期刊文献+

无线自组网中的信息传输问题及模拟试验研究 被引量:1

Research on information transmission issues in ad hoc network and its simulation experiments
下载PDF
导出
摘要 在用户群体之间高效传输信息是组建无线自组网的基本目标之一。对无线自组网中的信息传输问题进行了阐述和分析,说明了现有的机制及其面临的问题。针对3种信息传播模型,在不同的网络场景下模拟了无线自组网中节点之间的信息传输情况,包括传染模型、信息连锁反应模型和多跳信息传播模型。模拟结果表明,无线自组网的信息传输能力与信息传播模型、信息的流行性和节点运动模型密切相关。 Effective information share and transmission among users is one of primary objects in constructing wireless sell-organizing network (WSON). Issues on information transmission in WSON were expounded and analyzed at first. Available schemes and existent problems were outlined. Information transmission among mobile nodes in WSON was simulated in various experiment scenarios in detail under the three kinds of models, including infection model, information chain-reacting model and multi-hop information transmission model. Simulation results show that information transmission capability is dependent on information transmission models, popularity of information and mobility models o[ nodes.
出处 《桂林电子科技大学学报》 2011年第5期345-349,共5页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(61072043)
关键词 无线自组网 信息传输 传染模型 信息连锁反应模型 多跳传播模型 wireless self-organizing network information transmission infection model information chain-reactingmodel multi-hop transmission model
  • 相关文献

参考文献8

二级参考文献47

  • 1马晓雷,刘元安,高锦春,沈雅琴.无线Ad Hoc网络功率控制透明传输调度算法的研究[J].北京邮电大学学报,2005,28(5):42-46. 被引量:2
  • 2陈敏,杜才明.委托代理理论述评[J].中国农业银行武汉培训学院学报,2006(6):76-78. 被引量:20
  • 3LIMA M,SANTOS A,PUJOLLE G. A Survey of Survivability in Mobile Ad Hoc Networks[J]. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2009,11(1): 66-77.
  • 4YANG H, LUO H. Security in mobile Ad Hoc networks: challenges and solutions[J]. IEEE Wireless Communications Magazine, 2004,11(1):38-47.
  • 5MAAKI S. Security Fundamentals in Ad Hoe Networking. Proeeedings of the Helsinki University of Technology[M]. Seminar on Internetworking-Ad Hoe Networks, Spring, 2000 : 70-77.
  • 6SMITH B, MURPHY S. Securing distance-vector routing protocols[C]//Proceedings of Network and Distributed System Security. Los Alamitos, CA, 1999 : 85-92.
  • 7XUE Y, NAHRSTEDT K. Providing fault-tolerant ad hoc routing service in adversarial environmentsl[J]. Wireless Personal Communications, 2004,29(3) :367-388.
  • 8RAMANUJAN R, KUDIG S. Techniques for Intrusion Resistant Ad Hoc Routing Algorithms TIARA[M]. CA, USA:DISCEX03, 2003: 98-100.
  • 9PAPADIMITRATOS P, HAAS Z. Secure data transmission in mobile Ad Hoe networks[C]//Proc. 2003 ACM workshop on wireless security. NY, USA,2003: 41-50.
  • 10JOSHI D, NAMUDURI K. Secure, redundant, and fully distributed key management scheme for mobile ad hoe networks: an analysis[J]. Journal of Wireless Communications and Networking, 2005(4) :579-589.

共引文献13

同被引文献8

  • 1Saukh O,Sauter R,Gauger M,et al. On boundary recog- nition without location information in wireless sensor networks[C]//2008 International Conference on Infor- mation Processing in Sensor Networks. New York: As- sociation for Computing Machinery,2008.
  • 2Fang Q,Gao J,Guibas L. Locatingand bypassing rou- ting holes in sensor networks[C]//Proc Mobile Net- works and Applications. Hongkong:Institute of Electri- cal and Electronics Engineers Inc,2006:187-200.
  • 3Funke S, Klein C. Hole detection or:how much geome-try hides in connectivity? [C]//Proc 22nd ACM Sym- pos. Computational Geometry. Sedona, AZ: Association for Computing Machinery,2006:377-385.
  • 4Wang Y, Gao J, Mitchell S ]3. Boundary recognition in sensor networks by topological methods[C]//12th An- nual international Conference on Mobile Computing and Networking (MobiCom'06). Los angeles, USA: Associa- tion for Computing Machinery,2006.
  • 5Fekete S P, Kr611er A, Pfisterer D, et al. Neighborhood- based topology recognition in sensor networks [C]// Proc Algosensors, Springer LNCS. Stevenage United Kingdom: Institution of Engineering and Technology, 2004,3121 : 123-136.
  • 6肖坤,古天龙,常亮.一种Ad Hoc网络可生存性度量方法[J].桂林电子科技大学学报,2011,31(3):213-216. 被引量:2
  • 7李小武,邵剑飞,廖秀玲.一种基于K-means的分布式聚类算法[J].桂林电子科技大学学报,2011,31(6):460-463. 被引量:7
  • 8雷月菊,陈光喜.基于模糊决策理论的主观信任评价模型[J].桂林电子科技大学学报,2011,31(6):491-493. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部