期刊文献+

一种基于簇的移动Ad hoc路由算法

A Cluster-based Routing Algorithm for MANET
下载PDF
导出
摘要 在大规模MANET中采用分簇的方法进行路由是解决网络可扩展性问题的一个有效方法,该文提出的CBRP算法在选取簇首节点时,引入了节点的带权ID,簇的分布更加均衡,改善了大规模MANET的路由计算效率。路由过程中使用数字签名,增强了CBRP路由的安全性。最后的仿真结果显示,与现有的协议相比,CBRP算法能提供更好的Qos性能,适合于结点较多、节点的移动速度受到一定限制的MANET。 Cluster-based routing algorithm operated in large Mobile Ad hoc networks can successfully solves the problem of scalability. The paper proposes a new cluster-based routing algorithm which introduced the Weight_ID of node when the head of cluster is selected. It provided a more balance of cluster in Ad hoc networks,and enhances the efficiency of routing in large Ad hoc network. The security is improved for signature is included in routing. The simulation result shows that compared with some protocols in mobile Ad hoc network,CBRP can increase the network performance and easy operation in large mobile Ad hoc network which its nodes moving at restrict speed.
作者 田波
出处 《电脑知识与技术(过刊)》 2010年第7X期5436-5438,共3页 Computer Knowledge and Technology
关键词 MANET 安全路由 QOS mobile Ad hoc network cluster secure routing quality of service
  • 相关文献

参考文献2

二级参考文献9

  • 1[1]Corson S, Macker J. Mobile Ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. RFC 2501, 1999.
  • 2[2]Chen W, Jain N, Singh S. ANMP: Ad hoc network management protocol. IEEE Journal on Selected Areas in Communications, 1999,17(8):1506~1531.
  • 3[3]Lindfors AK. Policy based management in Ad-hoc networks. In: Proceedings of the Helsinki University of Technology Seminar on Internetworking. 2000. http://www.tml.hut.fi/Opinnot/Tik-110.551/2000/papers/.
  • 4[4]Sharony J. An architecture for mobile radio networks with dynamically changing topology using virtual subnets. Mobile Networks and Application (MONET), 1996,1(1):75~86.
  • 5[5]Sánchez R, Evans J, Minden G. Networking on the battlefield: challenges in highly dynamic multi-hop wireless networks. In: Proceedings of the IEEE 1999 Military Communications Conference (MILCOM'99). 1999. http://www.argreenhouse.com/society/ TacCom/milcom_99_papers.shtml.
  • 6[6]Goldszmidt G, Yemini Y. Delegated agents for network management. IEEE Transactions on Communication, 1998,36(1):66~70.
  • 7Ghosh A K, Schwartzbard A. A study in using neural networks fof anomaly and misuse detection. In Proceedings of the 8th USENIX Security Symposium, 1999.
  • 8Lippmann R. Fined D. Evaluating intrusion destectical systems: The 1998 darpa. off - line intrusion detection evaluation. In Proceedings of the 2000 DAPRA Information Survivability Conference and Exposition 2000.
  • 9Ilgan K, Kemmerer R A. State trasition analysis: A rule - based in trusion delection approach. IEEE Transactions on Software Engineering. 1995;21(3): 181 - 199.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部