期刊文献+

移动机会网络路由问题研究进展 被引量:54

Research Progress on Routing Problem in Mobile Opportunistic Networks
下载PDF
导出
摘要 移动机会网络基于节点接触形成的通信机会逐跳转发数据,是满足物联网透彻感知与泛在互联的一种重要技术手段.机会路由作为实现间歇式连通环境下节点通信的基本方法,具有十分重要的研究意义,引起了研究人员的广泛关注.首先介绍了移动机会网络的概念、体系结构、典型应用以及所面临的一些挑战;然后详细阐述了机会路由算法的评价指标、设计需求与转发机制,并介绍了研究进展;最后,对机会路由未来的研究趋势进行了分析与展望. Mobile opportunistic networks (MONs) utilize the communication opportunities arising from node contacts to forward data in a hop-by-hop manner, and they play an important role in implementing the intensive perception and ubiquitous interconnection in Interact of Things. Opportunistic routing is the basic method for data communication in intermittently connected scenarios, so it is worth studying and has captured great interests from researchers. First, this paper introduces the concept, system architecture, typical applications of MONs, and some technical challenges in this field. Second, it reviews the opportunistic routing problem from three aspects: 1) evaluation metrics, 2) design requirements, 3) forwarding schemes. Some of the latest progresses of this research arc also presented. Finally, the future research trends of opportunistic routing are analyzed and prospected.
出处 《软件学报》 EI CSCD 北大核心 2015年第3期600-616,共17页 Journal of Software
基金 国家自然科学基金(61332005 61133015) 创新研究群体基金(61421061) 高等学校博士学科点专项科研基金(20120005130002) 国家科技支撑计划(2013BAK01B02) 北京市教委共建项目
关键词 机会路由 数据转发 移动机会网络 opportunistic routing data forwarding mobile opportunistic networks
  • 相关文献

参考文献6

二级参考文献127

  • 1Hull B, Bychkovsky V, Zhang Y, Chen K, Goraczko M, Miu A, Shih E, Balakrishnan H, Madden S. CarTel: A distributed mobile sensor computing system. In: Proc. of the 4th Int'l Conf. on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 125-138.
  • 2Pan H, Chaintreau A, Scott J, Gass R, Crowcroft J, Diot C. Pocket switched networks and human mobility in conference environments. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM. 2005. 244-251.
  • 3Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy-Efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In: Proc. of the 10th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2002.96-107. DO1=http://doi.acm.org/10.1145/605397.605408
  • 4Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, 2006,44(11): 134-141.
  • 5Conti M, Giordano S. Multihop ad hoe networking: The reality. Communications Magazine, 2007,45(4):88-95.
  • 6Fall K. A delay-tolerant network architecture for challenged Internets. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe: ACM, 2003.27-34.
  • 7Akyildiz IF, Akan B, Chert C, Fang J, Su W. InterPlaNetary Intemet: State-of-the-Art and research challenges. Computer Networks, 2003,43(2):75-112.
  • 8Gupta P, Kumar P. The capacity of wireless networks. IEEE Trans. on Information Theory, 2000,46(2):388-404.
  • 9Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002, 10(4):477-486.
  • 10Small T, Haas ZJ. The shared wireless infostation model: A new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. of the 4th ACM Int'l Symp. on Mobile Ad Hoc Networking. Annapolis: ACM, 2003. 233-244.

共引文献492

同被引文献206

  • 1朱会霞,王福林,索瑞霞.物联网在中国现代农业中的应用[J].中国农学通报,2011,27(2):310-314. 被引量:83
  • 2程刚,张云勇,张勇,宋梅.基于人类真实场景的分时段的机会网络移动模型[J].通信学报,2013,34(S1):182-189. 被引量:2
  • 3刘莉,茆诗松.THE RISK MODEL OF THE EXPECTED DISCOUNTED PENALTY FUNCTION WITH CONSTANT INTEREST FORCE[J].Acta Mathematica Scientia,2006,26(3):509-518. 被引量:4
  • 4郭代,晏坚,王文江.新型屏幕共享系统设计与实现[J].计算机应用研究,2007,24(6):299-301. 被引量:7
  • 5Conti M, Giordano S. Mobile ad hoc networking : Milestones,challenges, and new research directions[J]. IEEE Communi-cations Magazine, 2014,52(1) :85-96.
  • 6Zhu Ying, Xu Bin, Shi Xinghua, et al. A survey of social-based routing in delay tolerant networks : Positive and nega-tive social effects[ J]. IEEE Communications Surveys &Tutorials, 2013,15(1) :387401.
  • 7Sweeney L. K-anonymity: A model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness andKnowledge-Based Systems, 2002,10(5) :557-570.
  • 8Radenkovic M, Vaghi I. Adaptive user anonymity for mo-bile opportunistic networks [ C ]// Proceedings of the 7thACM International Workshop on Challenged Networks.2012:79-82.
  • 9Radenkovic M,Benslimane A, McAuley D. Reputation a-ware obfuscation for mobile opportunistic networks [ J ].IEEE Transactions on Parallel and Distributed Systems,2015,26(l):230-240.
  • 10Li Na, Das S K. A trust-based framework for data forward-ing in opportunistic networks [ J ]. Ad Hoc Networks,2013,11(4) :1497-1509.

引证文献54

二级引证文献116

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部