首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
《Computer Networks》2002,38(2):121-135
An ad hoc network is a multi-hop wireless network of mobile nodes without the intervention of fixed infrastructure. Limited bandwidth and mobility require that ad hoc routing protocols be robust, simple, and energy conserving. This paper proposes a new ad hoc multicast routing protocol called neighbor-supporting multicast protocol (NSMP). NSMP adopts a mesh structure to enhance resilience against mobility. And NSMP utilizes node locality to reduce the overhead of route maintenance. NSMP also attempts to improve route efficiency and reduce data transmissions. Our simulation results show that NSMP delivers packets efficiently while substantially reducing control overhead in various environments.  相似文献   

2.
《Computer Networks》2007,51(3):853-865
Voluntary peer collaboration is often assumed in media access, route discovery, packet forwarding, and upper-layer protocols designed for wireless ad hoc networks. This assumption has been seriously challenged when peers are autonomous, selfish, or malicious in large-scale, heterogeneous networks. In this paper, based on the latest advances in identity-based cryptography, we design a lightweight and cheat-resistant micropayment scheme to stimulate and compensate collaborative peers that sacrifice their resources to relay packets for other peers. We also demonstrate that when security and collaboration measures are properly enforced, profitable collaboration is a preferable strategy for all peers in ad hoc networks.  相似文献   

3.
Deying  Qin  Xiaodong  Xiaohua   《Computer Communications》2007,30(18):3746-3756
In this paper, we discuss the energy efficient multicast problem in ad hoc wireless networks. Each node in the network is assumed to have a fixed level of transmission power. The problem of our concern is: given an ad hoc wireless network and a multicast request, how to find a multicast tree such that the total energy cost of the multicast tree is minimized. We first prove this problem is NP-hard and it is unlikely to have an approximation algorithm with a constant performance ratio of the number of nodes in the network. We then propose an algorithm based on the directed Steiner tree method that has a theoretically guaranteed approximation performance ratio. We also propose two efficient heuristics, node-join-tree (NJT) and tree-join-tree (TJT) algorithms. The NJT algorithm can be easily implemented in a distributed fashion. Extensive simulations have been conducted to compare with other methods and the results have shown significant improvement on energy efficiency of the proposed algorithms.  相似文献   

4.
无线自组网与传统的有线网不同,它由一些可移动的结点组成,这些结点的带宽、计算能力和能量都受到一定限制。针对这种网络,研究者们提出了按需路由协议,这些协议非常适合无线自组网这种拓扑结构,但是由于缺乏对全局拓扑和结点移动性的了解,可能达不到最优。因此提出了一种高效的路由协议ERNC,该协议基于已提出的SHORT路由协议[13],并对以前所提出的NAOR协议[14]进行了扩展,即利用网络编码技术来进一步提高路由协议的性能。最后,使用NS-2模拟器来评估ERNC的性能,结果显示ERNC在分组投递率和平均端到端时延等方面获得了比已有协议更好的性能。  相似文献   

5.
Conventional security property evaluation approaches for ad hoc network routing protocols do not provide an automated or exhaustive capability. This paper provides an automated process to evaluate security properties in the route discovery phase for on-demand source routing protocols. For a given network topology, model checking is used to exhaustively evaluate protocol abstractions against an attacker attempting to corrupt the route discovery process. Additionally, topology reduction techniques are developed to reduce computational requirements while maintaining exhaustive analysis results.  相似文献   

6.
Anonymity and authenticated key exchange should be paid much more attention in secure mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as we know, few papers on secure routing protocols have addressed both the anonymity and authenticated key exchange. Therefore, in this paper, we present a new secure anonymous routing protocol with authenticated key exchange for ad hoc networks. In comparison with other previous secure routing protocols, our proposed protocol not only provides the anonymity to the route from the source to the destination, but also integrates the authenticated key exchange into the routing algorithm.  相似文献   

7.
Mobile ad hoc network(MANET)is a centerless packet radio network which does not use fixed infrastructure.It has recently received tremendous attention due to its capabilities of self-configuration and self-maintenance.However,attenuation and interference caused by node mobility and wireless channel sharing weaken the stability of communication links.A mathematical exploring model for the next hop has been established based on the optimal exploring theory.The negative impact of wireless routes discontinuity ...  相似文献   

8.
It is a challenge to make the routes quickly adapt to the changed network topology when nodes fail in a wireless ad hoc network. In this paper, we propose an adaptive routing protocol, which groups the network nodes into virtual nodes according to their data transfer capabilities and creates virtual-node-based routes. The protocol can accommodate the routes to node failures by adaptively updating the virtual nodes and just-in-time using available nodes during data transmission. The simulations indicate that the proposed protocol can keep the routes failed-node-free when the available virtual node members cover the failed nodes scattering area.  相似文献   

9.
It is a challenge to make the routes quickly adapt to the changed network topology when nodes fail in a wireless ad hoc network. In this paper, we propose an adaptive routing protocol, which groups the network nodes into virtual nodes according to their data transfer capabilities and creates virtual-node-based routes. The protocol can accommodate the routes to node failures by adaptively pdating the virtual nodes and just-in-time using available nodes during data transmission. The simulations indicate that the proposed protocol can keep the routes failed-node-freewhen the available virtual node members cover the failed nodes scattering area.  相似文献   

10.
An ad hoc network can be envisioned as a collection of mobile routers, each equipped with a wireless transceiver, which are free to move about arbitrarily. In ad hoc wireless networks, even if two nodes are outside the wireless transmission range of each other, they may still be able to communicate in multiple hops using other intermediate nodes. However, the dynamics of these networks, as a consequence of mobility and disconnection of mobile hosts, pose a number of problems in designing routing schemes for effective communication between any pair of source and destination. In this paper, a stability-based unicast routing mechanism, that considers both link affinity and path stability in order to find out a stable route from source to destination, is proposed. It is then extended to support multicast routing as well where only local state information (at source) is utilized for constructing a multicast tree. The performance of the proposed scheme is evaluated on a simulated environment to show that the stability-based scheme provides a unified framework for both unicast and multicast routing and reduces the probability of route error drastically in both the cases.  相似文献   

11.
In this paper, we study how energy-efficient routing at the network layer can be coordinated with sleep scheduling at the link layer to increase network-wide energy efficiency in wireless ad hoc networks. We identify a trade-off between the reduced transmit power at senders with multi-receiver diversity and the increased receive power at forwarders with coordinated sleep scheduling. Moreover, we provide a comprehensive study of how coordinated sleep scheduling affects the energy-efficient routing performance based on a 2-D gird topology and time division multiple access (TDMA) medium access control (MAC). Simulation results demonstrate the effectiveness of the integrated routing and sleep scheduling, significant impact of coordinated sleep scheduling on the energy-efficient routing performance, and relationship between networking conditions (in terms of the traffic load and node density) and overall system performance achieved by different energy-efficient routing protocols.  相似文献   

12.
In mobile ad hoc network (MANET), on-demand routing protocols are proposed for establishing a route in a distributed manner only when a source host originates a data packet addressed to the destination host. In source-based routing (SBR) protocols, route discovery usually raises a large number of request packets for exploring the current state of the network, but it also performs the collection of useful information for future routing decisions. How to store and manage this collected information in the limited size of cache in order to improve routing performance is still an open issue in the development of an SBR scheme. This paper proposes a novel hash caching mechanism and distributed hashing routing methods to store, utilize, and manage the cached routes in order to improve cache capacity, routing performance, and network throughput. The experimental results indicate that the proposed mechanism offers high cache capacity, efficient route discovery, and good throughput for the MANET.  相似文献   

13.
We extend dominating-set-based routing to networks with unidirectional links. Specifically, an efficient localized algorithm for determining a dominating and absorbant set of vertices (mobile hosts) is given and this set can be easily updated when the network topology changes dynamically. A host /spl nu/ is called a dominating neighbor (absorbant neighbor) of another host u if there is a directed edge from /spl nu/ to u (from u to /spl nu/). A subset of vertices is dominating and absorbant if every vertex not in the subset has one dominating neighbor and one absorbant neighbor in the subset. The derived dominating and absorbant set exhibits good locality properties; that is, the change of a node status (dominating/dominated) affects only the status of nodes in the neighborhood. The notion of dominating and absorbant set can also be applied iteratively on the dominating and absorbant set itself, forming a hierarchy of dominating and absorbant sets. The effectiveness of our approach is confirmed and the locality of node status update is verified through simulation.  相似文献   

14.
An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networks.During the route fnding process,the node can dynamically assign transmission power to nodes along the route.The node who has received route request message compares its power with the threshold power value,and then selects a reasonable route according to discriminating algorithms.This algorithm is an efective solution scheme to wireless ad hoc networks through reasonably selected path to reduce network consumption.Simulation results indicate that the proposed protocol can deliver better performances with respect to energy consumption and end-to-end delay.  相似文献   

15.
自组网路由协议综述   总被引:4,自引:0,他引:4  
在分析影响自组网路由协议设计的因素的基础上,对路由协议中的关键技术问题进行了研究和总结,包括路由环路避免、对网络动态性的适应、控制开销、节能问题以及路由协议与定位技术的结合问题。最后指出了目前路由协议研究中存在的问题,如协议需求、协议的评估方法等。  相似文献   

16.
We examine the sensitivity of optimal routing policies in ad hoc wireless networks with respect to estimation errors in channel quality. We consider an ad hoc wireless network where the wireless links from each node to its neighbors are modeled by a probability distribution describing the local broadcast nature of wireless transmissions. These probability distributions are estimated in real-time. We investigate the impact of estimation errors on the performance of a set of proposed routing policies.  相似文献   

17.
18.
In wireless ad hoc networks, energy utilization is perhaps the most important issue, since it corresponds directly to the operational network lifetime. Topology Control (TC) is a well-known energy saving technique which tries to assign transmission ranges of nodes to optimize their energy utilization while keeping the network connected. In current TC schemes, the transmission range of each node is mostly accounted as the exclusive estimator for its energy consumption, while ignoring the amount of data it forwards. Especially when such schemes are coupled with the popular shortest path routing, they usually create a highly-loaded area at the center of the network in which nodes deplete their battery very quickly. In this paper, we introduce efficient strategies that take both load and range into account to handle this problem. We first consider the simple strategy in which a proper transmission range is computed for all nodes of the network to optimize their energy utilization under the presence of the shortest path routing. Inspiring from the results of this strategy, we then propose our combined strategy and argue that a combination of circular paths and shortest paths could result in a much better solution. We also provide detailed analytical models to measure the forwarding load and interference of nodes and then corroborate them with simulation results. Using the combined strategy, the achieved improvement in terms of traffic load, interference, and maximum energy consumption is about 50%, as compared with the simple strategy.  相似文献   

19.
Chun-Ta Li 《Information Sciences》2011,181(23):5333-5347
More attention should be paid to anonymous routing protocols in secure wireless ad hoc networks. However, as far as we know, only a few papers on secure routing protocols have addressed both issues of anonymity and efficiency. Most recent protocols adopted public key Infrastructure (PKI) solutions to ensure the anonymity and security of route constructing mechanisms. Since PKI solution requires huge and expensive infrastructure with complex computations and the resource constraints of small ad hoc devices; a two-layer authentication protocol with anonymous routing (TAPAR) is proposed in this paper. TAPAR does not adopt public key computations to provide secure and anonymous communications between source and destination nodes over wireless ad hoc networks. Moreover, TAPAR accomplishes mutual authentication, session key agreement, and forward secrecy among communicating nodes; along with integration of non-PKI techniques into the routing protocol allowing the source node to anonymously interact with the destination node through a number of intermediate nodes. Without adopting PKI en/decryptions, our proposed TAPAR can be efficiently implemented on small ad hoc devices while at least reducing the computational overhead of participating nodes in TAPAR by 21.75%. Our protocol is certainly favorable when compared with other related protocols.  相似文献   

20.
《Computer Communications》2001,24(3-4):353-363
In an ad hoc network, each host assumes the role of a router and relays packets toward final destinations. This paper studies efficient routing mechanisms for packet flooding in ad hoc wireless networks. Because a packet is broadcast to all neighboring nodes, the optimality criteria of wireless network routing are different from that of the wired network routing. We show that the minimum cost flooding tree problem is similar to MCDS (Minimum Connected Dominating Set) problem and prove the NP-completeness of the minimum cost flooding tree problem. Then, we propose two flooding methods: self-pruning and dominant pruning. Both methods utilize the neighbor information to reduce redundant transmissions. Performance analysis shows that both methods perform significantly better than the blind flooding. Especially, dominant pruning performs close to the practically achievable best performance limit.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号