期刊文献+
共找到5,535篇文章
< 1 2 250 >
每页显示 20 50 100
Critical Nodes Identification: A Non-Cooperative Method for Unknown Topology Information in Ad Hoc Networks
1
作者 Wenwei Yue Peiang Zuo +4 位作者 Wengang Li Yao Zhang Yunfeng Zhang Changle Li Jun Huang 《China Communications》 SCIE CSCD 2023年第7期217-232,共16页
The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significan... The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significantly.To protect the network efficiently,critical nodes should be identified accurately and rapidly.Unlike existing critical node identification methods for unknown topology that identify critical nodes according to historical information,this paper develops a critical node identification method to relax the prior topology information condition about critical nodes.Specifically,we first deduce a theorem about the minimum communication range for a node through the number of nodes and deployment ranges,and prove the universality of the theorem in a realistic two-dimensional scenario.After that,we analyze the relationship between communication range and degree value for each node and prove that the greater number of nodes within the communication range of a node,the greater degree value of nodes with high probability.Moreover,we develop a novel strategy to improve the accuracy of critical node identification without topology information.Finally,simulation results indicate the proposed strategy can achieve high accuracy and low redundancy while ensuring low time consumption in the scenarios with unknown topology information in ad hoc networks. 展开更多
关键词 ad hoc networks node location informa-tion ID generation strategy communication range critical nodes
下载PDF
An aerial ammunition ad hoc network collaborative localization algorithm based on relative ranging and velocity measurement in a highly-dynamic topographic structure
2
作者 Hao Wu Peng-fei Wu +2 位作者 Zhang-song Shi Shi-yan Sun Zhong-hong Wu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第7期231-248,共18页
In the internet of battlefield things, ammunition is becoming networked and intelligent, which depends on location information. Therefore, this paper focuses on the self-organized network collaborative localization of... In the internet of battlefield things, ammunition is becoming networked and intelligent, which depends on location information. Therefore, this paper focuses on the self-organized network collaborative localization of munitions with an aerial three-dimensional(3D) highly-dynamic topographic structure under a satellite denied environment. As for aerial networked munitions, the measurement of munitions is objectively incomplete due to the degenerated and interrupted link of munitions. For this reason, a cluster-oriented collaborative localization method is put forward in this paper. Multidimensional scaling(MDS) was first integrated with a trilateration localization method(TLM) to construct a relative localization algorithm for determining the relative location of a mobile cluster network. The information related to relative velocity was then combined into a collaborative localization framework to devise a TLM-vMDS algorithm. Finally, an iterative refinement algorithm based on scaling by majorizing a complicated function(SMACOF) was employed to effectively eliminate the influence of incomplete link observation on localization accuracy. Compared with the currently available advanced algorithms, the proposed TLM-vMDS algorithm achieves higher localization accuracy and faster convergence for a cluster of extensively networked munitions, and also offers better numerical stability and robustness for highspeed motion models. 展开更多
关键词 Highly-dynamic topographic structure MDS Relative ranging Aerial ammunition ad hoc network
下载PDF
Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm
3
作者 C.Nandagopal P.Siva Kumar +1 位作者 R.Rajalakshmi S.Anandamurugan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期113-126,共14页
Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data tr... Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data transfer,and data loss,affect the effectiveness of Transmission Control Protocols(TCP)on such wireless ad hoc networks.To avoid the problem,in this paper,mobility-aware zone-based routing in VANET is proposed.To achieve this con-cept,in this paper hybrid optimization algorithm is presented.The hybrid algo-rithm is a combination of Ant colony optimization(ACO)and artificial bee colony optimization(ABC).The proposed hybrid algorithm is designed for the routing process which is transmitting the information from one place to another.The optimal routing process is used to avoid traffic and link failure.Thefitness function is designed based on Link stability and Residual energy.The validation of the proposed algorithm takes solution encoding,fitness calculation,and updat-ing functions.To perform simulation experiments,NS2 simulator software is used.The performance of the proposed approach is analyzed based on different metrics namely,delivery ratio,delay time,throughput,and overhead.The effec-tiveness of the proposed method compared with different algorithms.Compared to other existing VANET algorithms,the hybrid algorithm has proven to be very efficient in terms of packet delivery ratio and delay. 展开更多
关键词 Vehicle ad hoc network transmission control protocol multi-hop data transmission ant colony optimization artificial bee colony optimization
下载PDF
A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks
4
作者 A.F.M.Suaib Akhter A.F.M.Shahen Shah +3 位作者 Mohiuddin Ahmed Nour Moustafa UnalÇavu¸soglu Ahmet Zengin 《Computers, Materials & Continua》 SCIE EI 2021年第7期229-246,共18页
Vehicular Ad hoc Networks(VANETs)become a very crucial addition in the Intelligent Transportation System(ITS).It is challenging for a VANET system to provide security services and parallelly maintain high throughput b... Vehicular Ad hoc Networks(VANETs)become a very crucial addition in the Intelligent Transportation System(ITS).It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources.To overcome these challenges,we propose a blockchain-based Secured Cluster-based MAC(SCB-MAC)protocol.The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages.The message which contains emergency information and requires Strict Delay Requirement(SDR)for transmission are called safety messages(SM).Cluster Members(CMs)sign SMs with their private keys while sending them to the blockchain to confirm authentication,integrity,and confidentiality of the message.A Certificate Authority(CA)is responsible for physical verification,key generation,and privacy preservation of the vehicles.We implemented a test scenario as proof of concept and tested the safety message transmission(SMT)protocol in a real-world platform.Computational and storage overhead analysis shows that the proposed protocol for SMT implements security,authentication,integrity,robustness,non-repudiation,etc.while maintaining the SDR.Messages that are less important compared to the SMs are called non-safety messages(NSM)and vehicles use RTS/CTS mechanism for NSM transmission.Numerical studies show that the proposed NSM transmission method maintains 6 times more throughput,2 times less delay and 125%less Packet Dropping Rate(PDR)than traditional MAC protocols.These results prove that the proposed protocol outperforms the traditional MAC protocols. 展开更多
关键词 ad hoc networks data security digital signatures distributed storage intelligent vehicles vehicular ad hoc networks wireless communication
下载PDF
Mobile Ad Hoc Network与Internet互联的技术研究 被引量:3
5
作者 胡中功 邹莉 沈斌 《武汉科技学院学报》 2005年第6期65-69,共5页
分析了移动IP和AODV协议的工作机理,对MANET与Internet互联的关键技术,包括协议转换、地址分配、网关发现、路由发现与数据传输等问题进行了详细的讨论,并对今后的研究工作进行了展望。
关键词 MOBILE ad hoc network Internet 移动IP AODV路由协议
下载PDF
An Ant Colony Algorithm Based Congestion Elusion Routing Strategy for Mobile Ad Hoc Networks 被引量:2
6
作者 Dan-Yang Qin Hong-Wei Li +2 位作者 Lin Ma Hong-Bin Ma Qun Ding 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第3期99-103,共5页
A critical challenge for mobile ad hoc networks is the design of efficient routing protocols which are able to provide high bandwidth utilization and desired fairness in mobile wireless environment without any fixed c... A critical challenge for mobile ad hoc networks is the design of efficient routing protocols which are able to provide high bandwidth utilization and desired fairness in mobile wireless environment without any fixed communication establishments. Although extensive efforts have already been devoted to providing optimization based distributed congestion elusion strategy for efficient bandwidth utilization and fair allocation in both wired and wireless networks,a common assumption therein is the fixed link capacities,which will unfortunately limit the application scope in mobile ad hoc networks where channels keep changing. In this paper,an effective congestion elusion strategy is presented explicitly based on ant colony algorithm for mobile ad hoc networks, which will explore the optimal route between two nodes promptly,meanwhile forecast congestion state of the link. Accordingly,a new path will be found rapidly to have the flow spread around to relieve the congestion degree. Compared with OLSR,the strategy proposed will greatly reduce the packet loss ratio and the average end-to-end delay at the same time,which illustrate that it will make use of networking resource effectively. 展开更多
关键词 mobile ad hoc networks congestion elusion ant conloy algorithm CERS OLSR
下载PDF
Adaptive 3D Routing Protocol for Flying Ad Hoc Networks Based on Prediction-Driven Q-Learning 被引量:1
7
作者 Min Zhang Chao Dong +3 位作者 Simeng Feng Xin Guan Huichao Chen Qihui Wu 《China Communications》 SCIE CSCD 2022年第5期302-317,共16页
The routing protocols are paramount to guarantee the Quality of Service(QoS)for Flying Ad Hoc Networks(FANETs).However,they still face several challenges owing to high mobility and dynamic topology.This paper mainly f... The routing protocols are paramount to guarantee the Quality of Service(QoS)for Flying Ad Hoc Networks(FANETs).However,they still face several challenges owing to high mobility and dynamic topology.This paper mainly focuses on the adaptive routing protocol and proposes a Three Dimensional Q-Learning(3DQ)based routing protocol to guarantee the packet delivery ratio and improve the QoS.In 3DQ routing,we propose a Q-Learning based routing decision scheme,which contains a link-state prediction module and routing decision module.The link-state prediction module allows each Unmanned Aerial Vehicle(UAV)to predict the link-state of Neighboring UAVs(NUs),considering their Three Dimensional mobility and packet arrival.Then,UAV can produce routing decisions with the help of the routing decision module considering the link-state.We evaluate the various performance of 3DQ routing,and simulation results demonstrate that 3DQ can improve packet delivery ratio,goodput and delay of baseline protocol at most 71.36%,89.32%and 83.54%in FANETs over a variety of communication scenarios. 展开更多
关键词 ROUTING unmanned aerial vehicles(UAVs) flying ad hoc networks(FANETs) PREDICTION Q-LEARNING
下载PDF
An Energy Based Dynamic AODV Routing Protocol in Wireless Ad Hoc Networks 被引量:1
8
作者 Wuyungerile Li Baoyintu +2 位作者 Bing Jia Junxiu Wang Takashi Watanabe 《Computers, Materials & Continua》 SCIE EI 2020年第4期353-368,共16页
In recent years,with the rapid development of the Internet and wireless communication technology,wireless Ad hoc networks have received more attention.Due to the limited transmission range and energy of nodes in Ad ho... In recent years,with the rapid development of the Internet and wireless communication technology,wireless Ad hoc networks have received more attention.Due to the limited transmission range and energy of nodes in Ad hoc networks,it is important to establish a reliable and energy-balanced transmission path in Ad hoc networks.This paper proposes an energy-based dynamic routing protocol based on the existing AODV routing protocol,which has the following two aspects of improvement:(1)In the route discovery process,a node selects a suitable route from the minimum energy consumption route and the energy-balanced route designed in this paper according to a“Mark”bit that representing remaining energy of a node.(2)Based on(1),a route interruption update strategy was proposed to restart the route discovery process when node energy was used excessively.Simulation results demonstrate that compared with AODV and other existing routing protocols,proposed algorithm can reduce network energy consumption and balance node energy,thus extending the network lifetime. 展开更多
关键词 ad hoc networks routing protocol ENERGY network lifetime
下载PDF
Issues and Challenges in Node Connectivity in Mobile Ad Hoc Networks: A Holistic Review 被引量:2
9
作者 Mohit Jain Satish Chand 《Wireless Engineering and Technology》 2016年第1期24-35,共12页
One of the fundamental properties of an ad hoc network is its connectivity. Maintaining connectivity in wireless networks is extremely difficult due to dynamic changing topology of MANETs. There are several techniques... One of the fundamental properties of an ad hoc network is its connectivity. Maintaining connectivity in wireless networks is extremely difficult due to dynamic changing topology of MANETs. There are several techniques to understand the connectivity level for a given network topology. In this paper, we examine the existing methods and discuss the issues and challenges that are still insurmountable in order to enhance the connectivity properties of wireless multi hop networks. 展开更多
关键词 ad hoc networks CONNECTIVITY Topology Control Critical Transmitting Range Node Density Energy Consumpution Routing Critical Points k-Connectivity
下载PDF
Linear Network Coding Based Fast Data Synchronization for Wireless Ad Hoc Networks with Controlled Topology
10
作者 Die Hu Xuejun Zhu +1 位作者 Min Gong Shaoshi Yang 《China Communications》 SCIE CSCD 2022年第5期46-53,共8页
Fast data synchronization in wireless ad hoc networks is a challenging and critical problem.It is fundamental for efficient information fusion,control and decision in distributed systems.Previously,distributed data sy... Fast data synchronization in wireless ad hoc networks is a challenging and critical problem.It is fundamental for efficient information fusion,control and decision in distributed systems.Previously,distributed data synchronization was mainly studied in the latency-tolerant distributed databases,or assuming the general model of wireless ad hoc networks.In this paper,we propose a pair of linear network coding(NC)and all-to-all broadcast based fast data synchronization algorithms for wireless ad hoc networks whose topology is under operator’s control.We consider both data block selection and transmitting node selection for exploiting the benefits of NC.Instead of using the store-and-forward protocol as in the conventional uncoded approach,a compute-and-forward protocol is used in our scheme,which improves the transmission efficiency.The performance of the proposed algorithms is studied under different values of network size,network connection degree,and per-hop packet error rate.Simulation results demonstrate that our algorithms significantly reduce the times slots used for data synchronization compared with the baseline that does not use NC. 展开更多
关键词 all-to-all broadcast data synchronization distributed system network coding wireless ad hoc network UAV
下载PDF
A Cyber–Physical Routing Protocol Exploiting Trajectory Dynamics for Mission-Oriented Flying Ad Hoc Networks
11
作者 Die Hu Shaoshi Yang +2 位作者 Min Gong Zhiyong Feng Xuejun Zhu 《Engineering》 SCIE EI CAS 2022年第12期217-227,共11页
As a special type of mobile ad hoc network(MANET),the flying ad hoc network(FANET)has the potential to enable a variety of emerging applications in both civilian wireless communications(e.g.,5G and 6G)and the defense ... As a special type of mobile ad hoc network(MANET),the flying ad hoc network(FANET)has the potential to enable a variety of emerging applications in both civilian wireless communications(e.g.,5G and 6G)and the defense industry.The routing protocol plays a pivotal role in FANET.However,when designing the routing protocol for FANET,it is conventionally assumed that the aerial nodes move randomly.This is clearly inappropriate for a mission-oriented FANET(MO-FANET),in which the aerial nodes typically move toward a given destination from given departure point(s),possibly along a roughly deterministic flight path while maintaining a well-established formation,in order to carry out certain missions.In this paper,a novel cyber–physical routing protocol exploiting the particular mobility pattern of an MO-FANET is proposed based on cross-disciplinary integration,which makes full use of the missiondetermined trajectory dynamics to construct the time sequence of rejoining and separating,as well as the adjacency matrix for each node,as prior information.Compared with the existing representative routing protocols used in FANETs,our protocol achieves a higher packet-delivery ratio(PDR)at the cost of even lower overhead and lower average end-to-end latency,while maintaining a reasonably moderate and stable network jitter,as demonstrated by extensive ns-3-based simulations assuming realistic configurations in an MO-FANET. 展开更多
关键词 Cyber-physical system Flying ad hoc network Routing protocol Trajectory dynamics Unmanned aerial vehicle
下载PDF
On Connectivity of Flying Ad Hoc Networks in the Presence of Ground Terminal
12
作者 Chao Liu Zhongshan Zhang 《China Communications》 SCIE CSCD 2021年第9期1-10,共10页
The Unmanned Aerial Vehicle(UAV)technologies are envisioned to play an important role in the era of Air-Space-Ground integrated networks.In this paper,we investigate the connectivity of a Flying Ad hoc Network(FANET)i... The Unmanned Aerial Vehicle(UAV)technologies are envisioned to play an important role in the era of Air-Space-Ground integrated networks.In this paper,we investigate the connectivity of a Flying Ad hoc Network(FANET)in the presence of a groundbased terminal.In particular,the connected probability of the UAV-to-UAV (U2U) link as well as that of the UAV-to-Ground (U2G) link in a three dimensional (3D) space are analyzed.Furthermore,to mitigate the aggregate interference from UAV individuals,a priority based power control scheme is implemented for enhancing the connectivity of both U2U and U2G links.Numerical results illustrate the effectiveness of the proposed analysis. 展开更多
关键词 flying ad hoc network UAV swarm CONNECTIVITY power control connected probability
下载PDF
Genetic Algorithm Routing Protocol for Mobile Ad Hoc Network
13
作者 Raed Alsaqour Saif Kamal +1 位作者 Maha Abdelhaq Yazan Al Jeroudi 《Computers, Materials & Continua》 SCIE EI 2021年第7期941-960,共20页
Mobile ad hoc network(MANET)is a dynamically reconfigurable wireless network with time-variable infrastructure.Given that nodes are highly mobile,MANET’s topology often changes.These changes increase the difficulty i... Mobile ad hoc network(MANET)is a dynamically reconfigurable wireless network with time-variable infrastructure.Given that nodes are highly mobile,MANET’s topology often changes.These changes increase the difficulty in finding the routes that the packets use when they are routed.This study proposes an algorithm called genetic algorithm-based location-aided routing(GALAR)to enhance the MANET routing protocol efficiency.The GALAR algorithm maintains an adaptive update of the node location information by adding the transmitting node location information to the routing packet and selecting the transmitting node to carry the packets to their destination.The GALAR was constructed based on a genetic optimization scheme that considers all contributing factors in the delivery behavior using criterion function optimization.Simulation results showed that the GALAR algorithm can make the probability of packet delivery ratio more than 99%with less network overhead.Moreover,GALAR was compared to other algorithms in terms of different network evaluation measures.The GALAR algorithm significantly outperformed the other algorithms that were used in the study. 展开更多
关键词 Mobile ad hoc network location-aided routing protocol location information genetic algorithm
下载PDF
AODV-RM:route maintenance against route flapping in Ad hoc network
14
作者 叶亮 沙学军 徐玉滨 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2011年第2期17-22,共6页
Route flapping is common in mobile Ad hoc networks.It usually causes large delay or even interruption during communication.This paper proposed a routing protocol AODV-RM to alleviate this effect.AODV-RM selects routes... Route flapping is common in mobile Ad hoc networks.It usually causes large delay or even interruption during communication.This paper proposed a routing protocol AODV-RM to alleviate this effect.AODV-RM selects routes with the lightest traffic load,to avoid striving for hot nodes with other users,hence minishes the chance of collision.AODV-RM keeps all valid routes to the destination in its routing table as backups.When the link under usage breaks down,AODV-RM shifts to a valid route in its routing table instead of route repair or researching,which ensures the continuity of communication.AODV-RM chooses a route maintenance scheme by the network topology.If the origination has multi routes to the destination,only the origination maintains routes.Otherwise,middle nodes,instead of the origination,maintain sub-routes to the destination.By simulating the traditional AODV and AODV-RM,the results showed that AODV-RM has a lower drop rate and better performance against route flapping. 展开更多
关键词 route flapping route maintenance routing protocol ad hoc network
下载PDF
Security of Ad Hoc Network
15
作者 Zhou Yajian Yang Yixian(Beijing University of Posts and Telecommunications,Beijing 100876,China) 《ZTE Communications》 2007年第4期24-26,共3页
An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),h... An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management. 展开更多
关键词 hoc WORK NODE Security of ad hoc network OSPF
下载PDF
On the Choice of Parameter Values for Simulation Based Experiments on Mobile Ad Hoc Networks
16
作者 Saher S. Manaseer 《International Journal of Communications, Network and System Sciences》 2016年第4期90-97,共8页
Over the course of the last 10 years, research on Mobile Ad Hoc Networks has witnessed high levels of focus. Because of this field being a relatively new topic, most researchers have focused on using simulation as the... Over the course of the last 10 years, research on Mobile Ad Hoc Networks has witnessed high levels of focus. Because of this field being a relatively new topic, most researchers have focused on using simulation as the first choice for performance measurement and evaluation. In order to contribute to the credibility and reliability of research results on Ad Hoc networks, this paper addresses the issue of choosing parameter values that are used as input for simulators used in such experiments by surveying a sample of recently published papers on Ad Hoc Networks. Results show that in the majority of revised papers, the simulation environment is not carefully planned as reflected by the diversity and quality of parameters used. 展开更多
关键词 Simulation PARAMETERS ad hoc networks
下载PDF
History-Based Backoff Algorithms for Mobile Ad Hoc Networks
17
作者 Saher Manaseer Fatima Badwan 《Journal of Computer and Communications》 2016年第11期37-46,共11页
Mobile Ad hoc Network (MANET) is a wireless network consisting of mobile devices (laptops, smart phones, etc.) that move and communicate with each other without the use of any existing network infrastructure or centra... Mobile Ad hoc Network (MANET) is a wireless network consisting of mobile devices (laptops, smart phones, etc.) that move and communicate with each other without the use of any existing network infrastructure or centralized server to avoid collisions which have negative effects on the performance of the network. Access to the shared media is controlled by a Backoff algorithm that is a part of the Media Access Protocol. In this paper, we improve the History Based Probabilistic Backoff (HPPB) algorithm by modifying the increment/decrement behavior of the Contention Window to introduce History Based Increment Backoff (HBIB) algorithm which outperforms HBPB in terms of throughput and end-to-end delay with various numbers of nodes and different traffic loads. 展开更多
关键词 Media Access Protocol BACKOFF Mobile ad hoc networks
下载PDF
Void Aware Position Based Opportunistic Routing for QoS in Mobile Ad Hoc Networks
18
作者 V. Raji N. Mohan Kumar 《Circuits and Systems》 2016年第8期1504-1521,共18页
The unique anywhere, anytime wireless communication support offers, tremendous potential for the next generation of applications in a Mobile Ad-hoc Network (MANET). The Quality of Service (QoS) has been the ever deman... The unique anywhere, anytime wireless communication support offers, tremendous potential for the next generation of applications in a Mobile Ad-hoc Network (MANET). The Quality of Service (QoS) has been the ever demanding task of wireless communication to satisfy the application requirements. Geographical routing employs a greedy forwarding technique to deliver the packets to the destination and to owe the communication void, it fails to render the expected level of QoS. Opportunistic routing technique effectively utilizes the advantages of broadcasting nature of the wireless medium and selects a set of forwarding candidates instead of relying on a greedy node. To improve the efficiency of QoS routing in sparse and highly dynamic network topology, this paper proposes the Void-Aware Position based Opportunistic Routing (VAPOR). The VAPOR maintains 2-hop neighbor information to take a routing decision, but it is limited to 1-hop information when the node density is high. It efficiently balances the storage overhead and communication delay due to void and it increases the network throughput even under a sparse network. To provide a certain assurance level for packet reachability, VAPOR decides the potential forwarders based on the forwarding probability that measures link stability, capacity, and connectivity factor. It adaptively favors a path that avoids frequent link failure and unreliable link usage. By limiting the propagation area of duplicate packets, VAPOR reduces wastage of network resources, and ittakes the advantage of concurrent batch forwarding to avoid further duplication and unnecessary delay. 展开更多
关键词 Mobile ad hoc network Opportunistic Forwarding QoS Routing Void Alleviation
下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:7
19
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer suffcient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more effcient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 NANET 路由协议 安全性 入侵检测 定时自动控制
下载PDF
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model 被引量:5
20
作者 FU Cai HONG Fan LI Rui-xian HONG Liang CHEN Jing 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期188-192,共5页
In traditional networks ,the authentication is performed by certificate authoritys(CA),which can’t be built in distributed mobile Ad Hoc Networks however. In this paper, we propose a fully self-organized public key m... In traditional networks ,the authentication is performed by certificate authoritys(CA),which can’t be built in distributed mobile Ad Hoc Networks however. In this paper, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short,the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust requirement of hosts better. 展开更多
关键词 ad hoc网络 双向信任模型 公用密钥管理 信息安全
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部