首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 890 毫秒
1.

One fundamental issue in cognitive radio mobile ad hoc networks (CR-MANETs) is the selection of a stable path between any source and destination node to reduce the end-to-end delay and energy consumption arisen from route reconstruction. In this way, we analyse the link stability by calculating the link life time that is dependent on failures caused by secondary users’ (SUs) movements and primary users’ (PUs) activities. We propose a joint stability-based routing, link scheduling and channel assignment (SRLC) algorithm in CR-MANETs, which is benefited from considering the link life time, amount of interference imposed on PUs and energy consumption. The proposed algorithm selects a frequency channel/time slot in a way that channel utilization and previous behaviours of SUs and PUs, are taken into account. In the proposed SRLC, the concept of load balancing is applied by avoiding to route packets through SUs with insufficient energy. The effectiveness of the proposed algorithm is verified by evaluating the aggregate interference energy, end-to-end delay, goodput and the energy usage per packet transmission under three different scenarios. The results show our proposed scheme finds better routes compared to the recently proposed joint stable routing and channel assignment protocol.

  相似文献   

2.
Pu  Cong  Lim  Sunho  Chae  Jinseok  Jung  Byungkwan 《Wireless Networks》2019,25(4):1669-1683

Mobile ad hoc network (MANET) is vulnerable to security attacks because of the shared radio medium and lack of centralized coordination. Since most multi-hop routing protocols implicitly assume cooperative routing and are not originally designed for security attacks, MANET has been challenged by diverse denial-of-service attacks that often interfere with the protocol and interrupt on-going communication. In this paper, we propose an explore-based active detection scheme, called EBAD, to efficiently mitigate the routing misbehaviors in MANETs running with dynamic source routing. The basic idea is that a source node broadcasts a route request packet with a fictitious destination node to lure potential malicious nodes to reply a fake route reply packet. If the source node receives the fake route reply packet or an intermediate node cannot decrypt the received route reply packet, the routing misbehavior can be detected. We also propose a route expiry timer based approach to reduce the effect of route cache pollution because of the fake route reply. We present a simple analytical model of the EBAD and its numerical result in terms of detection rate. We also conduct extensive simulation experiments using the OMNeT++ for performance evaluation and comparison with the existing schemes, CBDS and 2ACK. The simulation results show that the proposed countermeasure can not only improve the detection rate and packet delivery ratio but also can reduce the energy consumption and detection latency.

  相似文献   

3.
刘婧  任品毅  薛少丽  张超 《通信学报》2011,32(11):183-190
针对认知无线网络中主用户行为将导致频谱瞬时变化而影响路由稳定性的问题,提出了一种基于主用户行为的路由和信道联合分配算法。该算法通过采用呼叫模型对主用户行为建模,并根据动态源路由协议的路由寻找机制,在目的节点等待多个路由请求分组后选择受主用户行为影响最小的路由,然后沿着所选定路径的反方向传送路由回复分组并完成信道分配。理论分析证明了算法中的链路平均持续时间期望与主用户活动概率成反比且具有与网络节点数成正比的计算复杂度。仿真结果表明,该算法具有比Gymkhana路由方案更高的分组投递率和更低的平均分组时延。  相似文献   

4.
In order to establish a route supporting multi-constrained quality of service(QoS), increase network throughput and reduce network energy consumption, an improved ant colony-based multi-constrained QoS energy-saving routing algorithm(IAMQER) is proposed. The ant colony algorithm, as one of the available heuristic algorithms, is used to find the optimal route from source node to destination node. The proposed IAMQER algorithm, which is based on the analysis of local node information such as node queue length, node forwarding number of data packets and node residual energy, balances the relationship between the network throughput and the energy consumption, thus improving the performance of network in multi-constrained QoS routing. Simulation results show that this IAMQER algorithm can find the QoS route that reduce average energy consumption and improves network packet delivery ratio under the end-to-end delay and packet loss ratio constraints.  相似文献   

5.
Ubarhande  S. D.  Doye  D. D.  Nalwade  P. S. 《Wireless Networks》2019,25(4):1867-1874

Mobile ad hoc network is open medium and infrastructure-less network. Mobile ad hoc network is susceptible to various security attacks such as, black hole attack, gray hole attack, bad mouthing attack, sybil attack and worm hole attack due to open medium, infrastructure-less features and lack of in-built security. In black hole attack and gray hole attack, attacker falsely sends route reply and dropped data packets received from source node. Due to these attacks, performance of mobile ad hoc network decreases. This paper proposes a time stamp-based algorithm which is an enhanced version of existing IDSNAODV algorithm. Proposed algorithm modifies existing palling process to validate identity of observer nodes using a time stamp-based approach. Based on defined set of rules and recorded activities report, source node decides the nature of target node. The performance of proposed algorithm is evaluated using the network simulator. The proposed algorithm shows improved performance for packet delivery ratio, throughput and routing overhead as compared to existing algorithm.

  相似文献   

6.
In this paper, a distributed traffic-balancing routing algorithm is proposed for multi-sink wireless sensor networks that effectively distributes traffic from sources to sinks. Each node has a gradient field that is used to decide on a neighbor node to reach a sink. The node’s gradient index contains (1) the distance cost from a source to a respective sink, and (2) traffic information from neighboring nodes. The proposed algorithm considers the traffic being faced by surrounding neighbors before forwarding packets to any sink using gradient search for routing and providing a balance between optimal paths and possible congestion on routes toward those sinks. The key objective of this work is to achieve traffic-balancing by detecting congested areas along the route and distributing packets along paths that have idle and underloaded nodes. Extensive simulations conducted to evaluate the performance of the proposed scheme indicate that it effectively reduces the overall packet delay, energy consumption and improves the packet delivery ratio under heavy traffic.  相似文献   

7.
肖航  陈向东 《通信技术》2012,45(7):86-89
针对传统的AODV路由协议采用扩展环路由搜索算法导致的路由开销较大,没有考虑节点能量的问题,提出一种新的算法。此算法在路由请求过程中能够根据以前搜索中得到的信息,让多余的节点处于静默状态,不参与下一次的路由发现。并且综合考虑节点能量,尽可能地让低能量节点处于静默状态,从而达到均衡节点能量使用的目的。仿真结果表明改进算法有效延长了网络生存时间,提高了包投递率。  相似文献   

8.

The idea of Smart City incorporates a few ideas being technology, economy, governance, people, management, and infrastructure. This implies a Smart City can have distinctive communication needs. Wireless technologies, for example, WiFi, Zig Bee, Bluetooth, WiMax, 4G or LTE have introduced themselves as a solution for the communication in Smart City activities. Nonetheless, as the majority of them utilize unlicensed interference, coexistence and bands issues are increasing. So to solve the problem IoT is used in smart cities. This paper addresses the issues of both resource allocation and routing to propose an energy efficient, congestion aware resource allocation and routing protocol (ECRR) for IoT network based on hybrid optimization techniques. The first contribution of proposed ECRR technique is to employ the data clustering and metaheuristic algorithm for allocate the large-scale devices and gateways of IoT to reduce the total congestion between them. The second contribution is to propose a queue based swarm optimization algorithm for select a better route for future route based on multiple constraints, which improves the route discovering mechanism. The proposed ECRR technique is implemented in Network Simulator (NS-2) tool and the simulation results are compared with the existing state-of-art techniques in terms of energy consumption, node lifetime, throughput, end-to-end delay, packet delivery ratio and packet overheads.

  相似文献   

9.
This paper proposes a multicast routing algorithm that makes use of multiple node‐disjoint distribution trees for its routing from the source to the multicast group members. The specialty of this scheme is that the different packets of a message between a source and destinations are routed through node‐disjoint paths to provide reliable and secure multicast communication. In this proposed routing scheme the computation of the node‐disjoint path for packet routing is done either at a centralized route moderator or in a distributed fashion at all destinations in order to avoid single point failure. An effective provision is made to enable new members to join the existing multicast trees and to prune leaving members. The performance parameters of the proposed reliable and secure multi‐path routing scheme are studied under various network conditions using GloMoSim. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

10.
This paper proposes urgency-based packet scheduling and routing algorithms to effectively deliver delay-sensitive data over a multi-hop mobile ad hoc networks supporting IEEE 802.11 multi-rate service. First, packet urgency, node urgency, and route urgency are defined on the basis of the end-to-end delay requirement. Based on these urgency metrics and the estimated transmission delay of each packet by Kalman filter, the proposed packet scheduling algorithm determines the transmission order and drop policy to minimize the node urgency without unnecessary packet drop, and the proposed routing algorithm establishes a route to minimize the derivative of route urgency in order to maximize the number of packets delivered within the required end-to-end delay. Finally, experimental results are presented to evaluate the performance of the proposed joint working algorithms.  相似文献   

11.
Yi LU  Mengying XU  Jie ZHOU 《通信学报》2020,41(5):141-149
Aiming at the multi-constraint routing problem,a mathematical model was designed,and an improved immune clonal shuffled frog leaping algorithm (IICSFLA) was proposed,which combined immune operator with traditional SFLA.Under the constraints of bandwidth,delay,packet loss rate,delay jitter and energy cost,total energy cost from the source node to the terminal node was computed.The proposed algorithm was used to find an optimal route with minimum energy cost.In the simulation,the performance of IICSFLA with adaptive genetic algorithm and adaptive ant colony optimization algorithm was compared.Experimental results show that IICSFLA solves the problem of multi-constraints QoS unicast routing optimization.The proposed algorithm avoids local optimum and effectively reduces energy loss of data on the transmission path in comparison with adaptive genetic algorithm and adaptive ant colony optimization algorithm.  相似文献   

12.

Extensive use of sensor and actuator networks in many real-life applications introduced several new performance metrics at the node and network level. Since wireless sensor nodes have significant battery constraints, therefore, energy efficiency, as well as network lifetime, are among the most significant performance metrics to measure the effectiveness of given network architecture. This work investigates the performance of an event-based data delivery model using a multipath routing scheme for a wireless sensor network with multiple sink nodes. This routing algorithm follows a sink initiated route discovery process with the location information of the source nodes already known to the sink nodes. It also considers communication link costs before making decisions for packet forwarding. Carried out simulation compares the network performance of a wireless sensor network with a single sink, dual sink, and multi sink networking approaches. Based on a series of simulation experiments, the lifetime aware multipath routing approach is found appropriate for increasing the lifetime of sensor nodes significantly when compared to other similar routing schemes. However, energy-efficient packet forwarding is a major concern of this work; other network performance metrics like delay, average packet latency, and packet delivery ratio are also taken into the account.

  相似文献   

13.
Xia  Maojin  Wang  Qingshan  Wang  Qi  Cao  Cheng  Wang  Lifang  Guo  Hao 《Wireless Personal Communications》2017,96(4):5687-5704

Delay tolerant networks can not maintain end-to-end connectivity. Thus the routing is one of the critical issues. As we known, the two-level community model including the small community and the big community is proposed for the first time. In the same small community, any two member nodes are friends with each other. And in the same big community which is constructed of some small communities, any two communities have some pairs of friend nodes between them. Based on this model, a two-level community-based routing (TLCR) algorithm is presented in delay tolerant networks. In TLCR, according to the location of packet holder including inside the small community of destination node, inside of the big community and outside of the small community of destination node, and outside of the big community of destination node, the different packet forwarding strategies are investigated. The number of relay nodes selected by a packet holder is decreasing with the holder’s location from inside of the small community of destination node to outside of the big community of destination node. The probability of the source node successfully delivers the packet to the destination node and the copies number corresponding with the above three locations are analyzed, respectively. The simulation results show that TLCR not only improves the delivery ratio but also greatly reduces the resource cost.

  相似文献   

14.

The vehicular delay-tolerant network is the real-life application based area of Delay tolerant network where communication takes place using vehicular nodes and roadside units. The topology used in vehicular networks is highly dynamic by architecture due to the use of moving vehicular nodes. It operates in such a scenario where a direct path between source and destination remains absent on the most piece of the time. In case of non-existence of connected path vehicular delay-tolerant network works opportunistically and uses the same store, carry, and forward paradigm as Delay Tolerant Network. However, the routing protocols designed for vehicular delay-tolerant network faces crucial challenges like inadequate relay node, incomplete data transfer, a large number of packet drop, and uncertain delivery time. In this research paper, we propose a novel routing strategy for the vehicular delay-tolerant network. The proposed routing strategy selects efficient vehicular relay node for complete packet transfer and intelligently reduces the packet drop for timely packet delivery. We implement the proposed routing strategy in the ONE simulator; the ONE simulator provides an opportunistic environment for nodes. We analyze the performance of the proposed strategy under various simulations results using different parameters. The results show that the proposed strategy outperforms standard routing protocols in terms of considered parameters and provide an efficient solution for the problem of disconnection.

  相似文献   

15.
低开销的MANET网络按需路由协议   总被引:1,自引:0,他引:1  
江国星  易明 《通信学报》2009,30(7):27-35
针对简单泛洪效率低的问题,提出了一个限制洪泛的高效的路由广播算法,通过Euclidean距离来限制路由发现过程中请求分组被转发的次数;研究了减少路由维护开销,并降低路由发现的频率的方法,提出了一个基于节点高度的路由修复与优化算法,该算法使用节点监听来对链路断裂的路由进行修复与优化.基于限制泛洪的高效的路由广播算法和路由修复优化算法,提出了一种新的低开销的MANET网络按需路由协议LOOR(low overhead on-demand routing).仿真结果表明,新协议增强了路由的顽健性,减少了路由跳数,降低了路由发现的频率,提高了数据分组递送率,并显著地降低了路由控制开销.  相似文献   

16.
In this paper, we use fuzzy Petri nets (FPNs) to propose a secure routing protocol in mobile ad hoc network. The proposed method is based on secure ad hoc on‐demand distance vector (SAODV), which is named FPN‐SAODV. In FPN‐SAODV routing protocol, for each packet delivery or firing each transition, a type of bidirectional node‐to‐node fuzzy security verification is conducted that can be carried out with five security threshold levels. This inference uses four fuzzy variables that have been selected to well represent the malicious behaviors of some public attacks in mobile ad hoc network. Furthermore, a through route security verification has been used for selecting the most secure route among each candidate path through source node to destination. Both of these verifications utilize FPN inherent features for their operation. For evaluation purpose, we used the metrics such as packet delivery ratio, end‐to‐end delay, average security level of the nodes, and percentage of true/false detector nodes. These metrics have been used for investigating the inner operation of FPN‐SAODV as determining the proper level of security threshold level in node‐to‐node security verification module. Also, these are used for comparison of FPN‐SAODV performance versus the original AODV. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

17.
This article addresses the problem of route selection in wireless mesh networks (WMNs). The traditional routing metrics adopt packet delivery ratio (PDR) as a representative metric of wireless link quality assessment. However, PDR measured by the broadcast-based probe method is affected by the size, number and transmission rate of probe packets, which influences the metric accuracy. In this paper, improved expected transmission count (iETX), a new routing metric of interference-aware link quality, is proposed for WMNs. Dispensing with traditional broadcast-based probing method, the iETX uses regional physical interference model to obtain PDR. Regional physical interference model is built upon the relationship between signal to interference plus noise ratio (SINR) and PDR, which contributes to the improvement of metric accuracy. The iETX comprehensively considers the effects of interference and link quality and minimizes the expected number of packet transmissions required for successful delivery, which helps find a path with minimum interference and high throughput. Simulation shows that the proposed metric can significantly improve the network performance.  相似文献   

18.
袁永琼 《电子科技》2013,26(5):135-138
提出了无线自组织网络中一种拥塞意识的多径路由算法。该算法在路由发现过程中,综合节点的队列长度和路径跳数来动态确定路由请求消息的转发概率,可以在保证路由请求消息有一定送达率的条件下,降低路由开销;在路径选择和流量分配过程中,综合考虑节点的队列长度和路径质量作为路由度量,发现流量高吞吐量低拥塞路径,并基于该度量值进行流量分配。仿真结果显示,所提出的多径路由算法能有效提高网络性能。  相似文献   

19.
基于缓存旁路和本地修复的多跳网络路由重建机制   总被引:1,自引:0,他引:1  
该文针对多跳网络中现有AODV和AODV-BR按需路由算法的弊端,提出了基于缓存旁路和本地修复的AODV-CL路由重建机制。该机制利用空闲时间监听无线信道中传输的所有数据包和路由控制信令,用于维护有效的邻居节点列表及本地路由缓存,有效降低了周期性HELLO消息带来的信令负担,并增加了可用路由信息。中间节点在发现断链时,尝试采用局部修复,尽量避免由源节点广播RREQ消息发现路由。根据本地路由缓存及邻居节点的路由信息,实现了快速的路由发现及修复,能有效降低路由控制信令开销及丢包率。  相似文献   

20.
In mobile ad hoc networks (MANETs), the packet loss can be caused either by link failure or by node failure. Moreover, the techniques for selecting the bypass route and avoiding congestion in the bypass route are rarely handled. To overcome these, in this paper, we propose an adaptive reliable and congestion control routing protocol to resolve congestion and route errors using bypass route selection in MANETs. The multiple paths are constructed. Among which, the shortest paths are found for efficient data transmission. The congestion is detected on the basis of utilization and capacity of link and paths. When a source node detects congestion on a link along the path, it distributes traffic over alternative paths by considering the path availability threshold and using a traffic splitting function. If a node cannot resolve the congestion, it signals its neighbors using the congestion indication bit. By using simulation, we show that that the proposed protocol is reliable and achieves more throughput with reduced packet drops and overhead.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号