期刊文献+
共找到785篇文章
< 1 2 40 >
每页显示 20 50 100
Component based ant routing protocols analysis over mobile ad hoc networks 被引量:1
1
作者 曲大鹏 王兴伟 黄敏 《Journal of Central South University》 SCIE EI CAS 2013年第9期2378-2387,共10页
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.... To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized. 展开更多
关键词 routing protocol mobile ad hoc networks ant colony optimization route discovery route maintenance data forwarding
在线阅读 下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
2
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc network(MANET).
在线阅读 下载PDF
A quality of service routing protocol based on mobility prediction in mobile ad hoc networks 被引量:5
3
作者 王建新 邓曙光 +1 位作者 陈松乔 陈建二 《Journal of Central South University of Technology》 2003年第1期53-57,共5页
A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the ... A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the protocol as follows. (1) Each node just broadcasts its own information, so the packet is very small and can get to the destination in a very short time. (2) When another path is built for the same QoS requirements, the original path has higher priority. (3) The update messages are reduced by using mobility prediction. (4) Data packets carry the information of link change using piggyback, which is helpful for forecasting the link status more accurately. (5) When source node gets Resource Reserve and reconnect packets at the same time, it selects reconnect packet over Resource Reserve packet. The results of simulation show that the protocol has good network performance with low control overload, and efficiently supports transmitting multimedia with QoS requirements in mobile ad hoc networks. 展开更多
关键词 mobile ad hoc networks PREDICTION QoS routing
在线阅读 下载PDF
Distributed QoS multicast routing protocol in ad hoc networks 被引量:1
4
作者 Sun Baolin Li Layuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期692-698,共7页
Quality of service (QoS) routing and multicasting protocols in ad hoc networks are face with the challenge of delivering data to destinations through multihop routes in the presence of node movements and topology ch... Quality of service (QoS) routing and multicasting protocols in ad hoc networks are face with the challenge of delivering data to destinations through multihop routes in the presence of node movements and topology changes. The multicast routing problem with multiple QoS constraints is discussed, which may deal with the delay, bandwidth and cost metrics, and describes a network model for researching the ad hoc networks QoS multicast routing problem. It presents a distributed QoS multicast routing protocol (DQMRP). The proof of correctness and complenty analysis of the DQMRP are also given. Simulation results show that the multicast tree optimized by DQMRP is better than other protocols and is fitter for the network situations with frequently changed status and the realtime multimedia application. It is an available approach to multicast routing decision with multiple QoS constraints. 展开更多
关键词 ad hoc network multicast routing routing protocol QoS.
在线阅读 下载PDF
Reliable adaptive multicast protocol in wireless Ad hoc networks 被引量:3
5
作者 Sun Baolin Li Layuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期187-192,共6页
In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multi... In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoe network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoe network environment. In this paler, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multieast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoe network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmsission. 展开更多
关键词 muhicast multicast protocol reliable muhicast wireless ad hoc networks.
在线阅读 下载PDF
Joint channel assignment and cross-layer routing protocol for multi-radio multi-channel Ad Hoc networks 被引量:2
6
作者 Yang Lu Junming Guan +1 位作者 Zhen Wei Qilin Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第6期1095-1102,共8页
To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer ro... To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer routing (JCACR), is presented. Firstly, this paper introduces a new concept called channel utilization percentage (CUP), which is for measuring the contention level of different channels in a node’s neighborhood, and deduces its optimal value for determining whether a channel is overloaded or not. Then, a metric parameter named channel selection metric (CSM) is designed, which actually reffects not only the channel status but also corresponding node’s capacity to seize it. JCACR evaluates channel assignment by CSM, performs a local optimization by assigning each node a channel with the smaller CSM value, and changes the working channel dynamically when the channel is overloaded. Therefore, the network load balancing can be achieved. In addition, simulation shows that, when compared with the protocol of weighted cumulative expected transfer time (WCETT), the new protocol can improve the network throughput and reduce the end-to-end average delay with fewer overheads. 展开更多
关键词 ad hoc network multi-radio multi-channel channel assignment routing protocol channel utilization percentage.
在线阅读 下载PDF
Link reliability based hybrid routing for tactical mobile ad hoc network 被引量:2
7
作者 Xie Xiaochuan Wei Gang +2 位作者 Wu Keping Wang Gang Jia Shilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期259-267,共9页
Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network, without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the network... Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network, without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the network performance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol. 展开更多
关键词 tactical mobile ad hoc networks hybrid routing link reliability edge weight.
在线阅读 下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:7
8
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
在线阅读 下载PDF
A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks 被引量:2
9
作者 胡志刚 马好 +1 位作者 王国军 廖麟 《Journal of Central South University of Technology》 EI 2005年第6期714-719,共6页
A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structure... A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad boc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol. 展开更多
关键词 mobile ad hoe network fuzzy Petri net certainty factor ad hoc on demand distance vector routing algorithm
在线阅读 下载PDF
On-demand multicast routing protocol based on node classification in MANET 被引量:2
10
作者 邓霞 孙利民 +2 位作者 王建新 罗玉宏 陈建二 《Journal of Central South University of Technology》 EI 2006年第2期190-195,共6页
An improved on-demand multicast routing protocol(ODMRP), node classification on-demand multicast routing protocol(NC-ODMRP), which is based on node classification in mobile ad hoc networks was proposed. NC-ODMRP class... An improved on-demand multicast routing protocol(ODMRP), node classification on-demand multicast routing protocol(NC-ODMRP), which is based on node classification in mobile ad hoc networks was proposed. NC-ODMRP classifies nodes into such three categories as ordinary node, forwarding group(FG) node, neighbor node of FG node according to their history forwarding information. The categories are distinguished with different weights by a weight table in the nodes. NC-ODMRP chooses the node with the highest weight as an FG node during the setup of forwarding group, which reduces a lot of redundant FG nodes by sharing more FG nodes between different sender and receiver pairs. The simulation results show that NC-ODMRP can reduce more than 20% FG number of ODMRP, thus enhances nearly 14% data forwarding efficiency and 12% energy consumption efficiency when the number of multicast senders is more than 5. 展开更多
关键词 mobile ad hoc networks multicast forwarding group(FG) node classification
在线阅读 下载PDF
Novel multipath routing protocol integrated with forward error correction in MANET 被引量:1
11
作者 安辉耀 卢锡城 +1 位作者 彭伟 王阳元 《Journal of Central South University of Technology》 EI 2006年第2期196-199,共4页
In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of p... In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of packet fragmenting and forward error correction encoding into multipath routing. The scheme works as follows: adding a certain redundancy into the original packets; fragmenting the resulting packets into exclusive blocks of the same size; encoding with the forward error correction technique, and then sending them to the destination node. When the receiving end receives a certain amount of information blocks, the original information will be recovered even with partial loss. The performance of the scheme was evaluated using OPNET modeler. The experimental results show that with the method the average transmission delay is decreased by 20% and the transmission reliability is increased by 30%. 展开更多
关键词 mobile ad hoc networks multipath routing forward error correction encoding reliable transmission
在线阅读 下载PDF
一种均衡流量的Mobile Ad Hoc网络能量路由选择方法 被引量:6
12
作者 余旭涛 毕光国 张在琛 《电子与信息学报》 EI CSCD 北大核心 2004年第12期1965-1971,共7页
由于Ad hoc网络是能量受限网络,因此如何提高Ad hoc网络的能量效率问题非常重要.该文提出了一种新的路由选择度量,该度量把节点链路层的拥塞度与节点当前剩余能量综合在一起考虑,使得网络中能量消耗和网络负荷能更加均匀地分布,提高了... 由于Ad hoc网络是能量受限网络,因此如何提高Ad hoc网络的能量效率问题非常重要.该文提出了一种新的路由选择度量,该度量把节点链路层的拥塞度与节点当前剩余能量综合在一起考虑,使得网络中能量消耗和网络负荷能更加均匀地分布,提高了网络的连通性,增加了网络的吞吐量.仿真结果表明,该度量对于不同规模的网络,其吞吐量均有不同程度的提高. 展开更多
关键词 移动自组织网络 能量 路由 度量 媒体接入控制
在线阅读 下载PDF
Flooding attack and defence in Ad hoc networks 被引量:5
13
作者 Yi Ping Hou Yafei +2 位作者 Zhong Yiping Zhang Shiyong Dai Zhoulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期410-416,共7页
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T... Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently. 展开更多
关键词 computer networks SECURITY mobile ad hoe networks routing protocol denial of service ad hoc flooding attack.
在线阅读 下载PDF
Virtual reality mobility model for wireless ad hoc networks 被引量:1
14
作者 Yu Ziyue Gong Bo He Xingui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期819-826,共8页
For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle en... For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols. 展开更多
关键词 wireless ad hoc networks computer simulation network protocols mobility models
在线阅读 下载PDF
按需式ad hoc移动网络路由协议的研究进展 被引量:39
15
作者 臧婉瑜 于勐 +1 位作者 谢立 孙钟秀 《计算机学报》 EI CSCD 北大核心 2002年第10期1009-1017,共9页
Ad hoc移动网络是一种完全由移动主机构成的网络 .网络拓扑易变 ,带宽、能源有限是 ad hoc移动网络的主要特点 .针对这些特点 ,目前设计的 ad hoc路由协议大多采用按需查找方式 .该文介绍了这方面研究的最新进展 ,对几种典型的按需路由... Ad hoc移动网络是一种完全由移动主机构成的网络 .网络拓扑易变 ,带宽、能源有限是 ad hoc移动网络的主要特点 .针对这些特点 ,目前设计的 ad hoc路由协议大多采用按需查找方式 .该文介绍了这方面研究的最新进展 ,对几种典型的按需路由协议进行了说明、分析和综合比较 .文中分析了目前协议存在的一些问题并提出了相应的改进方法 .最后指出了下一步研究方向 . 展开更多
关键词 按需式ad hoc移动网络 路由协议 移动通信 预先路由 网络拓扑结构
在线阅读 下载PDF
基于节点空闲度的自适应移动Ad Hoc网络路由协议 被引量:23
16
作者 郭嘉丰 张信明 +1 位作者 谢飞 陈国良 《软件学报》 EI CSCD 北大核心 2005年第5期960-969,共10页
节点可以自由、自主地进入网络拓扑并且无须基础网络设施的特性,使得移动Ad hoc网络被广泛应用于诸如灾难救援、战场等多种环境中.传统的Ad hoc路由协议主要是基于“最短路径”来考虑,会在网络中形成局部的“热点区域”而影响网络的性能... 节点可以自由、自主地进入网络拓扑并且无须基础网络设施的特性,使得移动Ad hoc网络被广泛应用于诸如灾难救援、战场等多种环境中.传统的Ad hoc路由协议主要是基于“最短路径”来考虑,会在网络中形成局部的“热点区域”而影响网络的性能.对此,提出了一个新的参数“节点空闲度(leisure degree)”,用来体现节点当前的传输状态.基于这个参数,联合了介质访问控制(medium access control,简称MAC)层和网络层来进行跨层设计,提出了一种新的基于“节点空闲度”的自适应路由协议LDAR(leisure degree adaptive routing),采用启发式的路由选择机制,有效地实现了拥塞控制和负载分担,提高了移动Ad hoc网络的性能.通过模拟实验,结果显示了LDAR协议在静态网络和动态网络的环境下,都有比DSR协议更好的性能. 展开更多
关键词 跨层设计 启发式 自适应 路由协议 移动ad hoc网络
在线阅读 下载PDF
移动Ad Hoc网络中基于链路稳定性预测的组播路由协议 被引量:36
17
作者 夏辉 贾智平 +1 位作者 张志勇 Edwin H-M Sha 《计算机学报》 EI CSCD 北大核心 2013年第5期926-936,共11页
节点的随机移动性导致了移动自组织网络拓扑的动态变化,进而增加了重路由的频率,降低了网络通信性能.选择稳定性较高的路径进行路由,能够有效地降低重路由的频率,延长路由的生存时间.基于接收到的数据分组的信号强度,文中提出一种新颖... 节点的随机移动性导致了移动自组织网络拓扑的动态变化,进而增加了重路由的频率,降低了网络通信性能.选择稳定性较高的路径进行路由,能够有效地降低重路由的频率,延长路由的生存时间.基于接收到的数据分组的信号强度,文中提出一种新颖的链路稳定性预测模型,并将其应用于传统组播路由协议中.仿真结果验证了预测机制的有效性,扩展协议LSPMR(Link Stability Prediction-based Multicast Routing Protocol)能够显著地提高分组投递率,降低分组端到端平均传输延时,且控制开销较小. 展开更多
关键词 移动自组织网络 稳定路径 信号强度 组播路由协议 分组投递率
在线阅读 下载PDF
移动AdHoc网络路由协议性能仿真研究 被引量:14
18
作者 张勖 程胜 +1 位作者 冯美玉 丁炜 《计算机工程》 EI CAS CSCD 北大核心 2005年第5期60-62,84,共4页
移动adhoc网络路由协议主要分为表驱动和按需驱动两大类。不同于以往对某一协议的性能仿真,通过在通用环境中对两类典型协议(adhoc按需距离向量协议、动态源路由协议和无线路由协议)的性能进行横向间的比较和分析,得出了各类协议在不同... 移动adhoc网络路由协议主要分为表驱动和按需驱动两大类。不同于以往对某一协议的性能仿真,通过在通用环境中对两类典型协议(adhoc按需距离向量协议、动态源路由协议和无线路由协议)的性能进行横向间的比较和分析,得出了各类协议在不同规模的移动adhoc网络中的适用性定量结果及彼此间差别。 展开更多
关键词 移动ad hoc网络 路由协议 性能分析
在线阅读 下载PDF
无线Ad hoc网络及其研究难点 被引量:34
19
作者 肖永康 山秀明 任勇 《电信科学》 北大核心 2002年第6期12-14,共3页
无线Adhoc网络作为没有基础设施的网络 ,在军事和民用方面具有广阔的应用前景 ,是目前网络研究中的热点问题。本文对无线Adhoc网络进行了详细的论述 。
关键词 无线ad hoc网络 通信网 传感器网络 路由协议 MAC协议
在线阅读 下载PDF
Ad Hoc网络QoS多播路由协议 被引量:48
20
作者 孙宝林 李腊元 《计算机学报》 EI CSCD 北大核心 2004年第10期1402-1407,共6页
随着高性能网络、移动网络及Internet的不断发展 ,具有QoS约束的多播路由技术已成为网络及分布式系统领域的一个重要研究课题 .该文研讨了AdHoc网络中具有QoS约束的多播路由问题 ,其中主要包含延迟、带宽、代价等QoS约束 .文中描述了一... 随着高性能网络、移动网络及Internet的不断发展 ,具有QoS约束的多播路由技术已成为网络及分布式系统领域的一个重要研究课题 .该文研讨了AdHoc网络中具有QoS约束的多播路由问题 ,其中主要包含延迟、带宽、代价等QoS约束 .文中描述了一种适应于研究AdHoc网络QoS多播路由的网络模型 ,提出了AdHoc网络中一种具有QoS约束的多播路由协议 (QMRP) .文中给出了该协议的正确性证明和复杂性分析 .仿真实验结果表明 ,该协议较其它协议更适合于网络状态变化比较频繁的环境以及实时多媒体应用 ,优化了多播树的代价 .QMRP为AdHoc网络QoS约束多播路由提供了一种新的有效途径 . 展开更多
关键词 ad hoc网络 多播路由协议 QOS路由 QMRP 移动节点
在线阅读 下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部