期刊文献+

带有节点状态估计的间断连接无线网络缓存管理策略 被引量:3

Cache Management Mechanism with Node Status Evaluation for Intermittently Connected Wireless Networks
下载PDF
导出
摘要 针对间断连接无线网络中的节点缓存资源有限的问题,该文提出一种适用于间断连接无线网络的缓存管理机制。根据运动过程中所获得的网络状态信息,各个节点以分布式的方式估计给定节点与其他节点直接及间接连接状态、节点服务率以及节点连通强度,动态感知各个节点服务能力的差异,同时预测当前节点成功投递该消息的概率以感知消息的效用值,从而执行缓存管理操作。结果表明,与其他缓存管理机制相比,所提出的缓存管理机制不仅能够有效降低投递开销,同时大幅度地提高了消息成功投递率。 Considering the limited cache resources of nodes in intermittently connected wireless networks, a cache management mechanism is proposed based on node state estimate. The direct and indirect connection status, service rate and connectivity degree between the given nodes can be evaluated in a distributed manner, according to the network state monitored during the movement. Further, the difference of service ability of each node can be determined dynamically. Furthermore, the probability of message successfully delivered by the current node and the utility for the given message can be estimated. Consequently, cache management operations are executed reasonably. Simulation results show that the proposed mechanism does not only constrain the overhead ratio effectively but also enhance the message delivery ratio, compared with other mechanisms.
出处 《电子与信息学报》 EI CSCD 北大核心 2015年第2期443-448,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61371097) 重庆市自然科学重点基金(CSTC2013JJB40001 CSTC2013JJB40006) 重庆市青年科技人才培养计划(CSTC2014KJRC-QNRC40001) 重邮青年自然科学基金(A2012-93)资助课题
关键词 间断连接无线网络 缓存管理 消息效用值 节点服务能力 Intermittently connected wireless network Cache management Message utility Nodeservice ability
  • 相关文献

参考文献12

  • 1Darshana P and Vandana V, Security enhancement of AODVprotocol for mobile Ad hoc network[J]. International Journalof Application or Innovation in Engineering and Management,2013,2(1): 317-321.
  • 2Li Z and Shen H Y. SEDUM: exploiting social networks inutility-based distributed routing for DTNs[J]. IEEETransactions on Computers, 2013,62(1): 83-97.
  • 3Ayub Q, Rashid S, and Zahid M S M. MinHop (MH)transmission strategy to optimized performance of epidemicrouting protocol[J]. Journal of Computer Science andTechnology,2011, 11(9): 35-42.
  • 4Wang Y S, Yang W S, and Wu J. Analysis of ahypercube-based social feature multipath routing in delaytolerant networks[J]. IEEE Transactions on Parallel andDistributed Systems, 2013, 24(9): 1706-1716.
  • 5Rashid S, Hanan A A, Ayub Q, et al" Dynamic predictionbased multi queue (DPMQ) drop policy for probabilisticrouting protocols of delay tolerant network[J]. Journal ofNetwork and Computer Applications,2013, 36(5): 1395-1402.
  • 6Prodhan A T, Das R, Kabir H, et al" TTL based routing inopportunistic networks [J]. Journal of Network and ComputerApplications, 2011,34(5): 1660-1670.
  • 7Pan D R, Lin M, Chen L J, et al.. An improved spray andwait with probability choice routing for opportunisticnetworks[J]. Journal of Networks, 2012, 7(9): 1486-1492.
  • 8Ayub Q, Rashid S, Soperi M Z M, ei ai. Contact qualitybased forwarding strategy for delay tolerant network[J].Journal of Network and Computer Applications, 2014, 39(3):302-309.
  • 9Pan H, Jon C, and Eiko Y. BUBBLE rap: social-basedforwarding in delay-tolerant networks [J]. IEEE Transactionson Mobile Computing, 2011, 10(11): 1576-1589.
  • 10Ker^nen A, Ott J, and K^rkkainen T. The ONE simulator forDTN protocol evaluation[C]. Proceedings of the 2ndInternational Conference on Simulation Tools and Techniques,Pisa, Italy, 2009: 1-10.

同被引文献20

  • 1BOLDRINI C, LEE K, ONEN M, et al. Opportunistic networks[J]. Computer Communications, 2014, 48(14): 1-4.
  • 2D'SOUZA R J and JOSE J. Routing approaches in delay tolerant networks: a survey[J]. International Journal of Computer Applications, 2010, 1(17): 8-14.
  • 3CAO Z, DONG M, GAO Z, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(1): 22-32.
  • 4JAIN S. Black hole attack in delay tolerant networks: a survey[J]. International Journal of Computer Science and Engineering, 2014, 2(4): 172-175.
  • 5DINI (] and DUCA A L. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network[J]. Ad Hoc Networks, 2012, 10(7): 1167-1178.
  • 6LI N and DAS S K. A trust-based framework for data forwarding in opportunistic networks[J]. Ad hoc Networks, 2013, 11(4): 1497-1509.
  • 7LI F, WU J, and SRINIVASAN A. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[C]. IEEE International Conference on Computer Communications 2009, Rio de Janeiro, Brazil, 2009:2428-2436.
  • 8REN Y, CHUAH M C, YANG J, et al. Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording[C]. 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, QC, Canada, 2010: 1-6.
  • 9GUO Y, SCHILDT S, and WOLF L. Detecting blackhole and greyhole attacks in vehicular delay tolerant networks[C]. Fifth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 2013: 1-7.
  • 10SAINI K K, SAINI A, and MEHAK. Nature based trust security protocol against greyhole attacks in opportunistic networks[J]. International Journal of Engineering Research Management Technology, 2014, 1(3): 21-28.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部