期刊文献+

移动自组网选播路由协议ARAD 被引量:2

ARAD:an anycast routing protocol for mobile ad hoc networks
下载PDF
导出
摘要 针对移动自组(ad hoc)网的特点,提出了一种适合ad hoc移动网络的选播路由协议——ARAD协议。该协议在充分考虑选播路由特点的基础上,将ad hoc按需距离矢量路由(AODV)协议的路由发现机制与动态源路由(DSR)协议的缓存源路由技术相结合,在动态变化的ad hoc网络中实现了一种高效的选播路由。模拟结果表明,在动态的网络环境下,ARAD协议能够取得良好的性能。 According to the features of ad hoc networks, this paper proposes the ARAD protocol, a new anycast routing protocol for mobile ad hoc networks. This protocol combines the route discovery mechanism of the Ad hoc On-de- mand Distance Vector routing (AODV) protocol with the cache technique for source routing of the dynamic source routing (DSR) protocol based on the full consideration of the characteristics of anycase routing, and achieves an effective anycast routing in dynamic ad hoc networks. The simulation results show that the protocol can get good performance in dynamic network environments.
出处 《高技术通讯》 CAS CSCD 北大核心 2013年第3期245-250,共6页 Chinese High Technology Letters
基金 国家科技支撑计划(2007BAH14B00) 国家科技重大专项(2012ZX01045-004-005)资助项目
关键词 移动自组(ad hoc)网 选播 单播 路由协议 ad hoc mobile network, anycast, unicast, routing protocol
  • 相关文献

参考文献9

  • 1Poongkuzhali T, Bharathi V, Vijayakumar F. An opti- mized power reactive routing based on AODV protocol for Mobile Ad-hoc network. In: Proceedings of the Interna- tional Conference on Recent Trends in Information Tech- nology, Chennai, India, 2011. 194-199.
  • 2Zhang Z K, Wang Y. An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks. In: Proceedings of the IEEE 10th International Conference on Trust, Se- curity and Privacy in Computing and Communications, Changsha, China, 2011,1630-1637.
  • 3Jasani H. Quality of Service Evaluations of On Demand Mobile Ad-Hoc Routing Protocols. In: Proceedings of the 5th International Conference on Next Generation Mobile Applications, Services and Technologies, Cardiff, Eng- land, 2011. 123-128.
  • 4Putta C S R, Prasad K B, Ravilla D. Performance of ad hoc network routing protocols in IEEE 802.11. In: Pro- ceedings of the International Conference on Computer and Communication Technology, Allahabad, India, 2010. 371-376.
  • 5Kuppusamy P, Thirunavukkarasu K, Kalaavathi B. A study and comparison of OLSR, AODV and TORA rou- ting protocols in ad hoc networks. In : Proceedings of the 3rd International Conference on Electronics Computer Technology (ICECT), Kanyakumari, India, 2011. 143- 147.
  • 6SreeRangaRaju M N, Mungara J. Performance evaluation of ZRP in adhoc mobile wireless network using Qualnet simulator. IEEE International Symposium on Signal Pro- cessing and Information Technology, 2010, 26(2) : 457- 466.
  • 7Li T S, Zhao Z G. An anycast routing algorithm based on simplified particle swarm optimization and diversity strat- egy. In: Proceedings of the 6th International Conference on Computer Science & Education, Singapore, 2011. 1075-1079.
  • 8Shaikh A, Buysse J, Jaumard B. Anycast Routing for Survivable Optical Grids: Scalable Solution Methods and the Impact of Relocation. IEEE/OSA Journal of Optical Communications and Networking, 2011,3 (9) : 767-779.
  • 9Tan X G. The QoS Routing for Anycast Message. In: Proceedings of the International Conference on Intelli- gence Science and Information Engineering, Wuhan, China, 2011. 41-44.

同被引文献19

  • 1张红斌,杨超,马建峰.基于邻接信任的路由安全评估[J].吉林大学学报(工学版),2009,39(2):440-445. 被引量:3
  • 2Jhaveri R H,Patel S J,Jinwala D C.A novel approach for grayhole and blackhole attacks in mobile ad hoc networks.Advanced Computing & Communication Technologies (ACCT),2012 Second International Conference on.IEEE,2012:556-560.
  • 3Wang S S,Yan K Q,Wang S C.An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network.Computers & electrical Engineering,2010; 36 (1):100-113.
  • 4Bohara B,Sharma V.Analysis and prevention of effects of gray hole attacks on routing protocol in mobile ad-hoc networks.Analysis,2013; 2(6):2468-2472.
  • 5钱聪.移动自组织网络中基于信任和能量综合评价的路由机制研究.武汉:华中科技大学,2012.
  • 6Su M Y.Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems.Computer Communications,2011; 34(1):107-117.
  • 7Su M Y.A study of deploying intrusion detection systems in mobile ad hoc networks.Proceedings of the World Congress on Engineering,2012; 2(7):978-988.
  • 8Wang W,Zeng G,Yao J,et al.Towards reliable self-clustering mobile ad hoc networks.Computers & Electrical Engineering,2012; 38(3):551-562.
  • 9Yu Y,Guo L,Wang X,et al.Routing security scheme based on reputation evaluation in hierarchical ad hoc networks.Computer Networks,2010; 54(9):1460-1469.
  • 10雷建栋.地理位置信息辅助的AODV路由协议[J].火力与指挥控制,2013(21):59-62.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部