排序方式: 共有98条查询结果,搜索用时 31 毫秒
51.
52.
Routing is the most basic and essential operation of any ad hoc network. A mobile ad hoc network presents many challenges, because of the severe resource limitations such as dynamic and varying topology, lack of centralized control, insecure medium, and limited battery power, among others. Therefore, optimization and conservation is the key to success of any ad hoc network operation. In this paper, we propose and define 2 new metrics for ad hoc networks: bandwidth utilization ratio and load index. These metrics can be used as an indicator to measure and monitor the network usability and to improve its efficiency by efficient load distribution. They can be used to predict the additional load that can be accommodated in the network, without causing any congestion or overflows. We also propose a new load balancing routing scheme for ad hoc networks, called efficient load balancing method. This method tries to offset the load on different paths using load index as a metric. Load index is defined as a measure of a node's degree of involvement in the message routing process, which is indicative of its load. To make this algorithm efficient, we limit our routes to a few efficient ones only. This number of alternate routes used, out of the pool of all available routes, is defined as degree of distribution. Simulation results adequately prove the efficiency of proposed method, vis‐à‐vis 2 other load balancing approaches, and these are verified statistically at 99% confidence interval. A p × q factorial design is used to verify that simulation results are the actual measurements and not due to some unknown errors. 相似文献
53.
54.
Quality‐of‐service‐aware cluster‐based service discovery approach for mobile ad hoc networks
下载免费PDF全文
![点击此处可从《International Journal of Communication Systems》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Hassan Artail Haidar Safa Paul Salameh Salim Chedrawi Pierre El Khoury 《International Journal of Communication Systems》2014,27(11):3107-3127
This paper presents a quality‐of‐service (QoS) distributed service discovery approach for mobile ad hoc network environments. The approach builds upon a clustered topology, where the clusterhead (CH) is assigned additional roles having to do with maintaining a directory of services in the network and aggregating and computing QoS scores about service providers (SPs) from requesting nodes (RNs) and the providers themselves. To reduce the amount of overhead traffic, the design makes extensive use of piggybacking for relaying and updating the CHs with QoS scores. A mobile device that is interested in a certain service submits a request to its CH, which uses cached QoS data to return a ranked list of SPs that offer the type of requested service. On the basis of its interaction with the SP, the device sends the CH next time it makes a request a score reflecting its perception of the SP's QoS. Over time, the CH develops robust QoS data that it uses to help devices obtain the best available service. Theoretical analysis and experimental evaluation based on simulations prove the advantages of the proposed system and the effectiveness of its operations. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
55.
56.
Qing Chen Zubair Md. Fadlullah Xiaodong Lin Nei Kato 《Journal of Network and Computer Applications》2011,34(6):1827-1835
Wireless mobile ad hoc networks (MANETs) do not have centralized infrastructure and it is difficult to provide authentication services. In this paper, we apply Certificate Graph (CG) and identity-based security in designing an admission control scheme for MANETs. We first use one-hop message exchange to build CG at each mobile node. Then we select maximum clique nodes in CG as distributed Certificate Authorities (CAs). We use identity-based key agreement from pairings to protect each session. Then we prove the security by Canetti–Krawczyk (CK) model-based analysis. We demonstrate the effectiveness and feasibility of our protocol through computer simulations. 相似文献
57.
Connectivity and communication interference are two key aspects in mobile ad-hoc networks (MANETs). This paper proposes a process algebraic model targeted at the analysis of both such aspects. The framework includes a probabilistic process calculus and a suite of analytical techniques based on a probabilistic observational congruence and an interference-sensitive preorder. The former enables the verification of behavioural equivalences; the latter makes it possible to evaluate the interference level of behaviourally equivalent networks. The result is a comprehensive and effective framework for the behavioural analysis and a quantitative assessment of interference for wireless networks in the presence of node mobility. We show our techniques at work on two realistic case studies. 相似文献
58.
59.
An efficient solution is proposed in this article to determine the best reliable route and to prolong the lifetime of the mobile Ad-hoc networks (MANETs). In the proposed solution, the route discovery process of the Ad-hoc on-demand distance vector routing protocol (AODV) has been modified using a novel delayed rebroadcast scheme. It combines the shortest route selection criterion of AODV with the real network status including the wireless link quality, the remaining power capacity, as well as the traffic load at each node. Simulation results show that the proposed scheme can significantly extend the network lifetime and provide fewer packet losses than the conventional AODV protocol. 相似文献
60.
Mobile ad hoc networks (MANETs) play an important role in connecting devices in pervasive environments. MANETs provide inexpensive and versatile communication, yet several challenges remain in addressing their security. So far, numerous schemes have been proposed for secure routing and intrusion detection, with only simulations to validate them; little work exists, in implementing such schemes on small handheld devices. In this paper, we present our approach of securing a MANET using a threshold-based intrusion detection system and a secure routing protocol. We present a proof-of-concept implementation of our IDS deployed on handheld devices and in a MANET testbed connected by a secure version of AODV over IPv6 – SecAODV. While the IDS helps detect attacks on data traffic, SecAODV incorporates security features of non-repudiation and authentication, without relying on the availability of a Certificate Authority (CA) or a Key Distribution Center (KDC). We present the design and implementation details of our system, the practical considerations involved, and how these mechanisms can be used to detect and thwart malicious attacks. 相似文献