origin of message. Epidemic Routing uses random pair-wise messages exchanges between nodes with goals to maximize message delivery rate, minimize message latency, and the total resources consumed in message delivery. Epidemic routing uses summary vector to avoid useless transmission and redundancy. Further,to make summery vector efficient, epidemic routing can use bloom filter to significantly reduce the useless transmissions associated with the summary vector. However, the challenge for epidemic routing remains opens is to optimal design of summary vector size for finite buffer while keeping the benefits of infinite buffer space. This paper proposes an improved scheme of Bloom filter (named it modified bloom filter MBLF), which is tailored according to epidemic routing. We performed simulation to support our clam and observed that delivery ratio of MBLF with epidemic routing is 19 % higher then the traditional bloom filter. In this paper, we have proposed a bloom filter based epidemic forwarding for ICNs.  相似文献   

15.
In challenged networks such as Wireless Sensor Networks, limitations such as nodes mobility, short radio range and sparse network density can prevent communications among nodes. Consequently, it can result in long delays in exchanging messages among nodes. Designing Delay-Tolerant Networks is considered to be an approach for dealing with lengthy breakdown of communication between nodes. Using multi-replica methods seems rational for these networks. However, a majority of these methods inject a large amount of replications of a message in the network so as to enhance message delivery probability which consequently leads to the loss of energy and reduction of network efficiency. Two major issues should be considered to achieve data delivery in such challenging networking environments: a routing strategy for the network and a buffer management policy. This study proposes a new routing protocol called Fuzzy-Logic based Distance and Energy Aware Routing protocol (FLDEAR) in delay tolerant mobile sensor network. A FLDEAR is a distance and energy aware protocol that reduces the number of message replications and uses two fuzzy inference systems in routing and buffer management. The results of conducted simulations indicated that this routing algorithm can be used for enhancing data packet delivery ratios and reducing data transmission overhead than several current Delay-Tolerant Mobile Sensor Networks routing protocols.  相似文献   

16.
Delay and Disruption Tolerant Networks are made up of mobile wireless nodes which may experience major message delivery restrictions. Such restrictions are the result of intermittent connectivity and scattered topology. Within these networks, messages can be detained for long periods of time or never be delivered. Existing solutions that purport improved message delivery rates modify routing protocols to perform integrity verification with each hop, resulting in routing overhead and, very often, unnecessary processing costs. This article proposes a scheme, named EMCOD, which decreases message delivery delay, while minimally increasing the processing overheads. To achieve this, EMCOD uses data encoding and interleaving to create messages. The original data is reassembled from some of the messages received, without the need to wait for all messages to be received. In scenarios subject to long delays and/or significant packet loss rates, it is possible to reduce original data recovery times by more than 50%. The processing overhead resulting from the encoding procedures is offset by the data recovery capabilities, which effectively decreases network overheads by more than 60%, in the same scenarios. EMCOD modifies the Bundle Layer, without interfering with the remaining layers, making it possible to route the messages through nodes that do not implement the proposed scheme.  相似文献   

17.
This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.  相似文献   

18.
Delay Tolerant Networks (DTNs) provide message delivery services to users via intermittently connected nodes. In DTNs, routing is one of the most challenging issues since end-to-end connectivity between nodes may not be available most of the time. Although many routing protocols for DTNs have been proposed, they do not achieve satisfactory performance, since they exploit only some of the network characteristics. In this paper, we present a new DTN routing protocol, called the Link Contact Duration-based Routing Protocol (LCD). Like existing protocols, LCD uses the disconnect duration of a link between two nodes to find the routing path with the shortest end-to-end delay. In addition, LCD uses the contact duration of a link and the number of buffered messages to deliver as many messages as possible in a short time. Our simulation results show that LCD has better performance than existing DTN routing protocols.  相似文献   

19.
In opportunistic networks,a successful message transmission between node pairs depends on the message size,the transmission speed and the connection duration time.This paper proposes a new message forwarding algorithm to improve the message delivery ratio and reduce the energy consumption.Previous encounter characteristics between nodes are used to estimate future connection duration time using a three point estimation method.Furthermore,the buffer utilization of nodes is used as a weight for the likelihoods to meet destinations according to the hop count of messages stored in the buffer.The simulation results show that the proposed forwarding algorithm achieves higher delivery ratio and less overhead ratio than the other four popular routing protocols.In addition,the proposed algorithm gains a better average residual energy performance among all the compared protocols.  相似文献   

20.
Delay tolerant networks are a class of ad hoc networks that enable data delivery even in the absence of end‐to‐end connectivity between nodes, which is the basic assumption for routing in ad hoc networks. Nodes in these networks work on store‐carry and forward paradigm. In addition, such networks make use of message replication as a strategy to increase the possibility of messages reaching their destination. As contact opportunities are usually of short duration, it is important to prioritize scheduling of messages. Message replication may also lead to buffer congestion. Hence, buffer management is an important issue that greatly affects the performance of routing protocols in delay tolerant networks. In this paper, Spray and Wait routing protocol, which is a popular controlled replication‐based protocol for delay tolerant networks, has been enhanced using a new fuzzy‐based buffer management strategy Enhanced Fuzzy Spray and Wait Routing, with the aim to achieve increased delivery ratio and reduced overhead ratio. It aggregates three important message properties namely number of replicas of a message, its size, and remaining time‐to‐live, using fuzzy logic to determine the message priority, which denotes its importance with respect to other messages stored in a node's buffer. It then intelligently selects messages to schedule when a contact opportunity occurs. Because determination of number of replicas of a message in the network is a difficult task, a new method for estimation of the same has been proposed. Simulation results show improved performance of enhanced fuzzy spray and wait routing in terms of delivery ratio and resource consumption. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号