期刊文献+

基于干扰动态性建模的MHWN多路径路由协议 被引量:5

MHWN multipath routing protocol based on dynamic interference modeling
原文传递
导出
摘要 作为无线网络实现普适性的有效架构,多跳无线网络(MHWN)逐渐成为一个研究热点.但MHWN固有的媒质开放性、多跳性,干扰威胁也更加严峻.如何实现干扰条件下的可靠组网,成为MHWN研究的棘手课题.传统的方法多是基于干扰存在二元性来实现路由的优化选择,但这忽略了实际无线网络中,干扰往往是动态的.为此,本文提出了一种基于干扰动态性建模并融合多路径的路由算法.协议通过网络干扰动态性检测,利用干扰活跃度值获取遭受干扰最小路径,从而可有效提高网络抗干扰能力并极大降低源重路由次数.文中对协议的实现方法给出了详细的阐述,并基于网络仿真软件NS2对协议进行了较全面仿真比较,结果表明该方法相比已有协议不仅具有更好的路由抗干扰性能,同时在多业务流的冲突碰撞中也有很好路由优化能力. In recent years, framework based on MHWN (multi-hop wireless network) mechanism has attracted much attention for its unique role in last one-mile communications. However, the natural characteristics of MHWN, such as broadcast nature of wireless medium and multi-hop network architecture, make malicious at- tackers more active. In jammed situations, how to ensure robust network service becomes a critical problem in MHWN. To meet this challenge, novel interference avoidance mechanisms are well concerned in this paper. And a proactive multipath routing protocol based on measuring interference dynamic is proposed. The proposed mech- anisms can achieve higher robust anti-jamming paths and less reroute request times in MHWN by the routing Interference Activity (IA) metric. Based on NS2, simulations are completed thoroughly. The results show that the proposed mechanisms can provide more robust anti-jamming paths for MHWN than other protocols.
出处 《中国科学:信息科学》 CSCD 2013年第11期1483-1495,共13页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:61201216) 中国博士后科学基金(批准号:201150M1512) 国防科技重点实验室基金(批准号:9140C020302110C0206)资助项目
关键词 多跳无线网络 干扰 动态性 多路径 路由 MHWN (multi-hop wireless network), interference, dynamics, multi-path, routing
  • 相关文献

参考文献19

  • 1Jain K, Padhye J, Padmanabhan V N, et al. Impact of interference on multi-hop wireless network performance. WirelN etw, 2005, 11: 471-487.
  • 2Bayraktaroglu E, King C, Liu X, et al. On the performance of IEEE 802.11 under jamming. In: Proceedings of 27thI EEE INFOCOM. Piscataway: IEEE, 2008. 1265-1273.
  • 3Stevenson C, Chouinard G, Lei Z, et al. IEEE 802.22: the first cognitive radio wireless regional area network standard.I EEE Commun Mag, 2009, 47: 130-138.
  • 4Ko Y B, Shankarkumar V, Vaidya N H. Medium access control protocols using directional antennas in ad hoc networks.I n: Proceedings of 19th IEEE INFOCOM. Piscataway: IEEE, 2000. 13-21.
  • 5Li Y, Man H. Analysis of multipath routing for ad hoc networks using directional antennas. In: Proceedigns of IEEE 60th Vehicular Technology Conference. Piscataway: IEEE, 2004. 2759-2763.
  • 6Han B, Grace D. Using cognitive interference routing to avoid congested areas in wireless ad hoc networks. In:P roceedings of 18th International Conference on Computer Communications and Networks. Piscataway: IEEE, 2009.1-6.
  • 7He H, Wang J, Zhu J, et al. Optimal policy of cross-layer design for channel access and transmission rate ad-aptationi n cognitive radio networks. EURASIP J Adv Signal Proc, 2010, 2010: 5.
  • 8王杉,庄钊文,王建新,魏急波.抗干扰自组网路由中定向波束的调度及性能研究[J].自动化学报,2007,33(7):775-777. 被引量:2
  • 9Xu W, Trappe W, Zhang Y, et al. The feasibility of launching and detecting jamming attacks in wireless networks. In:P roceedings of 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York: ACM,2005. 46-57.
  • 10Yu M, Leung K K, Malvankar A. A dynamic clustering and energy efficient routing technique for sensor net-works.I EEE Trans Wirel Commun, 2007, 6: 3069-3079.

二级参考文献22

  • 1Jain K, Padhye J, Padmanabhan V N. Impact of Interference on MultiHop Wireless Network Performance[J]. Wireless Networks,2005,11(4):471487.
  • 2Wood A D, Stankovic J A, Zhou G. Deejam: Defeating EnergyEfficient Jamming[C]∥Proc of IEEE SECON’07, 2007:6069.
  • 3Xu W,Trappe W,Zhang Y,et al.The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks[C]∥Proc of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2005:4657.
  • 4Xu W, Trappe W, Zhang Y. Channel Surfing: Defending Wireless Sensor Networks from Interference[C]∥Proc of the 6th International Conference on Information Processing in Sensor Networks, 2007:499508.
  • 5Awerbuch B, Richa A, Scheideler C.A JammingResistant MAC Protocol for SingleHop Wireless Networks[C]∥Proc of Principles of Distributed Computing, 2008:4554.
  • 6Jiang S,Xue Y. Optimal Wireless Network Restoration under Jamming Attack[C]∥Proc of IEEE ICCCN, 2009:16.
  • 7Lee S J, Gerla M. AODVBR: Backup Routing in Ad Hoc Networks[C]∥Proc of IEEE Wireless Communications and Networking Conference, 2000:13111316.
  • 8Marina M K,Das S R. OnDemand Multipath Distance Vector Routing for Ad Hoc Networks[C]∥Proc of the International Conference for Network Protocols, 2006:1423.
  • 9Kan B Q, Fan J h. On minimizing MHWN Delay Based on MultiHop Activity Estimation[C]∥Proc of Intl Conf on Wireless Communications, Networking and Mobile Computing, 2011:14.
  • 10Noubir G,Lin G. LowPower DoS Attacks in Data Wireless Lans and Countermeasures[J].ACM SIGMOBILE Mobile Computing Communication Review, 2003,7(3):2930.

共引文献1

同被引文献12

  • 1Xu Wenyuan,Trappe Wade,Zhang Yanyong,et al. Thefeasibility of launching and detecting jamming attacksin wireless networks [A]. Proceedings of the 6 th ACMInternational Symposium on Mobile Ad Hoc Networkingand Computing ( MobiHoc05 ) [ C ]. Urbana-Cham-paign,US: ACM ,2005:46-57.
  • 2Timothy X Brown, Jesse E James, Amita Sethi.Jamming and sensing of encrypted wireless ad hocnetworks [ A ]. Proc of the 7 th ACM International Sympon Mobile Ad Hoc Networking and Computing(MobiHoc 2006) [ C ]. New York, US: ACM Press,2006:120-130.
  • 3Li Mingy an, Iordanis Koutsopoulos,Radha Poovendran.Optimal jamming attacks and network defense policiesin wireless sensor networks [ A ]. The 26th IEEEInternational Conference on Computer Communications(Infocom 2007 ) [ C ]. Achorage,US : IEEE,2007 :1307-1315.
  • 4Devi L, Suganthi A. Denial of service attacks inwireless networks : The case of jammers [ J ].International Journal of Computer Science and MobileComputing, 2014,3 (1) : 548-558.
  • 5Hinrich J H, Willkomm D. An empirical study of urban2. 4 GHz RF noise from the perspective of a bodysensor network[ A]. Proceedings of the 2012 Ninth In-ternational Conference on Wearable and ImplantableBody Sensor Networks( BSN) [ C] . London,UK: IEEEComputer Society, 2012 : 73 -78.
  • 6Zhang Zhiguo, Wu Jingqi, Deng Jing, et al. JammingACK attack to wireless networks and a mitigationapproach [ A ] . Proceedings of the 2008 Global Tele-communications of Conference [ C ]. New Orleans, US :IEEE ,2008:1-5.
  • 7Thuente D J, Acharya M. Intelligent jamming inwireless networks with applications to 802. 11B andother Networks [A] . Proc of 2006 IEEE Conference onMilitary Communications[C]. Washing DC,US:IEEE,2006:1075-1081.
  • 8陈林星,曾犠,曹毅.移动AdHoc网络一自组织分组无线网络技术[M].北京:电子工业出版社,2012.
  • 9廖俊,刘耀宗,姜海涛,张宏.基于人工免疫的MANET不端行为检测模型[J].南京理工大学学报,2011,35(5):652-658. 被引量:5
  • 10孙言强,王晓东,周兴铭.无线网络中的干扰攻击[J].软件学报,2012,23(5):1207-1221. 被引量:23

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部