期刊文献+

Ad Hoc中基于编码的多约束多播路由安全高效算法 被引量:1

下载PDF
导出
摘要 在Ad Hoc应用中,在保证多种网络服务质量(Qo S)的情况下,确保网络安全具有重要意义。文章分析了移动自组网应用的一般特点,提出了网络模型和编码方法,制订了安全规则,给出了一个基于网络编码技术的多约束安全多播路由算法(BFSMA),该算法能够提高数据发送可靠性,减少丢包率,降低平均延迟。仿真结果对本文提出的算法给予了支持,可提高移动自组网的通信质量和安全性。
作者 鲁慕瑶
出处 《信息通信》 2015年第2期52-53,共2页 Information & Communications
  • 相关文献

参考文献3

  • 1孙宝林.移动AdHoc网络路由技术研究[J].湖北长江出版集团,2008(11).
  • 2陈晶,崔国华,杨木祥,粟栗.一种Ad Hoc网络中安全的网格路由协议[J].计算机学报,2006,29(9):1648-1656. 被引量:10
  • 3Cui, XX., Lin, C, and Wei, YY. A multiobjective model for QoS multicast routing based on genetic algorithm [A]. In: Proceedings of the 2003 International Conference on Com- puter Networks and Mobile Computing [C](ICCNMC' 03), Shanghai, China, October 20-23, 2003, 49-53.

二级参考文献13

  • 1Mauve M. , Widmer J. , Hartenstein H.. A survey on position based routing in mobile Ad Hoe networks. IEEE Network,Maihofer, 2001, 15(6) : 30-39
  • 2Zapata M. , Asokan N.. Securing Ad Hoc routing protocols.In: Proceedings of the ACM Workshop on Wireless Security(WiSe), Atlanta, GA, 2002, 1-10
  • 3Hu Y.-C. , Perrig A. , Johnson D. B.. Ariadne: a secure on demand routing protocol for Ad Hoc networks. In: Proceedings of the ACM Mobicom, Atlanta, 2002, 12-23
  • 4Hu Y. , Johnson D. , Perrig A.. SEAD: Secure efficient distance vector routing for mobile Ad Hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems Applications (WMCSA 2002), Calicoon, 2002, 3-13
  • 5Hu Y. C. , Perrig A. , Johnson D.B.. Packet leashes: A defense against wormhole attacks in wireless network. In: Proceedings of the IEEE INFOCOM, San Francisco, CA, 2003,1976-1986
  • 6Perrig A. , Canetti R. , Tygar J. D. , Song D.. The TESLA broadcast authentication protocol. RSA Laboratories: Crypto-Bytes Technical Newsletter, 2002, 5(2): 2-13
  • 7Karp B. , Kung H. T.. GPSR.. Greedy perimeter stateless rouring for wireless network. In: Proceedings of the ACM Mobicom, Boston, MA, 2000, 243-254
  • 8Jiang ZL, Jiang SX. Formal language and automata theory.Beijing: Tsinghua University Press, 2003
  • 9Buchegger S. , Boudec J-Y. L.. Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, 2002, 226-236
  • 10Buchegger S. , Le Boudec J-Y.. A robust reputation system for mobile Ad-Hoc networks. EPFL Technical Report No. IC/2003/50, EPFL-DI-ICA, Lausunne, Switzerland, 2003

共引文献9

同被引文献10

  • 1丁玲,余敬东.Ad Hoc网中一种改进的基于移动代理的拓扑发现策略[A].无线传感器网及网络信息处理技术:2006年通信理论与信号处理年会论文集[C].成都:电子科技大学通信抗干扰技术国家级重点实验室,2006:2-7.
  • 2MARWAHA S,CHEN K T,SRINIVASAN D. Mobile agentsbased routing protocol for mobile Ad hoc networks [C].Pro.ceedings of IEEE Globecom. [S.l.]:IEEE,2002,1:163-167.
  • 3MARWAHA S,CHEN K T,SRINIVASAN D. A novel routingprotocol using mobile agents and reactive route discovery forad hoc wireless networks [C].2002 10th IEEE InternationalConference on Networks. [S.l.]:IEEE,2002:311-316.
  • 4AISSANI M,FENOUCHE M,SADOUR H,et al. Ant.DSR:cache maintenance based routing protocol for mobile Ad . hocnetworks [C]// Advanced International Conference on Telecom.munications. [S.l.]:IEEE Computer Society,2007:35-35.
  • 5CHPUDHURY R R,BANDYOPADHYAY S,PAUL K. A dis.tributed mechanism for topology discovery in Ad hoc wirelessnetworks using mobile agents [C].Proceedings of the 1st ACMinternational symposium on Mobile Ad hoc Networking & Com.puting. [S.l.]:IEEE Press,2000:145-146.
  • 6CHOUDHURY R.R,PAUL K,BANDYOPADHYAY S. Multi.agent routing protocol for mobile wireless Ad hoc networks [J].Autonomous agents and multi.agent systems,2004,8:47-68.
  • 7A,FAR B. Performance of mobile agent based net.work topology discovery [C].Canadian Conference on Electri.cal and Computer Engineering. Canada:[s.n.],2007:66.69.
  • 8张胜,杨郑龙,曹凯英.基于移动agent的能量平衡环形路由算法[J].计算机应用研究,2014,31(9):2661-2664. 被引量:3
  • 9蒲云花,陈世平.改进蚁群算法在移动自组网中的研究[J].计算机应用研究,2015,32(2):574-578. 被引量:5
  • 10许力,郑宝玉.移动自组网中基于移动代理的拓扑发现策略[J].计算机工程与应用,2003,39(29):167-169. 被引量:10

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部