首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 546 毫秒
1.
无线媒体访问控制协议通常使用分布式竞争机制来共享无线信道。通过对IEEE 802.11协议的分布式协调功能机制进行修改,提出一种改进的退避算法,可实现对网络中的违规行为节点的有效检测,并通过惩罚机制加以纠正。仿真结果表明,该方法能够更有效地检测出无线网络中的违规行为,提高整个网络的吞吐量。  相似文献   

2.
无线媒体访问控制协议通常使用分布式竞争机制来共享无线信道。通过对IEEE802.11协议的分布式协调功能机制进行修改,提出一种改进的退避算法,可实现对网络中的违规行为节点的有效检测,并通过惩罚机制加以纠正。仿真结果表明,该方法能够更有效地检测出无线网络中的违规行为,提高整个网络的吞吐量。  相似文献   

3.
无线媒体访问控制(MAC)协议通常使用分布式竞争机制来共享无线信道,但在动态和开放的网络环境中,部分违规节点会有意识地抢占信道以获取更多的信道资源.为此,通过对IEEE802.11协议的DCF 机制进行修改,提出一种改进的退避算法,可实现对网络中违规行为节点的有效检测,并通过惩罚机制加以纠正.仿真结果表明,该方法能够更有效地检测出无线网络中的违规行为,提高整个网络的吞吐量.  相似文献   

4.
首次将802.11e的接入机制放入多跳环境中进行仿真分析和定量研究。提出一种新的多跳环境下802.11e网络模型,结合M/G/1/K排队模型,定量分析在隐藏终端影响下802.11e网络的MAC层吞吐率、MAC时延和帧丢失率,研究802.11e在多跳环境下性能表现的内在原因。经过仿真实验结果与数值分析结果的对比,验证了分析模型的准确性;通过有(无)隐藏终端影响下MAC层性能的对比分析,指出了802.11e在多跳无线网络中支持QoS的局限性:受隐藏终端的影响,802.11e对不同接入等级的业务提供QoS区分的性能明显降级。因而有必要研究隐藏终端问题的解决方案,提高802.11e在多跳环境下的性能。  相似文献   

5.
首次将802.11e的接入机制放入多跳环境中进行仿真分析和定量研究。提出一种新的多跳环境下802.11e网络模型,结合M/G/1/K排队模型,定量分析在隐藏终端影响下802.11e网络的MAC层吞吐率、MAC时延和帧丢失率,研究802.11e在多跳环境下性能表现的内在原因。经过仿真实验结果与数值分析结果的对比,验证了分析模型的准确性;通过有(无)隐藏终端影响下MAC层性能的对比分析,指出了802.11e在多跳无线网络中支持QoS的局限性:受隐藏终端的影响,802.11e对不同接入等级的业务提供QoS区分的性能明显降级。因而有必要研究隐藏终端问题的解决方案,提高802.11e在多跳环境下的性能。  相似文献   

6.
Routing is a must for networks that do not have a fixed point-to-point infrastructure, such as in an ad hoc wireless network that offers unrestricted mobility. A source node in such a network can communicate with a distant destination node after finding a route, relying on the intermediate nodes to transfer the packets. However, some intermediate nodes might act selfishly and drop packets for other nodes in order to save their own battery power. In this paper, we propose an algorithm to find selfish nodes and deal with them, using a modified Dynamic Source Routing (DSR) protocol, that we call Efficient Secure Dynamic Source Routing (ESDSR). Our results show an increase in the packet delivery ratio in a network containing selfish/unreliable nodes when we compare DSR with our protocol.  相似文献   

7.
Cognitive MAC protocols are designed to efficiently utilize the scarce spectral resources without affecting the performance characteristics of primary users. The use of spectrum opportunities can often require stochastic approaches due to difficulty in predicting their appearance. Infrastructure based coordinated access techniques are not viable for many applications and spectrum bands, especially in the case of wireless local area and sensor networks. In this article, we describe CogMAC, a decentralized cognitive MAC protocol, which is based on the multichannel preamble reservation scheme. The protocol dynamically selects an available communication channel using a distributed channel selection scheme and allows nodes to be completely asynchronous to each other. CogMAC does not require a common control channel or a cooperative infrastructure. The MAC design addresses practical issues such as network dynamics and traffic awareness. We have carried out the performance evaluation of our CogMAC protocol on Wireless Open Access Research Platform (WARP) SDR testbed. Experimental results indicate that our protocol is able to achieve reliable data communication by opportunistically utilizing the available spectrum holes even in harshly interfering environments.  相似文献   

8.
一种适用于无线传感器网络的功率控制MAC协议   总被引:17,自引:1,他引:17  
李方敏  徐文君  高超 《软件学报》2007,18(5):1080-1091
功率控制技术通过减少节点的发射功率来降低能耗,但节点间不对称的发射功率会增加网络的冲突概率并降低吞吐量.根据实际环境中的节点部署情况,引入了基于Pareto分布的系统模型.研究了传感器网络中功率控制技术在节省能量方面的性能,提出了一种基于SMAC(sensor-MAC)可适用于无线传感器网络的功率控制MAC(media access control)协议.此协议使用功率控制调度算法选择最优相邻节点,使网络中节点的拓扑连接得到优化,在保证网络连通性的同时,降低通信的冲突率,扩大网络的吞吐量.信息的传递以最优功率发射,并使通信节点具有反作用冲突节点的能力,从而在降低网络能耗的同时保证了节点间通信的公平性.实验仿真结果显示,与现有的几种重要方案相比,新的功率控制MAC协议使网络具有了更大的有效吞吐量及更长的生存时间.  相似文献   

9.
Ad hoc网络无线协议栈的灵活性使节点容易对协议实施篡改以达到非法抢占信道等目的。在对节点MAC层恶意行为分析的基础上,提出基于代理的分布式行为检测机制。仿真表明,该机制能有效检测恶意节点。引入trap确认机制,将检测与网络管理及跨层控制相结合,实现全网范围的攻击检测与控制,降低恶意行为对网络的危害程度,提高无线网络的健壮性。  相似文献   

10.
无线传感器网络有着广泛的应用前景,然而由于传感器节点能量有限,因此传感器网络上运行的协议必须具备能量有效性以获得较长的生命周期.而媒质接入控制子层是节点能量消耗的主要所在,因此无线传感器网络设计的关键问题之一是媒质的接入控制.提出了一种自适应低延迟的节能MAC协议——SEEL协议,根据当前的网络负载自适应地调节竞争窗口的大小,从而减小节点数据传送的碰撞几率和由于碰撞而导致的能量消耗;采用了快速退避机制,减少了节点在退避过程中的空闲监听时间;扩展了RTS/CTS消息机制,可减少节点在每帧活动阶段的时间以及减小数据的延迟,两者都能节约能量的使用.实验结果显示,SEEL协议具有比S-MAC和TEEM协议更好的性能.  相似文献   

11.
MAC协议对于无线传感器网络的能效是至关重要的。针对线性无线传感器网络设计了一个基于中继节点的数据收集MAC协议SLDMAC。源节点向汇聚节点发送数据时,引入节点能耗因子和剩余能量均衡因子两个参数,通过优化这两个参数,选择合适的中间节点进行中继,从而提升网络的性能。实验结果表明:与DMAC协议相比,SLDMAC协议提升了网络的能效和生存周期。  相似文献   

12.
As an extension of wireless ad hoc and sensor networks, wireless mesh networks (WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node’s routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved.  相似文献   

13.
This paper presents a cross-layer design for a reliable video transmission over wireless ad hoc networks based on multichannel MAC protocol with TDMA. First, we conduct a study of the multichannel MAC protocol through Markov chain model. Based on this study, two novel cross-layer modules are adopted for the design of multichannel MAC protocol. First, we adopt maximum latency rate (MLR) as the channel quality metric. Unlike the traditional MAC design based on network allocation vector (NAV), MLR is implemented to provide differentiated traffic so that the channel with smaller MLR time is initiated for higher priority traffic. Second, we adopt two congestion-aware metrics, namely MAC utilization and queue length of MAC layer, to improve the congestion-aware routing protocols with AODV and DSR. These two novel modules allow the proposed MAC protocol design to achieve high performance video transmission over wireless ad hoc networks. Experimental results show that the proposed scheme outperforms the state-of-the-art schemes under multichannel environments in wireless ad hoc networks for as much as 3.6 dB in PSNR. Such significant performance enhancement confirms that the cross-layer approach is very effective for multichannel MAC protocol design.  相似文献   

14.
Many protocol particulars developed for the wireless mesh networks, such as multi-path routing, channel assignment, topology control, assume that a network-wide collaboration is available to establish connections to the network outside. However, the collaboration can be easily discouraged in the presence of selfish behaviors, referred to as free-riding. In this paper, we propose a framework, PReSENt, to promote and make more secure the practices of collaboration among nodes by securing a compensation to the collaboration. When the PReSENt is enabled in wireless mesh networks, a node accumulates credits, an amount quantifying its resource provision when it provides its resource for other nodes. The nodes consuming the resource publish rewards, an amount quantifying their resource usage. The credits are used to guarantee the resource sharing for the provider from the customers in the future, whose amount is proportional to its relative contribution to the network-wide collaboration. The rewards are used to validate their corresponding credits in order to prevent false accumulations of the credits in selfish nodes. We formally define the underlying security model of the PReSENt and prove that the PReSENt is secure in the random oracle model. We then implement the PReSENt in J-Sim to illustrate its operational behaviors with respect to correct and secure resource sharing.  相似文献   

15.
基于非合作博弈的无线网络路由机制研究   总被引:10,自引:0,他引:10  
无线网络因其分布性、独立性、移动性等特点,网络性能容易受到自私节点的影响.文中综述了无线网络中因自私节点的存在而带来的一些关键问题,特别对含有自私节点的无线环境中基于非合作博弈理论的路由机制进行了分析和研究.为了解决网络中自私节点的问题,目前研究人员主要提出了两种机制:基于信任度的机制和基于非合作博弈的激励机制.文中对上述两类机制进行了总结和分析,特别地,针对无线自组织网络和无线网状网络中各种激励机制进行了详细的研究.网络编码作为一种有效的技术有助于提高无线网络的性能,文中探讨了基于网络编码的优化埘含有自私节点的无线网络性能的影响.同时还分析了非合作无线网络中节点共谋的问题,最后提出了当前非合作无线网络研究中存在的理论挑战及潜在的热点方向.  相似文献   

16.
Sybil攻击会破坏无线传感器网络的冗余备份、多路径路由等机制,基于INSENS路由协议中的路由建立机制,从事件观测区域到基站建立两条路径,建立第二条路径的同时,利用节点与邻居节点间的距离,以及第一条路径中节点的位置信息检测出Sybil攻击,从而建立绕过Sybil攻击的第二条路径,将事件区域观测到的数据传输给基站。实验表明提出的方法能够使路径有效地绕过Sybil攻击,并且建立的安全路由协议在节点计算量、存储量及能量消耗三方面的性能均低于采用共享密钥进行身份认证的防范和检测Sybil攻击方法中的开销。  相似文献   

17.
在802.11协议中,DCF(Distributed Coordination Function)机制是节点共享无线信道进行数据传输的基本接入方式,为了解决无线网络中隐藏节点问题,使用RTS/CTS机制减少冲突,然而当网络节点数增加时,节点传输的冲突次数亦增加,从而使网络性能明显下降。因此,需要设计新的MAC协议,以适应当前Ad Hoc网络应用的快速发展。在IEEE 802.11的分布式协调功能访问机制(DCF)基础上,本文设计新的节点合作式的网络协议(C-MAC)。C-MAC节点通过控制帧获得本节点2跳内的邻接节点信息,并且根据邻接节点的信息设计调度算法,使节点以轮询的合作方式传输数据,有效地避免冲突。仿真实验表明,在改变节点速率、帧长度、网络节点数等参数情况下,分别以吞吐量、单帧传输时间和公平性为指标,对DCF和C MAC协议进行性能比较。在节点传输速率为11Mbps时,C MAC协议吞吐量比标准DCF最多可增加50%。  相似文献   

18.
如何降低无线传感器网络(WSNs)节点的能耗来延长网络寿命是非常重要的,无线网路的性能主要取决于MAC协议,若要降低节点能耗,合理的设计与改进MAC协议就成为一个关键性问题.主要介绍了无线传感器网络中的ZigBee技术发展与应用,针对相关能耗问题,将延迟测量时间同步(DMTS)算法融入到ZigBee网络中,同时引入了基于S-MAC协议机制的周期性侦听/睡眠、碰撞避免等措施对协议进行改进,通过仿真与基本协议进行比较.仿真结果表明:改进的协议能够有效降低网络节点能耗.  相似文献   

19.
To maximize the available throughput in multi-channel multi-radio wireless mesh networks (WMNs), it is a critical issue to design a channel assignment scheme efficiently utilizing orthogonal channels. However, most channel assignment schemes are vulnerable to the misbehaviors of nodes participating in channel assignment, and existing secure channel assignment schemes do not address all of the vulnerabilities. In this paper, we address the threats to channel assignment in WMNs resulting from node misbehaviors and present a generic verification framework to detect such misbehaviors. We develop a concrete verification scheme based on this framework and an existing distributed channel assignment scheme. We validate our approach by implementing the verification scheme and evaluating it through simulation. The results show that our approach improves misbehavior detection with minimum performance overhead.  相似文献   

20.
Wireless sensor networks (WSNs) are now used in many areas and the interest in this technology continues to increase. Due to the small structure of the processor, the memory of the sensor nodes forming the wireless sensor networks, and as they are operated by a battery, the most important problem appears to be the energy issue. The battery depletion of the sensor nodes randomly deployed in critical areas may negatively interfere with part or all of the network communication and may cause the life of the entire network to terminate. Therefore, many studies have been conducted in the field of energy efficiency. In this study, Base Station Controlled MAC (BSC-MAC), which is a new design of MAC, is recommended. The BSC-MAC protocol presents an adaptive approach for energy efficiency. It determines the nodes on the network as root and source nodes and manages a sleep schedule according to these structures. The simulation of the BSC-MAC protocol was performed with ns-2 and compared to similar protocols, such as adaptive energy efficient MAC (AEEMAC), pattern MAC (P-MAC), and sensor MAC (S-MAC).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号