共查询到20条相似文献,搜索用时 0 毫秒
1.
In a regular wireless ad hoc network, the Medium Access Control (MAC) protocol coordinates channel access among nodes, and the throughput of the network is limited by the bandwidth of a single channel. The multi-channel MAC protocols can exploit multiple channels to achieve high network throughput by enabling more concurrent transmissions. In this paper, we propose a hybrid and adaptive protocol, called H-MMAC, which utilizes multi-channel resources more efficiently than other multi-channel MAC protocols. The main idea is to adopt the IEEE 802.11 Power Saving Mechanism and to allow nodes to transmit data packets while other nodes try to negotiate the data channel during the Ad hoc Traffic Indication Message window based on the network traffic load. The analytical and simulation results show that the proposed H-MMAC protocol improves the network performance significantly in terms of the aggregate throughput, average delay, fairness and energy efficiency. 相似文献
2.
3.
Routing protocols are the binding force in mobile ad hoc network (MANETs) since they facilitate communication beyond the wireless
transmission range of the nodes. However, the infrastructure-less, pervasive, and distributed nature of MANETs renders them
vulnerable to security threats. In this paper, we propose a novel cluster-based trust-aware routing protocol (CBTRP) for MANETs
to protect forwarded packets from intermediary malicious nodes. The proposed protocol organizes the network into one-hop disjoint
clusters then elects the most qualified and trustworthy nodes to play the role of cluster-heads that are responsible for handling
all the routing activities. The proposed CBTRP continuously ensures the trustworthiness of cluster-heads by replacing them
as soon as they become malicious and can dynamically update the packet path to avoid malicious routes. We have implemented
and simulated the proposed protocol then evaluated its performance compared to the clustered based routing protocol (CBRP)
as well as the 2ACK approach. Comparisons and analysis have shown the effectiveness of our proposed scheme. 相似文献
4.
Flooding-based route discovery is widely assumed in existing routing protocols of wireless ad hoc networks. Network-wide flooding enables the discovery of optimal routes from sources to destinations; however, as all network nodes are required to participate in the relays of route request packets, substantial control overhead is inevitable. Some efficient broadcast schemes can suppress redundant packet relays, but they often suppress the discovery of optimal routes, too. In this article we propose to dynamically create a prerouting region between each source-destination pair and limit the propagations of route request packets only within this region. The prerouting region effectively restricts route discovery activities to the nodes that most likely constitute the optimal or near-optimal routes. Consequently, not only is route construction overhead significantly reduced; route optimality is also guaranteed. The article presents a region-based routing (REGR) protocol covering both new route formation cases and route update cases. Simulations show that our protocol is particularly beneficial to dense and large-scale mobile ad hoc networks. 相似文献
5.
Numerous directional medium access control (DMAC) protocols have been developed to enhance the capacity of ad hoc networks using the underlying advanced physical layer techniques, such as beam-forming, multiuser detection (MUD), and multiple-input–multiple-output (MIMO). In this paper, we propose an innovative fully distributed DMAC protocol that cooperatively makes use of polarization diversity in low-mobility urban/suburban outdoor wireless ad hoc network environment. In the proposed cooperative polarization DMAC protocol (CPDMAC), each node directionally senses on both vertical and horizontal polarizations and dynamically adapts polarization that minimizes overall interference in the ad hoc network. Analysis is performed to establish relationship between vertically and horizontally polarized nodes in the network. Further, a theoretical lower bound is derived for probability of successful transmission to show capacity improvement as a function of cross polarization ratio (CPR). Simulation results confirm from 2% up to 400% improvement in average node throughput at data rate of 1.95 Mbps when compared to the traditional DMAC protocol. Moreover, our study clearly shows that the average throughput difference increases with increasing node density when compared to the traditional DMAC protocol. 相似文献
6.
7.
Zhenghua Fu Xiaoqiao Meng Songwu Lu 《Selected Areas in Communications, IEEE Journal on》2003,21(10):1615-1626
Transport protocol design for supporting multimedia streaming in mobile ad hoc networks is challenging because of unique issues, including mobility-induced disconnection, reconnection, and high out-of-order delivery ratios; channel errors and network congestion. In this paper, we describe the design and implementation of a transmission control protocol (TCP)-friendly transport protocol for ad hoc networks. Our key design novelty is to perform multimetric joint identification for packet and connection behaviors based on end-to-end measurements. Our NS-2 simulations show significant performance improvement over wired TCP friendly congestion control and TCP with explicit-link-failure-notification support in ad hoc networks. 相似文献
8.
In this paper, we propose a comprehensive solution for power control in mobile ad hoc networks (MANETs). Our solution emphasizes the interplay between the MAC and network layers, whereby the MAC layer indirectly influences the selection of the next-hop by properly adjusting the power of route request packets. This is done while maintaining network connectivity. Channel-gain information obtained mainly from overheard RTS and CTS packets is used to dynamically construct the network topology. Unlike the IEEE 802.11 approach and previously proposed schemes, ours does not use the RTS/CTS packets to silence the neighboring nodes. Instead, collision avoidance information is inserted in the CTS packets and sent over an out-of-band control channel. This information is used to dynamically bound the transmission power of potentially interfering nodes in the vicinity of a receiver. By properly estimating the required transmission power for data packets, our protocol allows for interference-limited simultaneous transmissions to take place in the neighborhood of a receiving node. Simulation results indicate that, compared to the IEEE 802.11 approach, the proposed protocol achieves a significant increase in the channel utilization and end-to-end network throughput and a significant decrease in the total energy consumption. 相似文献
9.
On-demand power management for ad hoc networks 总被引:1,自引:0,他引:1
Battery power is an important resource in ad hoc networks. It has been observed that in ad hoc networks, energy consumption does not reflect the communication activities in the network. Many existing energy conservation protocols based on electing a routing backbone for global connectivity are oblivious to traffic characteristics. In this paper, we propose an extensible on-demand power management framework for ad hoc networks that adapts to traffic load. Nodes maintain soft-state timers that determine power management transitions. By monitoring routing control messages and data transmission, these timers are set and refreshed on-demand. Nodes that are not involved in data delivery may go to sleep as supported by the MAC protocol. This soft state is aggregated across multiple flows and its maintenance requires no additional out-of-band messages. We implement a prototype of our framework in the ns-2 simulator that uses the IEEE 802.11 MAC protocol. Simulation studies using our scheme with the Dynamic Source Routing protocol show a reduction in energy consumption near 50% when compared to a network without power management under both long-lived CBR traffic and on–off traffic loads, with comparable throughput and latency. Preliminary results also show that it outperforms existing routing backbone election approaches. 相似文献
10.
One possibility direction to assist routing in Mobile Ad Hoc Network (MANET) is to use geographical location information provided
by positioning devices such as global positioning systems (GPS). Instead of searching the route in the entire network blindly,
position-based routing protocol uses the location information of mobile nodes to confine the route searching space into a
smaller estimated range. The smaller route searching space to be searched, the less routing overhead and broadcast storm problem
will occur.
In this paper, we proposed a location-based routing protocol called LARDAR. There are three important characteristics be used
in our protocol to improve the performance. Firstly, we use the location information of destination node to predict a smaller
triangle or rectangle request zone that covers the position of destination in the past. The smaller route discovery space
reduces the traffic of route request and the probability of collision. Secondly, in order to adapt the precision of the estimated
request zone, and reduce the searching range, we applied a dynamic adaptation of request zone technique to trigger intermediate nodes using the location information of destination node to redefine a more precise request zone.
Finally, an increasing-exclusive search approach is used to redo route discovery by a progressive increasing search angle basis when route discovery failed. This progressive
increased request zone and exclusive search method is helpful to reduce routing overhead. It guarantees that the areas of
route rediscovery will never exceed twice the entire network. Simulation results show that LARDAR has lower routing cost and
collision than other protocols.
Tzay-Farn Shih was with Department of Electrical Engineering, National Taiwan University.
Tzay-Farn Shih received the B.S. degree in Information Management from Chinese Culture University, Taiwan, in 1992, the M.S. degree in Computer
Science Engineering from Tatung University, Taiwan, in 1996, and the Ph.D. degree in Electrical Engineering from National
Taiwan University, Taiwan, in 2006. He is presently an assistant professor of Computer Science and Information Engineering
at Chaoyang University of Technology, where he initially joined in August 2006. He is currently an overseas member of the
Institute of Electronics, Information and Communication Engineers (IEICE). His current research interests include computer
simulation, computer networks routing protocol, wireless networks, Mobile Ad Hoc networks and sensor networks.
Hsu-Chun Yen was born in Taiwan, Republic of China, on May 29, 1958. He received the B.S. degree in electrical engineering from National
Taiwan University, Taiwan, in 1980, the M.S. degree in computer engineering from National Chiao-Tung University, Taiwan, in
1982, and the Ph.D. degree in computer science from the University of Texas at Austin, U.S.A., in 1986.
He is presently a Professor of Electrical Engineering at National Taiwan University, where he initially joined in August 1990.
From August 1986 to July 1990, he was an Assistant Professor of Computer Science at Iowa State University, Ames, Iowa, U.S.A.
His current research interests include Petri net theory, formal methods, design and analysis of algorithms, and complexity
theory. Dr. Yen is an editor of International Journal of Foundations of Computer Science (IJFCS, World Scientific Publisher). 相似文献
11.
With the increasing popularity of multimedia, there is a growing tendency in mobile ad hoc networks (MANETs) to establish stable routes with long route lifetimes, low control overhead and high packet delivery ratios. According to recent analytical result, the lifetime of a route, which can reflect the route stability, depends on the length of the route and the lifetime of each link in the route. This paper presents a Greedy-based Backup Routing (GBR) protocol that considers both route length and link lifetime to achieve high route stability. In GBR, the primary path is constructed primarily based on a greedy forwarding mechanism, whereas the local-backup path for each link is established according to the link lifetime. Both analytical and simulation results demonstrate that GBR has excellent performance in terms of route lifetime, packet delivery ratio, and control overhead. 相似文献
12.
A survey of key management in ad hoc networks 总被引:1,自引:0,他引:1
《Communications Surveys & Tutorials, IEEE》2006,8(3):48-66
13.
DaSilva L.A. Midkiff S.F. Park J.S. Hadjichristofi G.C. Davis N.J. Phanse K.S. Tao Lin 《Communications Magazine, IEEE》2004,42(11):88-96
The integration of various network-level functions, including routing, management, and security, is critical to the efficient operation of a mobile ad hoc network. In this article we focus on network mobility (rather than node mobility), implying the movement of entire subnetworks with respect to one another, while individual users initially associated with one such subnetwork may also move to other domains. One example is a battlefield network that includes ships, aircraft, and ground troops. In this "network of networks", subnets (e.g. shipboard networks) may be interconnected via a terrestrial mobile wireless network (e.g., between moving ships). We discuss the design and implementation of a new ad hoc routing protocol, a suite of solutions for policy-based network management, and approaches for key management and deployment of IPsec in a MANET. These solutions, in turn, are integrated with real-time middleware, a secure radio link, and a topology monitoring tool. We briefly describe each component of the solution, and focus on the challenges and approaches to integrating these components into a cohesive system to support network mobility. We evaluate the effectiveness of the system through experiments conducted in a wireless ad hoc testbed. 相似文献
14.
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To thwart or prevent such attacks, it is necessary to employ authentication mechanisms to ensure that only authorized nodes can inject traffic into the network. We propose LHAP, a hop-by-hop authentication protocol for ad hoc networks. LHAP resides in between the network layer and the data link layer, thus providing a layer of protection that can prevent or thwart many attacks from happening, including outsider attacks and insider impersonation attacks. Our detailed performance evaluation shows that LHAP incurs small performance overhead and it also allows a tradeoff between security and performance. 相似文献
15.
16.
Secure dynamic IP addressing is a prime requirement for unicast communication between authorized hosts in mobile ad hoc networks (MANETs). Recently, several approaches have been proposed for dynamic addressing scheme. However, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In this paper, we present an ID based dynamic IP configuration scheme that can securely allocate IP addresses to the authorized hosts for a mobile ad hoc network without broadcasting over the entire network. Each host in the MANET can generate an unique IP address from its own IP address for a new host. The proposed scheme provides authentication for address configuration without the help of a trusted third party while taking care of the security-threats associated with dynamic IP configuration. Performance analysis shows that even with added security mechanisms our proposed addressing scheme has fairly good addressing latency and control overhead compared to the similar existing schemes. Moreover, the proposed scheme is able to solve the problem of network partitions and mergers along with the arrival and departure of a host efficiently and securely. 相似文献
17.
基于簇的ad hoc网络密钥管理方案 总被引:2,自引:0,他引:2
将自认证公钥的概念和组合公钥的思想相结合,为ad hoc网络提出了一种新的门限密钥分发方案,在此基础上,和"簇"的组网方式结合,提出一种完整的密钥管理方案.该方案公钥自身具有认证功能,不需要证书管理,密钥分发过程简单,消除了IBE(identity-based encryption)方案中存在的密钥托管问题.方案能够灵活地适应ad hoc网络动态拓扑性,适用于各种规模的网络.理论和仿真分析表明,该方案计算量和通信量都比较小,与PKI、IBE方案相比,具有更高的安全性和实用性. 相似文献
18.
Self-organized public-key management for mobile ad hoc networks 总被引:6,自引:0,他引:6
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase. 相似文献
19.
Vehicular Ad hoc Network (VANET) enables high speed vehicles to communicate with each other. This kind of communication can provide road safety and passengers’ comfort. Covert channels are used to transmit information secretly over the network. Network covert channel is not only used as a hacking tool, but also used to convey secret information such as private keys. Unlike wired and conventional wireless networks, few studies are conducted on covert communication in VANET. The goal of this paper is to develop a hybrid (timing and storage) covert channel in VANET. In the timing part, covert messages are sent by altering the timing pattern of the service and control packets. The proposed covert timing algorithm is dynamically changed based on the vehicular traffic volume in the transmitter’s radio range. This dynamism is used to achieve better covert capacity with an acceptable error rate. On the other hand, some fields of the periodic status messages, sent in the control channel, are utilized in the storage part. An encoding algorithm is also proposed to embed the covert data in the mentioned covert timing and storage opportunities. The encoding algorithm provides a high embedding capacity, even if the number of opportunities’ possible values is not any power of two. Finally, the transmitted secret data volume, the packet loss ratio, the channel error rate and the effect of the proposed method on other vehicles’ throughput are evaluated in a simulation process. 相似文献
20.
An adaptive management architecture for ad hoc networks 总被引:13,自引:0,他引:13
Ad hoc networks, where mobile nodes communicate via multihop wireless links, facilitate network connectivity without the aid of any preexisting networking infrastructure. The intrinsic attributes of ad hoc networks, such as dynamic network topology, limited battery power, constrained wireless bandwidth and quality, and large number of heterogeneous nodes, make network management significantly more challenging than stationary and wired networks. In particular, the conventional client/server-based manager/agent management paradigm falls short of addressing these issues. We describe the Guerrilla management architecture to facilitate adaptive and autonomous management of ad hoc networks. The management capability of Guerrilla is scalable to accommodate the sheer number and heterogeneity of nodes, autonomous and survivable to adapt to network dynamics, and economical to minimize management overhead. 相似文献