期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
高能量高信号强度节点优先的AODV路由协议 被引量:1
1
作者 邹修明 《计算机工程与应用》 CSCD 2014年第17期86-89,共4页
针对AODV协议只选择具有最少跳数路由,而不考虑节点能量即将耗尽或节点即将离开邻节点传送范围,造成路由频繁中断的问题,提出新的改进方案,在路由发现阶段,选择能量较高和信号强度较强的节点作为路由节点,在路由维护阶段,对能量即将耗... 针对AODV协议只选择具有最少跳数路由,而不考虑节点能量即将耗尽或节点即将离开邻节点传送范围,造成路由频繁中断的问题,提出新的改进方案,在路由发现阶段,选择能量较高和信号强度较强的节点作为路由节点,在路由维护阶段,对能量即将耗尽或即将离开邻节点有效传送范围的节点进行路由备份。仿真实验结果表明改进后的协议能够有效增加数据包投递率和减少平均端到端延时,并能有效减缓能耗速度,提高整个网络的生存期。 展开更多
关键词 无线自组织网络按需距离矢量路由协议(aodv) 节点能量 信号强度 Ad HOC on-demand distance vector routing(aodv)
下载PDF
Trust-based Intelligent Scheme for Mitigating Black Hole Attacks in IoT
2
作者 Feroz Khan A.B Weslin D +1 位作者 Dilli Babu M Mohammed Muzaffar Hussain 《Journal of Harbin Institute of Technology(New Series)》 CAS 2024年第3期39-50,共12页
Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing.... Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing.While multipath routing in IoT networks can improve data transmission reliability and load balancing by establishing multiple paths between source and destination nodes,these networks are susceptible to security threats due to their wireless nature.Traditional security solutions developed for conventional networks are often ill-suited to the unique challenges posed by IoT environments.In response to these challenges,this paper proposes the integration of the Ad hoc On-demand Multipath Distance Vector(AOMDV)routing protocol with a trust model to enhance network performance.Key findings from this research demonstrate the successful fusion of AOMDV with a trust model,resulting in tangible improvements in network performance.The assessment of trustworthiness bolsters both security and routing capabilities in IoT networks.The trust model plays a crucial role in mitigating black hole attacks in IoT networks by evaluating the trustworthiness of nodes and helping in the identification and avoidance of malicious nodes that may act as black holes.Simulation results validate the efficacy of the proposed trust-based routing mechanism in achieving its objectives.Trust plays a pivotal role in decision-making and in the creation of secure distribution systems.By assessing the trustworthiness of nodes,both network security and routing efficiency can be enhanced.The effectiveness of the proposed trust-based routing mechanism is scrutinized through simulations,offering insights into its potential advantages in terms of improved network security and routing performance in the context of the IoT. 展开更多
关键词 Mobile ad-hoc network(MANET) routing Ad hoc on-demand Multipath distance vector(AOMDV) trust model security
下载PDF
Route maintenance of on-demand routing protocol in mobile ad hoc networks
3
作者 肖百龙 Guo Wei +1 位作者 Liu Jun Zhu Silu 《High Technology Letters》 EI CAS 2008年第2期174-178,共5页
In mobile ad hoc networks (MANETs), if a mnltihop route breaks, route maintenance is typically performed to establish a new route which causes high control overhead and long packet delay. To decrease the time of rec... In mobile ad hoc networks (MANETs), if a mnltihop route breaks, route maintenance is typically performed to establish a new route which causes high control overhead and long packet delay. To decrease the time of recovery and the overhead of maintenance, a new route maintenance mechanism in which the maintenance is confined to the vicinity of the broken link is proposed. This mechanism patches broken route through some other nodes in which only nodes near the broken link(s) may need to be substituted and the rest of nodes can be retained on the route. The broken link can be repaired without considering its relative position in the whole path, so the abihty of dealing with hnk failure is improved obviously. Simulation results show that the proposed strategy improves network performance significantly, such as in merits of control overhead and packet delay. 展开更多
关键词 ad hoc networks routing protocol ad hoc on-demand distance vector routing protocol(aodv route maintenance next-to-next hop
下载PDF
Dynamic Cluster Head for Lifetime Efficiency in WSN 被引量:10
4
作者 Hesham Abusaimeh 《International Journal of Automation and computing》 EI 2009年第1期48-54,共7页
Saving energy and increasing network lifetime are significant challenges in wireless sensor networks (WSNs). In this paper, we propose a mechanism to distribute the responsibility of cluster-heads among the wireless... Saving energy and increasing network lifetime are significant challenges in wireless sensor networks (WSNs). In this paper, we propose a mechanism to distribute the responsibility of cluster-heads among the wireless sensor nodes in the same cluster based on the ZigBee standard, which is the latest WSN standard. ZigBee supports ad hoc on-demand vector (AODV) and cluster-tree routing protocols in its routing layer. However, none of these protocols considers the energy level of the nodes in the network establishing process or in the data routing process. The cluster-tree routing protocol supports single or multi-cluster networks. However, each single cluster in the multi-cluster network has only one node acting as a cluster head. These cluster-heads are fixed in each cluster during the network lifetime. Consequently, using these cluster-heads will cause them to die quickly, and the entire linked nodes to these cluster-heads will be disconnected from the main network. Therefore, the proposed technique to distribute the role of the cluster head among the wireless sensor nodes in the same cluster is vital to increase the lifetime of the network. Our proposed technique is better in terms of performance than the original structure of these protocols. It has increased the lifetime of the wireless sensor nodes, and increased the lifetime of the WSN by around 50% of the original network lifetime. 展开更多
关键词 Cluster-tree routing protocol cluster head energy consumption ad hoc on-demand distance vector (aodv networklifetime wireless sensor networks (WSNs).
下载PDF
Modeling Delay and Packet Drop in Networked Control Systems Using Network Simulator NS2 被引量:9
5
作者 Mohammad Shahidul Hasan Christopher Harding Alison Griffiths 《International Journal of Automation and computing》 EI 2005年第2期187-194,共8页
Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researche... Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researchers because of its flexibility and robustness. However, designing efficient WNCS over Mobile Ad Hoc Networks (MANET) is still a challenging topic because of its less-predictable aspects, such as inconsistent delay, packet drop probability, and dynamic topology. This paper presents design guidelines for WNCS over MANET using the Network Simulator version 2, NS2 software. It investigates the impact of packet delay and packet drop under the AODV and DSR routing protocols. The simulation results have been compared to MATLAB results for validation. Keywords Adhoc On-Demand Distance Vector (AODV) routing - Dynamic Source routing (DSR) - Mobile Adhoc Networks (MANET) - Wireless Networked Control Systems (WNCS) Mohammad Shahidul Hasan received his BSc and first MSc in Computer Science from the University of Dhaka, Bangladesh. He obtained his 2nd MSc in Computer & Network Engineering from Sheffield Hallam University, Sheffield, UK. Currently he is pursuing his PhD under the Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford, UK in Networked Control Systems over MANET.Chris Harding received his BSc in Computing Science and Masters by Research from Staffordshire University, UK. Currently he is pursuing his PhD in Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.Hongnian Yu is Professor of Computer Science at Staffordshire University. He was a lecturer in Control and Systems Engineering at Yanshan University, China in 1985–1990, did his PhD in Robotics at King’s College London (1990–1994), was a research fellow in Manufacturing Systems at Sussex University (1994–1996), a lecturer in Artificial Intelligence at Liver-pool John Moore’s University (1996–1999), a lecturer in Control and Systems Engineering at the University of Exeter (1999–2002), and a Senior Lecturer in Computing at the University of Bradford (2002–2004). He now leads the Mobile Computing and Distributed Systems Research Group at Staffordshire University. He was a founding member of the Modeling Optimisation Scheduling and Intelligent Control research group at the University of Bradford. He has extensive research experience in neural networks, mobile computing, modeling, control of robot manipulators, and modeling, scheduling, planning, and simulations of large discrete event dynamic systems with applications to manufacturing systems, supply chains, transportation networks, and computer networks. He has published over 100 research papers focusing on the following: neural networks, computer networks, adaptive and robust control of robot manipulators, analysis and control of hybrid machines, control of timed delay systems, predictive control, manufacturing system modeling and scheduling, planning, and supply chains. He has held several research grants from EPSRC, the Royal Society, and the EU, as well as from industry. He was awarded the F.C. William Premium for his paper on adaptive and robust control of robot manipulators by the IEE Council in 1997. Professor Yu is an EPSRC college member, a member of IEEE, and a committee member of several conferences and journal editorial boards.Alison Griffiths has been a Senior Lecturer in Telecommunications at Staffordshire University since 2003. She was a lecturer in Computing at Staffordshire University in 2002–2003. She was a Research Associate on an EPSRC funded project whilst doing her PhD on the convergence of Mobile Computing and Telecommunications at Staffordshire University (1999–2003). The investigation consisted of the communication of different types of media (voice, video conferencing, web browsing, and downloading) over a common network, using a mobile device. Problems considered were the complications that occurred when a user moves, and consequently changes their end-point in the network during communication, with respect to the type of service the user is provided with (delays and losses). She obtained both her MEng and 1st Class BEng (Hons) from Staffordshire University in 1999 and 1998 respectively. She is now part of the Mobile Computing and Distributed Systems Research Group at Staffordshire University. She has published 8 research papers focusing on quality of service and access between cellular and IP packet switched networks. Future directions include mobile agents and control of mobile wireless ad-hoc networks. Her current research interests have extended to Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system. 展开更多
关键词 Adhoc on-demand distance vector (aodv) routing Dynamic Source routing (DSR) Mobile Adhoc Networks (MANET) Wireless Networked Control Systems (WNCS)
下载PDF
Balancing the Power Consumption Speed in Flat and Hierarchical WSN 被引量:3
6
作者 Hesham Abusaimeh 《International Journal of Automation and computing》 EI 2008年第4期366-375,共10页
A combination of a cluster tree routing protocol and an Ad hoc on demand vector (AODV) routing protocol is used in the latest ZigBee standard wireless sensor networks (WSNs) technology.However,the AODV routing protoco... A combination of a cluster tree routing protocol and an Ad hoc on demand vector (AODV) routing protocol is used in the latest ZigBee standard wireless sensor networks (WSNs) technology.However,the AODV routing protocol has no means by which to take into consideration the power consumption of the nodes during the routing process.Therefore,a new approach is proposed in this paper to balance the power consumption speed and to distribute the responsibilities of routing among flat wireless sensor nodes and the three levels of hierarchical wireless sensor nodes.These three levels are based on the three types of devices,which are used in the ZigBee standard:the coordinator,the routers,and the end devices.In this paper,we have compared the original AODV routing protocol with our extension approach for the distribution of power consumption.Based on the simulation results,our new approach has achieved better performance in terms of increasing the lifetime of the flat wireless sensor network,the personal area network (PAN) coordinator,the routers,and the whole network of the hierarchical wireless sensor network.Additionally,it has better performance in terms of distributing the power consumption among the key nodes of the wireless sensor network. 展开更多
关键词 Routing protocols energy consumption Ad hoc on-demand distance vector (aodv) network lifetime wireless sensor networks (WSNs).
下载PDF
Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks 被引量:5
7
作者 Ahmad F.Subahi Youseef Alotaibi +1 位作者 Osamah Ibrahim Khalaf F.Ajesh 《Computers, Materials & Continua》 SCIE EI 2021年第2期2077-2086,共10页
Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the uns... Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM). 展开更多
关键词 Wireless and mobile ad hoc networks(WMANet) packet drop attack(PDA) ad hoc on-demand distance vector(aodv) dynamic source routing(DSR) packet drop battling mechanism(PDBM)
下载PDF
Use of wireless system in healthcare for developing countries
8
作者 Humaira Abdus Salam Bilal Muhammad Khan 《Digital Communications and Networks》 SCIE 2016年第1期34-45,共12页
Healthcare is one of the major applications of wireless systems that possess crucial issues. Specifically developing countries require a tow cost and reliable network with efficient protocols. The most challenging con... Healthcare is one of the major applications of wireless systems that possess crucial issues. Specifically developing countries require a tow cost and reliable network with efficient protocols. The most challenging concern of Body Area Network (BAN) is heterogeneity, which requires fairness with reliability among all the network nodes. Solutions proposed for these networks either do not provide fair packet transmission or consume high energy and introduce delays. In this paper, we propose a cross layer protocol for healthcare applications meeting the requirements and challenges of the heterogeneous BAN. The protocol is also feasible for developing countries as it can be implemented over existing wireless infrastructure and provides high network reliability with energy efficiency through cooperation and adaptability. Results show that the proposed scheme improves reliability, throughput, Packet Delivery Ratio (PDR), and energy consumption for scalable and mobile networks over conventional BAN protocols. 展开更多
关键词 Cooperative aodv ad-hoc on-demand distance vector routing Cross tayer adaptability Data aggregation Heterogeneous network Wireless BAN communication
下载PDF
Adaptive load balancing scheme in ad hoc networks
9
作者 袁玉华 陈惠民 贾旻 《Journal of Shanghai University(English Edition)》 CAS 2007年第3期296-299,共4页
An adaptive load balancing scheme is proposed to balance the load in ad hoc networks. The new scheme can be applied in most on-demand routing protocols resulting in significant performance improvement. The proposed sc... An adaptive load balancing scheme is proposed to balance the load in ad hoc networks. The new scheme can be applied in most on-demand routing protocols resulting in significant performance improvement. The proposed scheme is applied to the ad hoc on-demand distance vector (AODV) routing protocol. Simulation results show that the network load is balanced on the whole, and performance in packet loss rate, routing overhead and average end-to-end delay is also improved. 展开更多
关键词 ad hoc network load balancing ad hoc on-demand distance vector (aodv
下载PDF
A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks
10
作者 Om Shree Francis J. Ogwu 《Wireless Sensor Network》 2013年第4期76-83,共8页
The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can dis... The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can disrupt the services of this layer. This paper takes a look at some important detection and mitigation techniques and presents the drawbacks. After analysis of current mechanisms, the paper proposes RID-AODV, a security solution for multiple black-hole attack in wireless mesh networks. Based on the backbone of AODV, RID-AODV combines the ability of route skipping of IDSAODV and route failure correction using reverse route establishment of RAODV. The enhanced protocol RID-AODV, AODV, IDSAODV, and RAODV are implemented in a simulated environment using ns-2.35 simulator. The networks for each protocol are bombarded with up to ten black-hole nodes starting from zero. The results obtained are then analyzed and compared and a discussion is presented. 展开更多
关键词 Mobile ad-hoc Network Wireless Mesh Networks ad-hoc on-demand distance vector BLACK-HOLE RADOV IDSaodv RID-aodv
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部