期刊文献+
共找到531篇文章
< 1 2 27 >
每页显示 20 50 100
A TRUST MECHANISM-BASED CHANNEL ASSIGNMENT AND ROUTING SCHEME IN COGNITIVE WIRELESS MESH NETWORKS WITH INTRUSION DETECTION 被引量:1
1
作者 Wu Guofeng Zhang Jing He Zhaopan 《Journal of Electronics(China)》 2010年第5期728-734,共7页
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ... Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively. 展开更多
关键词 Cognitive wireless mesh networks (CWMN) Intrusion detection Trust mechanism Channel assignment routing
下载PDF
Evaluation of Energy Consumption of Proactive, Reactive, and Hybrid Routing Protocols in Wireless Mesh Networks Using 802.11 Standards 被引量:2
2
作者 Sidoine D. Samo Jean Louis E. K. Fendji 《Journal of Computer and Communications》 2018年第4期1-30,共30页
This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics t... This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end. 展开更多
关键词 Energy CONSUMPTION routing Protocols wireless mesh networks e-Throughput e-PDR
下载PDF
Multi-path based secure communication in wireless mesh networks 被引量:1
3
作者 Ding Xuyang Fan Mingyu Lu Xiaojun Zhu Dayong Wang Jiahao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期818-824,共7页
Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarant... Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths. 展开更多
关键词 wireless mesh network secure communication key exchange risk avoidance
下载PDF
Survivable Routing Protocol for Green Wireless Mesh Networks Based on Energy Efficiency 被引量:1
4
作者 YU Yinpeng PENG Yuhuai LIU Yejun GUO Lei SONG Meng 《China Communications》 SCIE CSCD 2014年第8期117-124,共8页
This paper proposes a new Energyefficient Survivable Routing Protocol(ESRP)based on solar energy and wind mixed for power supply in green wireless mesh networks(WMNs).The ESRP combines hop penalty strategy and floodin... This paper proposes a new Energyefficient Survivable Routing Protocol(ESRP)based on solar energy and wind mixed for power supply in green wireless mesh networks(WMNs).The ESRP combines hop penalty strategy and flooding delaying strategy to improve the performances of traditional routing protocol.This paper uses QualNet to simulate and verify the performances of proposed ESRP.Compared with the traditional routing protocol,the simulation results show that the energy utilization of ESRP is more efficient by 13%.At the same time,ESRP is more load-balanced to postpone the appearance of the first energy depletion node and reduce the number of energy depletion nodes,and thus it effectively improves network survivability. 展开更多
关键词 无线mesh网络 路由协议 能量利用效率 能效 无线网状网 惩罚策略 能量消耗 负载平衡
下载PDF
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks 被引量:1
5
作者 Hyeon Myeong Choi Su Man Nam Tae Ho Cho 《Wireless Sensor Network》 2013年第3期33-40,共8页
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised secur... Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security. 展开更多
关键词 wireless Sensor Network Security STATISTICAL En-Route WORMHOLE secure routing
下载PDF
Cross-Layer Design Based Optimized Link State Routing Protocol for Wireless Mesh Networks
6
作者 Huai-Yu Wen Guang-Chun Luo 《Journal of Electronic Science and Technology》 CAS 2011年第4期368-372,共5页
A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact f... A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results. 展开更多
关键词 Cross-layer design proactive routing routing protocol wireless mesh network.
下载PDF
An Efficient Routing Tree Algorithm for Combined Uplink and Downlink Subframes on Centralized Scheduling in IEEE 802.16 Based Wireless Mesh Networks
7
作者 Ali Behfarnia Vahid Tabataba Vakili 《International Journal of Communications, Network and System Sciences》 2011年第4期219-226,共8页
IEEE 802.16 mesh mode defines routing tree for transmitting data in centralized scheduling but it does not define any explicit proposal for combining uplink and downlink subframes. Deploying combined uplink and downli... IEEE 802.16 mesh mode defines routing tree for transmitting data in centralized scheduling but it does not define any explicit proposal for combining uplink and downlink subframes. Deploying combined uplink and downlink subframes on the centralized scheduling scheme can be more flexible and utilization is improved. However, existing interferences among the transmission of neighboring nodes lead to performance reduction of the network. In this paper, an efficient routing tree algorithm is proposed with combined uplink and downlink slot allocation on the centralized scheduling scheme which can abate interferences in the network. This algorithm allows more subscriber stations to transmit concurrently and so improves spatial reuse in the network. Also, the algorithm uses multi-channel and single channel systems and considers relay model, smoothing switching frequently between transmitting and receiving in successive time slots and fairness in the network. Extensive simulation results demonstrate the effectiveness of the proposed method in terms of scheduling length, link concurrency ratio, network throughput and Channel Utilization Ratio (CUR). 展开更多
关键词 IEEE 802.16 wireless mesh Network CENTRALIZED Scheduling SLOT ALLOCATION routing Tree
下载PDF
Utilizing Colored Pheromones and Helping Ants for Wireless Mesh Networks Routing
8
作者 Ehsan Ghasemkhani Rahim Alizadeh Alireza Mirzaei Nejad Kousari 《Communications and Network》 2012年第1期8-17,共10页
Improving routing algorithm performance not only leads to appreciate the quality of data transmission, but also increases the speed of data transfer. In this paper we propose a hybrid method which is a combination of ... Improving routing algorithm performance not only leads to appreciate the quality of data transmission, but also increases the speed of data transfer. In this paper we propose a hybrid method which is a combination of traffic classification by the help of colored pheromones and helping ants method in the intermediate nodes. This combination increases the convergence speed and decreases the delay and Jitter in the network. Also we compare the obtained results with two known routing algorithms that are based on the ant colony. 展开更多
关键词 wireless mesh networks ANTNET Mobile Agents Network routing HELPING ANT and COLORED PHEROMONES
下载PDF
A Multipath Routing Algorithm Based on Traffic Prediction in Wireless Mesh Networks
9
作者 Zhiyuan LI Ruchuan WANG 《Communications and Network》 2009年第2期82-90,共9页
The technology of QoS routing has become a great challenge in Wireless Mesh Networks (WMNs). There exist a lot of literatures on QoS routing in WMNs, but the current algorithms have some deficiencies, such as high com... The technology of QoS routing has become a great challenge in Wireless Mesh Networks (WMNs). There exist a lot of literatures on QoS routing in WMNs, but the current algorithms have some deficiencies, such as high complexity, poor scalability and flexibility. To solve the problems above, a multipath routing algorithm based on traffic prediction (MRATP) is proposed in WMNs. MRATP consists of three modules including an algo-rithm on multipath routing built, a congestion discovery mechanism based on wavelet-neural network and a load balancing algorithm via multipath. Simulation results show that MRATP has some characteristics, such as better scalability, flexibility and robustness. Compared with the current algorithms, MRATP has higher success ratio, lower end to end delay and overhead. So MRATP can guarantee the end to end QoS of WMNs. 展开更多
关键词 wireless mesh networks NON-LINEAR TRAFFIC Prediction Model MULTIPATH routing QoS
下载PDF
A Survey of Secure Routing in Wireless Sensor Networks
10
作者 LI Zhi-yuan WANG Ru-chuan 《南京邮电大学学报(自然科学版)》 2010年第1期77-87,共11页
We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are a... We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work. 展开更多
关键词 计算机网络 网络安全 网络协议 电子邮件
下载PDF
A Routing Metric Based on Available Bandwidth Routing in Wireless Mesh Networks
11
作者 Ji-soo LEE Jun-ho HWANG Myung-sik YOO 《Journal of Measurement Science and Instrumentation》 CAS 2011年第3期264-267,共4页
Wireless Mesh Network has drawn much attention due to wide area service coverage with low system cost and being easy to install.However,WMN suffers from high bit error rate,which provides different link capacity among... Wireless Mesh Network has drawn much attention due to wide area service coverage with low system cost and being easy to install.However,WMN suffers from high bit error rate,which provides different link capacity among wireless mesh routers.The conventional routing metrics select the path based on link quality.The link with the best quality is preferred as the data transmission path,and thus all nodes likely select the same link,which leads to network performance degradation.This paper proposes a routing metric that considers the available bandwidth and the number of nodes suffering congestion in the path.It is confirmed that the proposed method provides higher network performance of reduced delay,reduced packet loss and increased throughput than conventional routing metrics. 展开更多
关键词 无线mesh网络 路由度量 可用带宽 无线网状网 传输路径 链路容量 质量指标 网络性能
下载PDF
A secure routing scheme based on social network analysis in wireless mesh networks 被引量:2
12
作者 Yao YU Zhaolong NING Lei GUO 《Science China Earth Sciences》 SCIE EI CAS CSCD 2016年第12期139-150,共12页
As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guara... As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node's routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved. 展开更多
关键词 无线网状网 路由方案 安全保障 社会网络 网络分析 无线mesh网络 评价模型 安全状况
原文传递
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
13
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem ... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes identification, and success rates, SLCRM implements security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 无线mesh网络 跨层设计 机制 逻辑 无线网状网 恶意攻击 分类技术 安全保护
下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
14
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
关键词 分布式入侵检测 无线mesh网络 有限状态机 网络使用 网络拓扑结构 监控节点 网状 协同入侵检测
下载PDF
Design and analysis of intrusion detection systems for wireless mesh networks 被引量:1
15
作者 Fawaz S.Al-Anzi 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1068-1076,共9页
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and all... Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and allow omnipresent access to users on the Internet. A multitude of emerging public services rely on the widespread, high-speed, and inexpensive connectivity provided by such networks. The absence of a centralized network infrastructure and open shared medium makes WMNs particularly susceptible to malevolent attacks, especially in multihop networks. Hence, it is becoming increasingly important to ensure privacy, security, and resilience when designing such networks. An effective method to detect possible internal and external attack vectors is to use an intrusion detection system. Although many Intrusion Detection Systems (IDSs) were proposed for Wireless Mesh Networks (WMNs), they can only detect intrusions in a particular layer. Because WMNs are vulnerable to multilayer security attacks, a cross-layer IDS are required to detect and respond to such attacks. In this study, we analyzed cross-layer IDS options in WMN environments. The main objective was to understand how such schemes detect security attacks at several OSI layers. The suggested IDS is verified in many scenarios, and the experimental results show its efficiency. 展开更多
关键词 wireless mesh network Intrusi on detection CROSS-LAYER SECURITY
下载PDF
IEEE 802.11s Wireless Mesh Networks for Last-Mile Internet Access: An Open-Source Real-World Indoor Testbed Implementation 被引量:1
16
作者 Riduan M. Abid Taha Benbrahim Saad Biaz 《Wireless Sensor Network》 2010年第10期725-738,共14页
Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the IEEE standardization of this new technology is... Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the IEEE standardization of this new technology is still in progress, its main traits are already set, e.g., architecture and MAC routing. WMNs are attracting considerable research in academia and industry as well, but the lack of open-source testbeds is restricting such a research to simulation tools. The main problem with simulation tools is that they do not reflect the complexity of RF propagation, especially in indoor environments, of which IEEE 802.11s WMNs are an example. This paper presents an open-source implementation of an indoor IEEE 802.11s WMN testbed. The implementation is transparent, easy-to-deploy, and both the source code and deployment instructions are available online. The implementation can serve as a blueprint for the WMN research community to deploy their own testbeds, negating the shortcomings of using simulation tools. By delving into the testbed implementation subtleties, this paper is shedding further light on the details of the ongoing IEEE 802.11s standard. Major encountered implementation problems (e.g., clients association, Internetworking, and supporting multiple gateways) are identified and addressed. To ascertain the functionality of the testbed, both UDP and TCP traffic are supported and operational. The testbed uses the default IEEE 802.11s HWMP (Hybrid Wireless Mesh Protocol) routing protocol along with the default IEEE 802.11s Airtime routing metric. 展开更多
关键词 wireless mesh networks IEEE 802.11s Hybrid wireless mesh Protocol Airtime routing Metric
下载PDF
A Review on Wireless Mesh Networks
17
作者 TAN Ling ZHANG Shun-yi 《南京邮电大学学报(自然科学版)》 2010年第1期48-58,共11页
Wireless mesh networks (WMNs) are new kind of networking technology which facilitate the extension of wireless local area networks into wide areas and have emerged as a key technology for next-generation wireless netw... Wireless mesh networks (WMNs) are new kind of networking technology which facilitate the extension of wireless local area networks into wide areas and have emerged as a key technology for next-generation wireless networking.Due to the advantages of WMNs over other wireless networks,they are now a promising approach for future network access.Typical applications range from home broadband Internet access and community networking to wireless metropolitan area networks.Meanwhile,the considerable efforts in academic range from network architecture,network capacity,layered communication protocols,security,cross-layer design,etc.Still many technical challenges exist in designing affordable,reliable,and sustainable WMNs infrastructures.In order to provide a better understanding of these challenges,this paper presents a detailed investigation of current technologies for WMNs,and it will help to guide and refocus future works in this area. 展开更多
关键词 计算机网络 WMNS 网络安全 网络协议
下载PDF
A Micro-Payment Based Isolation ofMisbehavior Secure Routing for Sensor Network
18
作者 LIHui WEIWei CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期93-97,共5页
In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-... In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-payment scheme proposed in MIM is the firstvirtual currency system that can be suit lor sensor network environment, Based on the micro-paymentscheme, we device an energy aware routing protocol, which forwards packets by auction. Furthermore,the base station can detect and isolate misbehave or non-cooptrare nodes according to the routinginformation. 展开更多
关键词 secure routing wireless sensor network MICRO-PAYMENT
下载PDF
A Secure and Reliable Routing Protocol for Wireless Mesh Networks
19
作者 黄仁俊 萧宇凯 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期466-475,共10页
This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds o... This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices(or nodes). Individual node cooperates by forwarding packets to each other,allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security. 展开更多
关键词 asymmetric link wireless mesh networks secure routing
原文传递
Distributed channel assignment combined with routing over multi-radio multi-channel wireless mesh networks 被引量:3
20
作者 YUAN Fei-fei LI Xu +3 位作者 LIU Kai-ming LIU Yuan-an DU Xiao SHI Xin-rong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第4期6-13,共8页
In order to realize the reduction of equipment cost and the demand of higher capacity, wireless mesh network (WMN) router devices usually have several interfaces and work on multi-channels. Jointing channel allocati... In order to realize the reduction of equipment cost and the demand of higher capacity, wireless mesh network (WMN) router devices usually have several interfaces and work on multi-channels. Jointing channel allocation, interface assignment and routing can efficiently improve the network capacity. This paper presents an efficient channel assignment scheme combined with the multi-radio link quality source routing (MR-LQSR) protocol, which is called channel assignment with MR-LQSR (CA-LQSR). In this scheme, a physical interference model is established: calculated transmission time (CTT) is proposed as the metric of channel assignment, which can reflect the real network environment and channel interference best, and enhanced weighted cumulative expected transmission time (EWCETT) is proposed as the routing metric, which preserves load balancing and bandwidth of links. Meantime, the expression of EWCETT contains the value of CTT, thus the total cost time of channel assignment and routing can be reduced. Simulation results show that our method has advantage of higher throughput, lower end-to-end time delay, and less network cost over some other existing methods. 展开更多
关键词 wireless mesh networks distributed channel assignment routing protocol MR-LQSR CA-LQSR
原文传递
上一页 1 2 27 下一页 到第
使用帮助 返回顶部