首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a widespread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our work aims to provide a fully distributed trust model for mobile ad hoc networks. In this paper, we propose a fully distributed public key certificate management system based on trust graphs and threshold cryptography. It permits users to issue public key certificates, and to perform authentication via certificates' chains without any centralized management or trusted authorities. Moreover, thanks to the use of threshold cryptography; our system resists against false public keys certification. We perform an overall evaluation of our proposed approach through simulations. The results indicate out performance of our approach while providing effective security.  相似文献   

2.
3.
Service discovery in mobile ad hoc networks: A field theoretic approach   总被引:1,自引:0,他引:1  
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hence not well suited for mobile ad hoc networks. In this paper, we present a novel decentralized service discovery mechanism for ad hoc networks. The basic idea is to distribute information about available services to the network neighborhood. We achieve this by using the analogy of an electrostatic field: A service is modelled by a (positive) point charge, and service request packets are seen as (negative) test charges which are attracted by the service instances. In our approach, we map the physical model to a mobile ad hoc network in a way where each network element calculates a potential value and routes service requests towards the neighbor with the highest potential, hence towards a service instance. Our approach allows for differentiation of service instances based on their capacity. We define the required protocols and methods which we implemented in a network simulator. Using extensive simulations, we evaluate the performance and robustness of the mechanisms. The results indicate good performance and convergence even in highly mobile environments. We believe that this technique can and should be further exploited, e.g., as a routing protocol in mobile ad hoc networks.  相似文献   

4.
Mobile ad hoc networks are becoming very attractive and useful in many kinds of communication and networking applications. Due to the advantage of numerical analysis, analytical modelling formalisms, such as stochastic Petri nets, queuing networks and stochastic process algebra have been widely used for performance analysis of communication systems. To the best of our knowledge, there is no previous analytical study that analyses the performance of multi-hop ad hoc networks, where mobile nodes move according to a random mobility model in terms of the end-to-end delay and throughput. This work presents a novel analytical framework developed using stochastic reward nets for modelling and analysis of multi-hop ad hoc networks, based on the IEEE 802.11 DCF MAC protocol, where mobile nodes move according to the random waypoint mobility model. The proposed framework is used to analyse the performance of multi-hop ad hoc networks as a function of network parameters such as the transmission range, carrier sensing range, interference range, number of nodes, network area size, packet size, and packet generation rate. The proposed framework is organized into several models to break up the complexity of modelling the complete network, and make it easier to analyse each model as required. The framework is based on the idea of decomposition and fixed point iteration of stochastic reward nets. The proposed models are validated using extensive simulations.  相似文献   

5.
In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one’s own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference call. Furthermore, due to the mobility of nodes in an ad hoc network environment, it is likely that some nodes quit or join during the operation of this conference. To solve these problems, we employ an information exchange table for each participant node in order to manage a secure conference call in an ad hoc network system. In addition, our scheme employs only one cryptographic algorithm of the secret-key system. The extraction of the secure sub-packets associated with each intended receiver is protected on the basis of the Diffie-Hellman key exchange protocol with the trusted public-key exchange. Therefore, the subsequent message recovery is successfully accomplished. This provides a new and feasible solution for a secure conference call in an ad hoc network system.  相似文献   

6.
现有多智能体系统网络研究方法缺乏对局部网络质量与区域性任务需求之间的匹配分析,这将影响任务的完成效率和质量,为此提出一种基于任务需求匹配的网络连通质量控制方法。首先,利用智能体移动状态分析系统网络的间歇连通性;然后,结合任务需求以及系统的间歇网络连通性构建基于主从模式的多智能体子网集合,进而从三个方面评估子网集合的连通质量;最后,提出基于网络连通质量控制的多智能体移动优化模型,用最大的子网集合连通质量表示多智能体网络连通质量,在智能体移动距离和网络连通质量的约束下求解任务完成率最大化的多智能体移动策略,通过该策略形成多智能体网络以执行任务。实验结果表明,该方法可以有效控制网络连通质量,维持任务完成率并提高智能体移动效用。  相似文献   

7.
Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on quality of service. A suitable technique for eliminating this problem is to use multiple backup paths between the source and the destination in the network. Most of the proposed on-demand routing protocols however, build and rely on single route for each data session. Whenever there is a link disconnection on the active route, the routing protocol must perform a path recovery process. This paper proposes an effective and efficient protocol for backup and disjoint path set in an ad hoc wireless network. This protocol converges into a highly reliable path set very fast with no message exchange overhead. The paths selection according to this algorithm is beneficial for mobile ad hoc networks, since it produces a set of backup paths with much higher reliability. Simulations are conducted to evaluate the performance of our algorithm in terms of route numbers in the path set and its reliability. In order to acquire link reliability estimates, we use link expiration time (LET) between each two nodes.In another experiment, we save the LET of entire links in the ad hoc network during a specific time period, then use them as a data base for predicting the probability of proper operation of links.Links reliability obtains from LET. Prediction is done by using a multi-layer perceptron (MLP) network which is trained with error back-propagation error algorithm. Experimental results show that the MLP net can be a good choice to predict the reliability of the links between the mobile nodes with more accuracy.  相似文献   

8.
Network-wide broadcast (simply broadcast) is a frequently used operation in wireless ad hoc networks (WANETs). One promising practical approach for energy-efficient broadcast is to use localized algorithms to minimize the number of nodes involved in the propagation of the broadcast messages. In this context, the minimum forwarding set problem (MFSP) (also known as multipoint relay (MPR) problem) has received a considerable attention in the research community. Even though the general form of the problem is shown to be NP-complete, the complexity of the problem has not been known under the practical application context of ad hoc networks. In this paper, we present a polynomial time algorithm to solve the MFSP for wireless network under unit disk coverage model. We prove the existence of some geometrical properties for the problem and then propose a polynomial time algorithm to build an optimal solution based on these properties. To the best of our knowledge, our algorithm is the first polynomial time solution to the MFSP under the unit disk coverage model. We believe that the work presented in this paper will have an impact on the design and development of new algorithms for several wireless network applications including energy-efficient multicast, broadcast, and topology control protocols for WANETs and sensor networks.  相似文献   

9.
A mobile ad hoc network is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in such network is compulsory to guarantee a widespread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. There is a host of research efforts in trust models framework to securing mobile ad hoc networks. The majority of well-known approaches is based on public-key certificates, and gave birth to miscellaneous trust models ranging from centralized models to web-of-trust and distributed certificate authorities. In this paper, we survey and classify the existing trust models that are based on public-key certificates proposed for mobile ad hoc networks, and then we discuss and compare them with respect to some relevant criteria. Also, we have developed analysis and comparison among trust models using stochastic Petri nets in order to measure the performance of each one with what relates to the certification service availability.  相似文献   

10.
赵承利  宋学军  孙立华 《计算机仿真》2006,23(8):134-137,152
基于最小连通支配集(MCDS)的广播路由方法是一个很好的路由方法,它将路由过程简化到MCDS生成的较小的子网中。然而这一方法没有考虑网络中的节点的多样性和复杂性。针对实际情况中移动自组织网络中节点的复杂性问题,该文提出了一种基于极大权的最小连通支配集(MWMCDS)的有效广播途径。仿真结果表明,它能确保性能强的节点担任网关节点的角色,能更好地协调管理网络中其他的节点,从而保持MCDS的相对稳固性并为全网中的广播路由操作提供一个高效的通信基础。该算法能在保证生成权和极大的连通支配集的同时也确保它的极小性,因此是一种有效的广播路由算法。  相似文献   

11.
Our purpose in this paper is to propose a self-stabilizing protocol for weakly connected dominating set (WCDS) set in a given ad hoc network graph. WCDS is a particular variant of graph domination predicates which play an important role in routing in ad hoc networks. There are many variants of domination problems in bidirectional networks; WCDS is also useful in forming clusters in ad hoc networks. There are many heuristic and distributed algorithms to compute WCDS in network graphs while almost all of them will need complete information about the network topology and most of them are not fault tolerant or mobility tolerant. Self-stabilization is a protocol design paradigm that is especially useful in resource constrained infrastructure-less networks since nodes can make moves based on local knowledge only and yet a global task is accomplished in a fault tolerant manner; it also facilitates for nodes to enter and exit the network freely. There exist self-stabilizing protocols for minimal spanning tree, total domination, and others. We have shown that the paradigm is capable of designing a protocol for WCDS. Our objective is to mathematically prove the correctness and the convergence of the protocol in any worst-case scenario, as is usually done for self-stabilizing protocols for other graph predicates used for ad hoc networks.  相似文献   

12.
移动Ad Hoc网络是一种无需固定通信基础设施、拓扑结构动态变化的无线网络,所以传统的密钥管理机制不能应用于Ad Hoc网络。本文在分析文献[1]中所提出的无线网络随机密钥分发机制的基础上提出了一个改进的基于环形通信的密钥分发协议,并对该协议进行了安全性和性能上的分析。在建立结点之间的安全信道时,该协议引入环状的合作结点集,不仅能够保证安全性和鲁棒性,而且大大降低了通信量。  相似文献   

13.
自组网Random Direction移动模型点空间概率分布的研究   总被引:6,自引:0,他引:6  
在无线自组网的研究中,研究移动模型点的空间概率分布是研究自组网协议的仿真评价和分析移动自组网许多相关特性(例如网络连通性、最小生成树、平均路径长度、网络容量等)的重要的基础问题.针对自组网经常使用的Random Direction移动模型运动节点的空间分布进行了研究,给出了一维及二维情况下运动节点空间概率分布的精确公式.研究结果为基于Random Direction移动模型的证明、仿真与应用提供了严格的理论依据.  相似文献   

14.
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and Internet services. Geographic forwarding becomes a lightweight routing protocol in favor of the scenarios. Traditionally the anonymity of an entity of interest can be achieved by hiding it among a group of other entities with similar characteristics, i.e., an anonymity set. In mobile ad hoc networks, generating and maintaining an anonymity set for any ad hoc node is challenging because of the node mobility, consequently the dynamic network topology. We propose protocols that use the destination position to generate a geographic area called {em anonymity zone (AZ)}. A packet for a destination is delivered to all the nodes in the AZ, which make up the anonymity set. The size of the anonymity set may decrease because nodes are mobile, yet the corresponding anonymity set management is simple. We design techniques to further improve node anonymity and reduce communication overhead. We use analysis and extensive simulation to study the node anonymity and routing performance, and to determine the parameters that most impact the anonymity level that can be achieved by our protocol.  相似文献   

15.
本文简要介绍了车载自组织网络和移动自组织网络中两个典型的路由协议:表驱动路由协议DSDV和按需路由协议AODV;还介绍了一个实用的移动模型,使仿真实验更加接近现实。在Linux下使用网络仿真工具NS2对这两个典型协议进行仿真,并对仿真结果进行分析比较和性能评价,得出:AODV和DSDV协议都不太适用于车辆自组织网络,所以设计适合车辆网路的协议是急需解决的问题。  相似文献   

16.
车载自组织网络(vehicle ad hoc network, VANET)作为智慧城市的重要组成部分,它需要为车辆安全、便捷交通及舒适驾驶提供众多的服务.目前针对车联网中服务发现的研究主要集中在服务发现质量和服务发现延时,但是随着VANET中服务数量和种类的增加,车联网中的信息激增问题变得越来越严重,因此如何按照个性化需求为用户推荐合适的服务成为目前车联网中亟需解决的问题.针对现有车联网中服务选择策略的不足,提出一种基于上下文的车联网服务推荐中间件体系结构,该中间件可以利用车辆丰富的上下文信息和用户的历史服务记录为用户推荐服务.利用离线分析方法,提出一种基于上下文的服务推荐方法,将既符合车辆上下文约束且满足用户偏好的服务推荐给用户.仿真结果表明,中间件推荐的服务合理且符合用户偏好,同时可以降低服务导致的绕路概率.  相似文献   

17.
多跳无线移动Ad Hoc网络路由协议的研究分析   总被引:6,自引:2,他引:6  
无线移动Ad Hoe网络(MANET)作为可移动分布式多跳无线网络,没有预先确定的网络拓扑或网络基础设施以及集中控制.为了在如此的网络中促进通信,路由协议主要用于在节点之间发现路径.Ad Hoe网络路由协议的主要目的是网络拓扑的动态变化、任意两个节点之间建立一个使得通信总费用和带宽消费最少的正确和有效的通信路径.描述了设计移动Ad Hoe网络路由协议所面临的问题以及对它们的评价,详细比较了七种典型无线移动AdHoe网络路由协议的特性和功能,即DSDV,CGSR,WRP,AODV,DSR,TORA和ABR,为进一步的研究提出了新的课题.  相似文献   

18.
An ad hoc network is a self-organized and distributed entity, consisting of n mobile stations (MSs) without the coordination of any centralized access point. Initialization is one of the fundamental tasks to set up an ad hoc network, which involves assigning each of the n MSs a distinct ID number from 1 to n, distributedly. In Nakano et al. (2000), randomized initialization protocols are developed for single-hop ad hoc networks under different conditions. However, carrier sensing has not been utilized and suitable acknowledgment schemes for the algorithms are not developed. Moreover, the assumption taken by Nakano et al. about MSs being able to listen while transmitting is not valid for ad hoc networks. In this context, we describe two algorithms for initializing an ad hoc network with carrier sensing capability. First, a novel acknowledgment scheme is proposed for notifying a transmitting MS whether its transmission is successful during the initialization. Then, two distributed and randomized initialization algorithms are developed and analyzed, under the assumptions of a known and unknown number of users in the network, respectively. Both algorithms are obtained based on optimizing some key parameters to minimize the total time required to complete the initialization. Both theoretical analysis and simulations indicate that the proposed initialization algorithms outperform the existing methods, in the sense that they take much less time to complete the initialization and the average number of transmission attempts before success is much smaller.  相似文献   

19.

Vehicular ad hoc networks (VANETs) are a subset of mobile ad hoc networks that provide communication services between nearby vehicles and also between vehicles and roadside infrastructure. These networks improve road safety and accident prevention and provide entertainment for passengers of vehicles. Due to the characteristics of VANET such as self-organization, dynamic nature and fast-moving vehicles, routing in this network is a considerable challenge. Swarm intelligence algorithms (nature-inspired) such as ant colony optimization (ACO) have been proposed for developing routing protocols in VANETs. In this paper, we propose an enhanced framework for ACO protocol based on fuzzy logic for VANETs. To indicate the effectiveness and performance of our proposed protocol, the network simulator NS-2 is used for simulation. The simulation results demonstrate that our proposed protocol achieves high data packet delivery ratio and low end-to-end delay compared to traditional routing algorithms such as ACO and ad hoc on-demand distance vector (AODV).

  相似文献   

20.
简单地描述了自组网的特点,分析了不相交簇、重叠簇和混合簇,对相关工作进行了比较. 为了保持拓扑稳定,提出了一个基于时间因素的δ-度定义.在此基础上,提出了一个基于δ- 度约束的混合簇的成簇策略(δ-DHCA).混合簇的成簇问题可以归结为找一个最大独立集问题 ,而找一个最大独立集问题是一个著名的NP-难问题.提出了一个近似解法,给出了算法的正 确性证明.解析性能评价和仿真结果均表明,该方法的性能优于最高节点度成簇算法HD和最 低标识符成簇算法LCC.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号