期刊文献+

移动自组网自私行为闭环惩罚模型设计 被引量:1

Design of closed-loop model on selfish behavior in MANET
下载PDF
导出
摘要 针对移动自组网MAC层开环模型缺乏自私行为惩罚机制的不足,设计一种包括报文信息统计、统计信息共享和判决惩罚模块的闭环改进协议PDCF。报文信息统计定义转发率、丢弃度等指标衡量节点行为,修改仿真软件内置函数实现节点行为信息的统计。统计信息共享定义行为量化等级,改进DCF预留字段和CSMA/CA机制,实现节点行为信息的全网覆盖。判决惩罚模块对节点行为建立一维马尔可夫链惩罚模型,限制节点自私行为。仿真结果表明,与DCF相比,PDCF时延、丢包率和控制开销基本不变,但稳态时自私节点比例得到有效控制,且吞吐量增加2.7 Mbps,网络性能得到改善。 This paper proposed a new closed-loop protocol named penalty distributed coordination function (PDCF) to im- prove the deficiency about recent open-loop model, which lacked penalty mechanism in medium access control ( MAC ) layer of mobile Ad hoc networks (MANET). PDCF included three modules, packets statistics (PS), information sharing (IS) and behavior verdict penalty (BVP). First in PS, it defined forwarding rate and dropping level to judge node behavior, and col- lected information by modifying inline function of simulation software. Then it delivered collected information about nodes to oth- er nodes by IS, which defined quantization level and improved reserved fields as well as CSMA/CA mechanism. At last deve- loped a one-dimensional Markov chain penalty model to limit the node behavior based on previous information. Results show that, delay, packet drop rate and control overhead of PDCF were similar with that of DCF. However, proportion of selfish nodes is lower and throughput increases about 2.7 Mbps in PDCF, all of which are better than those of DCF.
出处 《计算机应用研究》 CSCD 北大核心 2016年第8期2446-2450,共5页 Application Research of Computers
关键词 闭环模型 一维马尔可夫链 转发率 丢弃度 自私行为 移动自组网 closed-loop model one-dimensional Markov chain packet forwarding rate dropping level selfish behavior MANET
  • 相关文献

参考文献16

  • 1Tab C K, Dongkyun K, Sutaek 0 H. The controversy of selfish nodes in Ad hoc networks[ C ]//Proc of the 12th International Conference on Advanced Communication Technology. 2010 : 1087-1092.
  • 2Ivan D B, Renier V H, Martin S O. Analysing the fairness of trust- based mobile Ad hoc network protocols [ C ]//Proc of Information Se- curity South Africa Conference. 2011 : 1-8.
  • 3Abderrahim B, Abderrezak R, Deepak D. Relative fairness and opti- mized throughput for mobile Ad hoc networks [ C ]//Proc of IEEE In- teruational Conference on Communications. [ S. 1. ] : IEEE Press, 2008 : 2233-2237.
  • 4IEEE Standard 802. 11, Wireless LAN medium access control and physical layer specifications[ S]. 1999: 1-408.
  • 5Kyasanur P, Vaidya N. Detection and handling of MAC layer misbe- havior in wireless networks [ C ]//Proc of International Conference on Dependable Systems and Networks. [ S. 1. ] :IEEE Press, 2003:173- 182.
  • 6Kyasanur P, Vaidya N. Selfish MAC layer misbehavior in wireless networks[ J]. IEEE Yrans on Mobile Computing ,2005,4(5 ) :502- 516.
  • 7Meenakshi P, Sanjay S. Detection of malicious attack in MANET a behavioral approach [ C]//Proc of the 3rd IEEE International Ad- vance Computing Conference. 2013 : 388- 393.
  • 8刘春风.IEEE802.11无线adhoe网络MAC层自私行为研究[D].天津:天津大学,2008:45-55.
  • 9Kim M J, Medard M, Barros J. Algebraic watchdog: mitigating mis- behavior in wireless network coding[ J]. IEEE Selected Areas in Communications,2011,29 (10) : 1916-1925.
  • 10Stephan E, Giovanni R, Paolo S. The COMMIT protocol for truthful and cost-efficient routing in Ad hoc networks with selfish nodes [ J ]. IEEE Trans on Mobile Computing, 2008,7 ( 1 ) :19-33.

共引文献1

同被引文献1

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部