期刊文献+

可靠的机会网络自私节点检测算法 被引量:6

Reliable selfish node detection algorithm for opportunistic networks
下载PDF
导出
摘要 针对现有机会网络自私节点检测算法没有考虑节点收到错帧和节点脱离通信范围监听失败的情况而影响检测准确性的问题,提出一种可靠的自私节点检测新算法——RSND。采用基于跨层监听机制的错帧解析、基于节点相遇的信息挖掘和基于RSSI的节点距离估计3种新机制消除错帧和节点脱离通信范围监听失败对节点自私性检测的影响,提升检测可靠性。理论分析证明了RSND算法的有效性,仿真结果显示,相对于现有的基于2-ACK的自私节点检测算法和Watchdog检测算法,新算法的自私节点检测准确率和网络吞吐量至少提高了6%和4%。 To address the problem of detection accuracy affected by situations like the omission of node receiving wrong frame and failure of monitoring beyond nodes' communication range during the consideration of the existing selfish node detection algorithms in opportunistic networks, a novel and reliable selfish node detection algorithm——RSND algorithm for opportunistic networks was proposed. It employs wrong frame analysis based on cross-layer monitoring mechanism, information excavation based on node encounter and node distance estimation based on RSSI three new mechanisms to eliminate the influence of node's selfishness detection due to wrong frame and failure of monitoring beyond nodes' communication range, improving the reliability of detection. Theoretical analysis verifies the effectiveness of RSND, and simulation results show that RSND can improve selfish node detection accuracy ratio and network throughput at least 6% and 4%, as compared to the existing selfish node detection algorithm based on 2-ACK and watchdog detection algorithm.
出处 《通信学报》 EI CSCD 北大核心 2016年第3期1-6,共6页 Journal on Communications
基金 国家自然科学基金资助项目(No.61379159) 长江学者和创新团队发展计划基金资助项目(No.IRT1299) 重庆市自然科学基金资助项目(No.cstc2012jj A40051) 重庆市教委基金资助项目(No.Kizh11206)~~
关键词 机会网络 自私节点 检测算法 监听 误判 opportunistic networks selfish node detection algorithm monitor misjudgment
  • 相关文献

参考文献8

二级参考文献152

  • 1Hull B, Bychkovsky V, Zhang Y, Chen K, Goraczko M, Miu A, Shih E, Balakrishnan H, Madden S. CarTel: A distributed mobile sensor computing system. In: Proc. of the 4th Int'l Conf. on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 125-138.
  • 2Pan H, Chaintreau A, Scott J, Gass R, Crowcroft J, Diot C. Pocket switched networks and human mobility in conference environments. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM. 2005. 244-251.
  • 3Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy-Efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In: Proc. of the 10th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2002.96-107. DO1=http://doi.acm.org/10.1145/605397.605408
  • 4Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, 2006,44(11): 134-141.
  • 5Conti M, Giordano S. Multihop ad hoe networking: The reality. Communications Magazine, 2007,45(4):88-95.
  • 6Fall K. A delay-tolerant network architecture for challenged Internets. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe: ACM, 2003.27-34.
  • 7Akyildiz IF, Akan B, Chert C, Fang J, Su W. InterPlaNetary Intemet: State-of-the-Art and research challenges. Computer Networks, 2003,43(2):75-112.
  • 8Gupta P, Kumar P. The capacity of wireless networks. IEEE Trans. on Information Theory, 2000,46(2):388-404.
  • 9Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002, 10(4):477-486.
  • 10Small T, Haas ZJ. The shared wireless infostation model: A new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. of the 4th ACM Int'l Symp. on Mobile Ad Hoc Networking. Annapolis: ACM, 2003. 233-244.

共引文献362

同被引文献33

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部