For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle en...For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols.展开更多
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although...Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.展开更多
Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobilit...Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobility in aviation communication networks, a hop-by-hop network coding algorithm based on ad hoc networks was proposed. Compared with COPE-like network coding algorithms, the proposed algorithm does not require overhearing from other nodes, which meets confidentiality requirements of aviation communication networks. Meanwhile, it does save resource consumption and promise less processing delay. To analyze the performance of the network coding algorithm in scalable networks with different traffic models, a typical network was built in a network simulator, through which receiving accuracy rate and receiving delay were both examined.The simulation results indicate that, by virtue of network coding, the proposed algorithm works well and improves performance significantly. More specifically, it has better performance in enhancing receiving accuracy rate and reducing receiving delay, as compared with any of the traditional networks without coding. It was applied to both symmetric and asymmetric traffic flows and, in particular, it achieves much better performance when the network scale becomes larger. Therefore, this algorithm has great potentials in large-scale multi-hop aviation communication networks.展开更多
全面介绍了当前群组移动模型的研究进展,分析了不同群组移动模型的特点和应用范围,针时现有移动模型不能有效反映群组节点运动过程中行为特性的不足,提出了基于Gibbs分布模拟退火的群组移动(Gibbs sampler based simulated annealing gr...全面介绍了当前群组移动模型的研究进展,分析了不同群组移动模型的特点和应用范围,针时现有移动模型不能有效反映群组节点运动过程中行为特性的不足,提出了基于Gibbs分布模拟退火的群组移动(Gibbs sampler based simulated annealing group mobility,简称GGM)模型,并与目前广泛采用的参考点群组移动(reference point group mobility,简称RPGM)模型进行仿真比较,分析了两种群组移动模型对网络协议性能评价与网络拓扑的影响.仿真结果表明,通过选择不同的Gibbs势函数,GGM模型能够有效描述群体运动过程中的聚集行为、分散行为和列队行为;模型比较的结果也表明,不同的移动模型对Ad Hoc网络协议性能具有不同的影响.展开更多
Ad hoc网络节点能量受限的路由协议的研究是目前的一个热点,IETF的MANET小组提出的几种经典的路由协议,属于最短路由,即最小跳数路由,没有考虑能量因素。由于Ad hoc网络中的节点是由电池供电,整个网络是一个能量受限系统,如何节省节点...Ad hoc网络节点能量受限的路由协议的研究是目前的一个热点,IETF的MANET小组提出的几种经典的路由协议,属于最短路由,即最小跳数路由,没有考虑能量因素。由于Ad hoc网络中的节点是由电池供电,整个网络是一个能量受限系统,如何节省节点的能量,尽可能延长网络的可操控时间成为衡量路由协议性能的重要指标。目前针对这几种路由协议基于节点能量约束的评估很少。基于移动模型,该文以能量消耗程度为指标,对Ad hoc 4种典型的路由协议在不同的运动场景下进行了比较系统的仿真研究,得出了一些有益的结论,为进一步研究基于能耗的Ad hoc网络路由协议提供一些参考。展开更多
无线 Ad hoc 网络容量是评估网络性能的重要参数,它的研究以改善网络性能为出发点,提供构建优质网络的理论依据。本文总结了无线 Ad hoc 网络容量的研究成果,根据方法的不同将其分为两类:一类是采用不同的方法推导网络容量的极限;另一...无线 Ad hoc 网络容量是评估网络性能的重要参数,它的研究以改善网络性能为出发点,提供构建优质网络的理论依据。本文总结了无线 Ad hoc 网络容量的研究成果,根据方法的不同将其分为两类:一类是采用不同的方法推导网络容量的极限;另一类是采用不同的假设条件和业务类型推导网络容量的极限。在此基础上,我们对无线 Adhoc 网络容量研究的发展趋势做了预测。展开更多
为了提高无线Ad-hoc网络数据传输可靠性,在分析了信任模型类型及可能受到的攻击的基础上,结合D-S证据理论提出一种基于节点工作状态的信任模型DCTM(Trust Model based on Dempster-Shafer theory and Collaborative Filtering recommend...为了提高无线Ad-hoc网络数据传输可靠性,在分析了信任模型类型及可能受到的攻击的基础上,结合D-S证据理论提出一种基于节点工作状态的信任模型DCTM(Trust Model based on Dempster-Shafer theory and Collaborative Filtering recommendation),在信任模型中,考虑了节点间的直接信任与推荐信任,并通过协同过滤技术计算节点之间的相似度,结合交易密度因子设定了推荐权重,以减少恶意推荐等信任攻击.改进AODV路由算法,设计了可信路由,通过仿真实验验证了该算法能有效避免不信任节点,提供更为可靠的数据传输服务.展开更多
文摘For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols.
基金the National Natural Science Foundation of China (60773049)the Natural Science Foundationof Jiangsu Province (BK2007086)the Fundamental Research Project of Natural Science in Colleges of Jiangsu Province(07KJB520016).
文摘Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.
基金Project(61175110)supported by the National Natural Science Foundation of ChinaProject(2012CB316305)supported by National Basic Research Program of ChinaProject(2011ZX02101-004)supported by National S&T Major Projects of China
文摘Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobility in aviation communication networks, a hop-by-hop network coding algorithm based on ad hoc networks was proposed. Compared with COPE-like network coding algorithms, the proposed algorithm does not require overhearing from other nodes, which meets confidentiality requirements of aviation communication networks. Meanwhile, it does save resource consumption and promise less processing delay. To analyze the performance of the network coding algorithm in scalable networks with different traffic models, a typical network was built in a network simulator, through which receiving accuracy rate and receiving delay were both examined.The simulation results indicate that, by virtue of network coding, the proposed algorithm works well and improves performance significantly. More specifically, it has better performance in enhancing receiving accuracy rate and reducing receiving delay, as compared with any of the traditional networks without coding. It was applied to both symmetric and asymmetric traffic flows and, in particular, it achieves much better performance when the network scale becomes larger. Therefore, this algorithm has great potentials in large-scale multi-hop aviation communication networks.
基金Supported by the National Basic Research Program of China under Grant No.G5130801(国家重点基础研究发展计划(973))the Postgraduate lnnovation Foundation ofthe National University of Defense Technology of China under Grant No.B080304(国防科学技术大学优秀研究生创新基金)
文摘全面介绍了当前群组移动模型的研究进展,分析了不同群组移动模型的特点和应用范围,针时现有移动模型不能有效反映群组节点运动过程中行为特性的不足,提出了基于Gibbs分布模拟退火的群组移动(Gibbs sampler based simulated annealing group mobility,简称GGM)模型,并与目前广泛采用的参考点群组移动(reference point group mobility,简称RPGM)模型进行仿真比较,分析了两种群组移动模型对网络协议性能评价与网络拓扑的影响.仿真结果表明,通过选择不同的Gibbs势函数,GGM模型能够有效描述群体运动过程中的聚集行为、分散行为和列队行为;模型比较的结果也表明,不同的移动模型对Ad Hoc网络协议性能具有不同的影响.
文摘无线 Ad hoc 网络容量是评估网络性能的重要参数,它的研究以改善网络性能为出发点,提供构建优质网络的理论依据。本文总结了无线 Ad hoc 网络容量的研究成果,根据方法的不同将其分为两类:一类是采用不同的方法推导网络容量的极限;另一类是采用不同的假设条件和业务类型推导网络容量的极限。在此基础上,我们对无线 Adhoc 网络容量研究的发展趋势做了预测。
文摘为了提高无线Ad-hoc网络数据传输可靠性,在分析了信任模型类型及可能受到的攻击的基础上,结合D-S证据理论提出一种基于节点工作状态的信任模型DCTM(Trust Model based on Dempster-Shafer theory and Collaborative Filtering recommendation),在信任模型中,考虑了节点间的直接信任与推荐信任,并通过协同过滤技术计算节点之间的相似度,结合交易密度因子设定了推荐权重,以减少恶意推荐等信任攻击.改进AODV路由算法,设计了可信路由,通过仿真实验验证了该算法能有效避免不信任节点,提供更为可靠的数据传输服务.