共查询到19条相似文献,搜索用时 93 毫秒
1.
2.
3.
4.
5.
基于NS2的航空白组网节点移动模型仿真研究 总被引:1,自引:1,他引:0
航空自组网是MANET-s在航空通信中的应用。对三种节点移动模型在航空自组网中的应用进行了仿真研究。利用NS2仿真平台,添加了随机走动移动模型和随机方向移动模型,建立了AANET的网络模型.编写了仿真场景,对三种节点移动模型在AANET中的性能进行了仿真分析。结果表明随机路点移动模型的性能最优,随机走动移动模型其次,随机方向移动模型最差。研究结果对航空自组网的研究和应用具有一定的参考价值。 相似文献
6.
在现代通信技术快速发展的背景下,应急语音通信作为应对突发自然灾害的重要手段,近年来得到了广泛重视。结合应急通信的实战需求,探讨了新一代窄带自组网通信技术的在应急通信领域的创新应用。根据我国实际情况提出了现有窄带应急通信的问题和需求,然后介绍并分析了窄带自组网的原理和特点,其具有通信覆盖面积广、抗毁性强、维护简单以及成本低等优势,极好地满足了目前偏远地区窄带应急语音通信的需要。最后,结合实际案例阐述了窄带自组网作为应急语音通信网的应用优势,初步证明了该应用的可行性。 相似文献
7.
8.
9.
山地森林区域灾害存在现场环境复杂、地面公网被摧毁或无法覆盖的问题,文中根据应急通信实战需求,提出了一种便携式窄带无线自组网应急通信系统。该系统利用了“LTE+DMR”的融合方式,使不同网络、不同制式的通信系统相融合,实现了与不同终端设备、通信方式的互通互联与统一管理。经案例测试证明,该窄带无线自组网技术在应急语音通信网络中具有可行性,满足了山林区域环境下的应急通信需求。 相似文献
10.
11.
In this paper, we present a secure group key management scheme for hierarchical mobile ad hoc networks. Our approach aims to improve both scalability and survivability of group key management for large-scale wireless ad hoc networks. To achieve our goal, we propose the following approaches: (1) a multi-level security model, which follows a modified Bell-La Padula security model that is suitable in a hierarchical mobile ad hoc networking environment, and (2) a decentralized group key management infrastructure to achieve such a multi-level security model. Our approaches reduce the key management overhead and improve resilience to any single point failure problem. In addition, we have developed a roaming protocol that is able to provide secure group communication involving group members from different groups without requiring new keys; an advantage of this protocol is that it is able to provide continuous group communication even when the group manager fails. 相似文献
12.
分簇可以有效地提高大规模移动自组织网络的性能.但高动态的移动自组织网络具有节点移动性强、网络拓扑变化快的特点,应用传统的分簇算法会造成网络性能迅速下降,频繁的簇拓扑更新造成了簇结构的不稳定和控制开销的增加.为了解决传统分簇算法无法适应高动态的大规模移动自组织网络的问题,提出了一种基于生物启发的移动感知分簇算法,该算法对多头绒泡菌的觅食模型进行了改进,使其适用于移动自组织网络领域.由于该算法与节点的移动特性进行了结合,所以该算法可以有效地在高动态移动自组织网络中进行簇的建立与维护.实验结果表明,相较于其他传统分簇算法,本文算法提高了平均链路连接保持时间和平均簇首保持时间,使得簇结构更加稳定,提高了对高动态、大规模移动自组织网络的适应能力. 相似文献
13.
Yuh‐Min Tseng 《International Journal of Network Management》2007,17(1):3-15
A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most secure protocols in mobile ad hoc networks, such as secure routing, key agreement and secure group communication protocols, assume that all nodes must have pre‐shared a secret, or pre‐obtained public‐key certificates before joining the network. However, this assumption has a practical weakness for some emergency applications, because some nodes without pre‐obtained certificates will be unable to join the network. In this paper, a heterogeneous‐network aided public‐key management scheme for mobile ad hoc networks is proposed to remedy this weakness. Several heterogeneous networks (such as satellite, unmanned aerial vehicle, or cellular networks) provide wider service areas and ubiquitous connectivity. We adopt these wide‐covered heterogeneous networks to design a secure certificate distribution scheme that allows a mobile node without a pre‐obtained certificate to instantly get a certificate using the communication channel constructed by these wide‐covered heterogeneous networks. Therefore, this scheme enhances the security infrastructure of public key management for mobile ad hoc networks. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
14.
Supporting multicasting in mobile ad‐hoc wireless networks: issues,challenges, and current protocols
The basic philosophy of personal communication services is to provide user‐to‐user, location independent communication services. The emerging group communication wireless applications, such as multipoint data dissemination and multiparty conferencing tools have made the design and development of efficient multicast techniques in mobile ad‐hoc networking environments a necessity and not just a desire. Multicast protocols in mobile ad‐hoc networks have been an area of active research for the past couple of years. This paper summarizes the activities and recent advances in this work‐in‐progress area by identifying the main issues and challenges that multicast protocols are facing in mobile ad‐hoc networking environments, and by surveying several existing multicasting protocols. This article presents a classification of the current multicast protocols, discusses the functionality of the individual existing protocols, and provides a qualitative comparison of their characteristics according to several distinct features and performance parameters. Furthermore, since many of the additional issues and constraints associated with the mobile ad‐hoc networks are due, to a large extent, to the attribute of user mobility, we also present an overview of research and development efforts in the area of group mobility modeling in mobile ad‐hoc networks. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
15.
Jain Nitin Kumar Yadav Dharmendra Singh Verma Ajay 《Wireless Personal Communications》2020,114(3):2591-2612
Wireless Personal Communications - Using ad hoc information amid of adaptable terminals, mobile ad hoc networks (MANETs) are absolute of any kind of communication infrastructure even though the... 相似文献
16.
Janakiraman Sengathir Priya M. Deva Jebamalar A. Christy 《Wireless Personal Communications》2021,119(3):2147-2163
Wireless Personal Communications - Reliable communication in ad hoc networks necessitates mobile nodes to synchronize among themselves for cooperation. The cooperation in ad hoc networks... 相似文献
17.
The cellular network with ad hoc communication has been foreseen in the next-generation mobile communication system. For such a network, a distance-based (DB) location management scheme cooperated with the ad hoc assistance node (DBCAN) is proposed in this paper. Allowing a mobile terminal to pass its mobility information to the ad hoc assistance node (AAN) with appropriate location updating, DBCAN can effectively reduce the paging cost and limit the paging delay. Moreover, DBCAN includes a method to determine whether AANs should be utilized or not to make cost effective. Our simulation results show that DBCAN can effectively reach cost reduction and still get performance improvement even if the probability to successfully deliver mobility information to AANs falls to the median level. 相似文献
18.
Amir Esmailpour Nidal Nasser Jehad Al Dallal 《International Journal of Communication Systems》2013,26(12):1520-1542
Wireless mesh networks (WMNs) have a proven record in providing viable solutions for some of the fundamental issues in wireless networks such as capacity and range limitations. WMN infrastructure includes clusters of mobile ad‐hoc networks connected through a fixed backbone of mesh routers. The mesh network can be constrained severely because of various reasons, which could result in performance degradation such as a drop in throughput or long delays. Solutions to this problem often focus on multipath or multichannel extensions to the existing ad‐hoc routing protocols. In this paper, we propose a novel solution by introducing an alternative path to the mesh backbone that traverses the mobile ad‐hoc networks part of the WMN. The new routing solution allows the mobile nodes (MNs) to establish direct communication among peers without going through the backbone. The proposed alternative ad‐hoc path is used only when the mesh backbone is severely constrained. We also propose, for the first time in WMNs, using MNs with two interfaces, one used in the mesh backbone communication and the other engaged in the ad‐hoc network. A scheme is presented for making the MN aware of link quality measures by providing throughput values to the ad‐hoc on‐demand distance vector protocol. We use piggybacking on route reply messages in ad‐hoc on‐demand distance vector to avoid incurring additional costs. We implemented our solution in an OPNET simulator and evaluated its performance under a variety of conditions. Simulation results show that the alternative ad‐hoc path provides higher throughput and lower delays. Delay analysis show that the throughput improvement does not impose additional costs. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
19.
Secure routing in mobile wireless ad hoc networks 总被引:3,自引:0,他引:3
We discuss several well known contemporary protocols aimed at securing routing in mobile wireless ad hoc networks. We analyze each of these protocols against requirements of ad hoc routing and in some cases identify fallibilities and make recommendations to overcome these problems so as to improve the overall efficacy of these protocols in securing ad hoc routing, without adding any significant computational or communication overhead. 相似文献