共查询到20条相似文献,搜索用时 0 毫秒
1.
Ad hoc网络中的移动骨干网的建立和维护是一项复杂的工作.本文首先比较了两种不同类型的骨干网络,然后说明了移动骨干网络的构造目标,接着重点对Ad hoc网络中移动骨干网的建立和维护过程进行了详细的论述,最后对全文进行了小结. 相似文献
2.
拓扑控制的实现途径是调节网络中每个节点的传输功率,而其所优化的网络指标有所差别,通常是减少节点的功率消耗以延长网络的生存时间。现有的拓扑控制算法关注在保证连通性的情况下优化网络的功率使用,较少考虑业务QoS指标对网络连接性要求。一种基于业务需求的拓扑控制算法被提出,在拓扑控制算法中引入业务QoS指标,如时延、带宽等。通过理论分析和计算机仿真结果表明,该算法对有QoS要求的业务有较好的支持。 相似文献
3.
Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique characteristics coupled with the growing concerns for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in mobile ad hoc networks has been primarily focused on routing and mobility aspects rather than securing the ad hoc networks themselves. Due to ever increasing security threats, there is a need to develop schemes, algorithms, and protocols for a secured ad hoc network infrastructure. To realize this objective, we have proposed a practical and effective security model for mobile ad hoc networks. The proposed predictive security model is designed using a fuzzy feedback control approach. The model is based on identifying critical network parameters that are affected by various types of attacks and it continuously monitors those parameters. Once we measure the relative change in these parameter values, we could detect the type of attack accurately and protect the system, without compromising its effectiveness. Experimental results of the model simulated for selected packet mistreatment attacks and routing attacks are very promising. 相似文献
4.
移动IP是一种简单可扩展的全球Internet移动解决方案。本文介绍了移动IP和移动Ad hoc网络的融合技术,以实现移动Ad hoc网络与Internet的互联。 相似文献
5.
IP address autoconfiguration of mobile nodes is highly desirable in the practical usage of most mobile ad hoc networks (MANETs).
This paper proposes cluster-based autoconfiguration, a novel approach for the efficient address autoconfiguration of MANETs.
The cluster structure derived from clustering techniques is used to manage address assignment and conflict resolution. By
introducing the concept of virtual address agents (AAs), the proposed approach can be applicable to many existing clustering
protocols. Finally, analysis and simulation demonstrate that the proposed scheme outperforms the previous autoconfiguration
approaches.
相似文献
6.
Mobile Ad hoc Networks (MANETs) rely on the cooperation of nodes for packet routing and forwarding. Much of the existing work
in MANETs assume that mobile nodes (possibly owned by selfish users) will follow prescribed protocols without deviation. However,
a user may misbehave due to several advantages resulting from noncooperation, the most obvious being power saving. As such,
the network availability is severely endangered. Hence, enforcing the cooperation among nodes becomes a very important issue.
Several different approaches have been developed to detect non-cooperative nodes or deal with the non-cooperative behavior
of mobile nodes in MANETs. These protocols are first surveyed in details in this paper. It is found that the proposed approaches
have several concerns that prevent them from really enforcing the node cooperation in MANETs. Thus, a new scheme that can
stimulate and also enforce nodes to cooperate in a selfish ad hoc environment is presented. We also present a mechanism to
detect and exclude potential threats of selfish mobile nodes. The simulation results indicate that by using the proposed scheme,
MANETs can be robust against nodes’ misbehaving and the performance of the network is enhanced many folds when compared to
other existing schemes.
相似文献
7.
A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between automobiles, facilities provider have led an frame over road network. The intelligent transportation system provides an efficient traffic system for drivers, so that there must be less risk to users. In order to design a secure communication protocol among V & V and V & I is a challenging problem. In order to reduce the chance of attacks and increase privacy level, crypto graphic tools provides the feasible solution. In this paper, we proposed pseudonym changing strategy with mix zones (1) Anonymous authentication: the message should be authenticated by issuer due to mix zone and cryptographic tools secure message without any attack. (2) Privacy: Communication contents are confidential due to encrypted messages during communications also improving the scalability through address configuration scheme to reduce computational cost. (3) Efficiency: low storage requirements, The velocity and distance factors may also consider secure measurement, message delivery, overhead and coverage,packet delivery rate, reduce latency and overhead not only by computation cost and time but also compared our scheme, fast delivery rate, low latency and maximum coverage in order to enhance privacy against malicious attacks. 相似文献
8.
随着实时多媒体业务向移动Adhoc网络的引入,如何为移动Adhoc网络提供服务质量保证成为当前研究的热点。本文介绍了为移动Adhoc网络提供QoS路由的三种实现机制:MAC层的TDMA资源管理、普通的QoS测量、CDMA的不同传输之间的冲突避免。 相似文献
9.
移动Ad hoc网络中,节点随机移动会引起通信链路频繁断开,从而导致路由失效,带来大量的路由重建与路由发现,耗费了有限的网络资源。传统按需路由中,采用简单的洪泛进行路由发现,路由请求包的盲目转发会带来大量不必要的冗余转发,造成广播风暴问题。此外,大量的数据包同时发送也会对彼此的传输造成干扰,增加数据包冲突概率。针对这种情况,本文提出一种基于干扰和连通度的路由协议,该协议结合节点的连通度和潜在干扰设计转发概率,不仅减少了路由请求包的传播范围,还减少了路由请求包的冲突概率,提高了传输成功率。仿真结果表明,本文设计的方案在减少路由开销的同时,有效提高了数据包投递率,从而提高了路由性能。 相似文献
10.
Worldwide Interoperability for Microwave Access (Wimax) is power station through which mobile network, commonly known as A Mobile Ad-hoc Network (MANET) is used by the people. A MANET can be described as an infrastructure-less and self-configure network with autonomous nodes. Participated nodes in MANETs move through the network constantly causing frequent topology changes. Designing suitable routing protocols to handle the dynamic topology changes in MANETs can enhance the performance of the network. In this regard, this paper proposes four algorithms for the routing problem in MANETs. First, we propose a new method called Classical Logic-based Routing Algorithm for the routing problem in MANETs. Second is a routing algorithm named Fuzzy Logic-based Routing Algorithm (FLRA). Third, a Reinforcement Learning-based Routing Algorithm is proposed to construct optimal paths in MANETs. Finally, a fuzzy logic-based method is accompanied with reinforcement learning to mitigate existing problems in FLRA. This algorithm is called Reinforcement Learning and Fuzzy Logic-based (RLFLRA) Routing Algorithm. Our proposed approaches can be deployed in dynamic environments and take four important fuzzy variables such as available bandwidth, residual energy, mobility speed, and hop-count into consideration. Simulation results depict that learning process has a great impact on network performance and RLFLRA outperforms other proposed algorithms in terms of throughput, route discovery time, packet delivery ratio, network access delay, and hop-count. 相似文献
11.
针对大区域移动自组网提出一种基于位置信息的MAC协议(PB-MAC).该协议采用CSMMCA方式来交换控制信息,采用TDMA方式进行数据业务传输,并在位置信息的辅助下对数据传输进行时隙调整.仿真结果表明,PB-MAC能有效提高网络吞吐量,提供确定的延时上界,并使网络保持较好的可扩展性. 相似文献
12.
Wireless Personal Communications - Vehicular Ad hoc Networks (VANETs) being a vital component of Intelligent Transport System (ITS), is getting due attention from the research community.... 相似文献
13.
通过移动IP和AODV协议合作,无线Ad hoc网内的移动节点可以与外地代理之间进行多跳通信,从而实现无线Ad hoc网与Internet的互连。本文首先分析了AODV协议,然后对无线Ad hoc网络与Internet互连的技术方案,包括数据结构、代理广播消息、外地代理搜索、注册、路由发现与数据传输、切换与负载平衡问题等进行了详细讨论。 相似文献
14.
UWB技术的出现,为移动自组网络的应用研究带来了机遇和挑战。UWB信号的测距能力使路由协议的设计更加灵活。本文针对UWB技术的特点进行了阐述,总结了现有的UWB路由协议研究,并提出了该领域面临的问题和亟待解决的关键技术。 相似文献
15.
Mobile ad hoc networks rely on the co-operation of devices that route for each other. This immediately presents security problems.
Each device's data passes through the not so friendly hands of other devices. Forwarding devices must use their processing
power and battery power to route packets for others. When bandwidth is limited they must also use bandwidth that they might
want to use for themselves. These are not great issues with the first incarnations of ad hoc networks — military systems or
others where all the devices are owned by a single organisation. However, if ad hoc networks are to be generally deployed
and become an alternative or adjunct to future cellular systems, then ways to encourage co-operation are required.
This revised version was published online in July 2006 with corrections to the Cover Date. 相似文献
16.
Mobile ad hoc networking has been a hot research topic for a decade or so, and many paradigms have been making use of it. One of these paradigms is the Personal Networks (PN). It is an emerging concept where the user’s personal devices form a virtual network which is secure and private, and reacts to changing environment and context intelligently. A fundamental property of the PN is that personal devices form private multi-hop clusters in an ad hoc manner whenever they come across each other. To this end, this paper presents a pair-wise key based scheme for forming secured private clusters in mobile ad hoc networks. The solution tackles the problem of node authentication combined with traffic encryption in relatively small ad hoc networks using proactive neighbour discovery and authentication. Additionally, the paper proves the feasibility of this solution by means of prototyping and experimental performance analysis. 相似文献
17.
目前,有许多通信业界的著名通信厂商提出了OperatorWLAN(以下简称OWLAN)的宽带接入概念。本文将就这一概念为基础,讨论Ad hoc网络在OWLAN中的应用中可能出现的一些问题,并给出了我们的解决思路。 相似文献
18.
Wireless Personal Communications - MANET (mobile ad-hoc network) includes a set of wireless mobile nodes which communicate with one another without any central controls or infrastructures and they... 相似文献
19.
By adjusting the transmission power of mobile nodes, topology control aims to reduce wireless interference, reduce energy consumption, and increase effective network capacity, subject to connectivity constraints. In this paper, we introduce the Ant-Based Topology Control (ABTC) algorithm that adapts the biological metaphor of Swarm Intelligence to control topology of mobile ad hoc networks. ABTC is a distributed algorithm where each node asynchronously collects local information from nearby nodes, via sending and receiving ant packets, to determine its appropriate transmission power. The operations of ABTC do not require any geographical location, angle-of-arrival, topology, or routing information, and are scalable. In particular, ABTC attempts to minimize the maximum power used by any node in the network, or minimize the total power used by all of the nodes in the network. By adapting swarm intelligence as an adaptive search mechanism, ABTC converges quickly to a good power assignment with respect to minimization objectives, and adapts well to mobility. In addition, ABTC may achieve common power, or properly assign power to nodes with non-uniform distribution. Results from a thorough comparative simulation study demonstrate the effectiveness of ABTC for different mobility speed, various density, and diverse node distributions.This work is supported in part by National Science Foundation under grant ANI-0240398. Chien-Chung Shen received his B.S. and M.S. degrees from National Chiao Tung University, Taiwan, and his Ph.D. degree from UCLA, all in computer science. He was a research scientist at Bellcore Applied Research working on control and management of broadband networks. He is now an assistant professor in the Department of Computer and Information Sciences of the University of Delaware, and a recipient of NSF CAREER Award. His research interests include ad hoc and sensor networks, control and management of broadband networks, distributed object and peer-to-peer computing, and simulation. Zhuochuan Huang received his B.E. degree in Computer Science and Technology from Tsinghua University, P.R. China, in 1998, and his M.S. degree in Computer Science from University of Delaware in 2000. He is currently a PhD candidate with the Department of Computer and Information Sciences at the University of Delaware. His current research interests include the design and simulation of protocols for mobile ad hoc networks. Chaiporn Jaikaeo received his B.Eng degree in computer engineering from Kasetsart University, Thailand, and his M.S. and Ph.D. degrees in computer and information sciences from the University of Delaware in 1996, 1999 and 2004, respectively. He is currently a lecturer in the Department of Computer Engineering at Kasetsart University. His research interests include unicast and multicast routing, topology control, peer-to-peer computing and network management for mobile wireless ad hoc and sensor networks. 相似文献
20.
移动自组(Ad hoc)网络是现有网络的一种补充和扩展,它主要应用于缺乏网络基础设施的环境或者现有网络不能满足移动性、机动性等要求的情况。移动Ad hoc网络的特性使得它面临着比现有网络更大的安全挑战。首先介绍了移动Ad hoc网络的概念、特性及应用,接着探讨了移动Ad hoc网络中的安全漏洞以及相应的对策,最后讨论了今后移动Ad hoc网络安全问题的研究方向。 相似文献
|