期刊文献+

机会网络中计算节点间相似度的路由算法 被引量:1

Routing Algorithm for Computing Similarity Between Nodes in Opportunistic Network
下载PDF
导出
摘要 选择合适的邻居节点进行信息传递是机会网络实现高效转发的关键因素.由于节点的移动性带来的邻居节点选择困难、传输过程不稳定以及网络拓扑结构变化等因素,使得机会网络的传输成功率比较低.针对这一问题,利用节点之间的社会属性进行邻居节点的选择,提出一种基于节点相似度的路由算法(Opportunistic Network Routing Algorithm Based on Node Similarity)(ONNS).首先计算节点之间数据分组的编辑距离,再计算出两个节点的相似度,并按照一定的约束规则对节点间的相似度进行筛选,最终可以得到一条或多条相对比较可靠的传输路径.与传统的路由算法比较,仿真实验表明,相似度算法能够有效地提高传输成功率,降低传输延迟以及路由开销. In opportunistic network, it is the key point to select the appropriate neighbor nodes for forwarding messages. Due to the difficulty of neighbor nodes selection, the instability of transmission process and the change of network topology caused by the mobili- ty of nodes, the deliver ratio of opportunity network is relatively low. In view of this problem, this paper uses the social attributes be- tween nodes to choose the neighbor nodes, and proposes an algorithm - Opportunistic Network Routing Algorithm Based on Node Similarity ( ONNS ). First, the algorithm will calculate the edit distance of data packets between nodes, and then calculate the similari- ty between two nodes, and filters the similarity between nodes according to certain constraint rules. Ultimately, we can get one or more relatively reliable transmission paths. The simulation results showed that compared with the traditional routing algorithms, the similarity algorithm can effectively improve the delivery ratio, reduce the transmission delay and the routing overhead.
作者 林玉成 陈志刚 吴嘉 LIN Yu-cheng;CHEN Zhi-gang;WU Jia(School of Software,Central South University,Changsha 410075,China;"Mobile Health" Ministry of Education-China Mobile Joint Laboratory,Changsha 410083,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2018年第8期1759-1764,共6页 Journal of Chinese Computer Systems
基金 中南大学研究生自主探索创新项目(2018zztsb06)资助 中南大学博士后基金项目(185684)资助 国家社会科学重大项目(71633006)资助 国家自然科学基金面上项目(61672540 61379057)资助 中国博士后科学基金项目(2017M612586)资助
关键词 机会网络 路由算法 编辑距离 相似度 传输成功率 opportunistic network routing algorithm edit distance similarity deliver ratio
  • 相关文献

参考文献4

二级参考文献56

  • 1Huang C H,Lank C,Tsaic Z.A survey of opportunistic networks[C]// Proceedings of the 22nd International Conference on Advanced Information Networking and Applications.Ginowan: IEEE Press, 2008:1672-1677.
  • 2Lilien L,Kamal Z H,Gupta A,et al.Opportunistic networks[R]. Kalamazoo, MI: Department of Computer Science, Western Michigan University, 2006.
  • 3Symington S.DTN security[C]//IETF Delay Tolerant Networking Workshop, Minneapolis, 2005:1530-1730.
  • 4Farrell S, Symington S,Weiss H, et al.Delay-tolerant networking security overview draft-irtf-dtnrg-sec-overview-06[EB/OL].http:// tools.iet f.org/html/draft-irtf-dtnrg-sec-overview-06.
  • 5Kate A, Zaverucha G M, Hengartner U.Anonymity and security in delay tolerant networks[C]//3rd International Conference on Security and Privacy in Communication Networks (Secure Comm 2007).[S.l.] : IEEE Computer Society, 2007: 504-513.
  • 6Asokan N, Kostianinen K, Ginzboorg P, et al.Towards securing disruption-tolerant networking,Tech Rep NRC-TR-2007-007[R].2007.
  • 7Burgess J, Bissias G D, Comer M D.Surviving attacks on disruption-tolerant networks without authentication[C]//Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Montreal, Quebec, Canada, 2007.
  • 8Symington S, Fan-ell S, Weiss H, et al.Bundle security protocol specification draft-irtf-dtnrg-bundle-security- 16[EB/OL] .http://tools. ietf. org/html/dratl-irt f-dtrtrg-bundle-security- 16.
  • 9Eddy W, Wood L, Ivancic W.Checksum ciphersuites for the bundle protocol draftirtf-dtrtrg-bundle-checksum-05[EB/OL].http:// tools.ietf.org/tml/raftirtf-dtnrg-bundle-checksum-01.
  • 10Franklin B M.Identity based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003,32 ( 3 ) : 586-615.

共引文献7

同被引文献16

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部