期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
多速率IEEE802.11 Ad Hoc网络协议栈跨层优化
1
作者 王卫疆 郑锋 郭乐江 《空军雷达学院学报》 2011年第6期451-454,458,共5页
采用凸优化理论研究了Ad Hoc网络协议栈跨层优化问题.以多速率IEEE802.11Ad Hoc网络协议栈优化为例,建立其网络协议层系统模型,定义了Ad Hoc网络效用函数和性能参数约束条件,采用拉格朗日对偶分解法对该模型进行跨层分解,并运用梯度投... 采用凸优化理论研究了Ad Hoc网络协议栈跨层优化问题.以多速率IEEE802.11Ad Hoc网络协议栈优化为例,建立其网络协议层系统模型,定义了Ad Hoc网络效用函数和性能参数约束条件,采用拉格朗日对偶分解法对该模型进行跨层分解,并运用梯度投影法获得优化问题的最优解或次优解,实现了物理层、MAC层及网络层在路由、功率分配和传输调度几方面的联合优化.数值仿真与计算结果验证了该算法的有效性和正确性. 展开更多
关键词 多速率IEEE802.11 AD hoc网络协议 跨层优化
下载PDF
基于NS2的移动Ad hoc网络典型网络协议比较 被引量:7
2
作者 廖登 《邵阳学院学报(自然科学版)》 2005年第3期43-48,共6页
无线Ad hoc网络作为一种典型的自组织网络,其路由协议一直是其实际应用研究的重点.文章详细的介绍了移动ad hoc网络的三种典型的网络协议DSDV,AODV和DSR.对于网络路由协议的仿真,本文应用了基于Unix平台的免费的网络仿真软件NS2,并详细... 无线Ad hoc网络作为一种典型的自组织网络,其路由协议一直是其实际应用研究的重点.文章详细的介绍了移动ad hoc网络的三种典型的网络协议DSDV,AODV和DSR.对于网络路由协议的仿真,本文应用了基于Unix平台的免费的网络仿真软件NS2,并详细的分析了仿真场景的生成,源代码的应用,以及仿真脚本的分析.给出了三种典型的ad hoc协议在NS2的仿真条件下的分组投递率的比较,提供了比较结果.结果表明,在本文所建立的移动场景下,按需路由协议比表驱动协议的分组投递率较高. 展开更多
关键词 AD hoc网络协议 NS2 分组投递率
下载PDF
移动Ad Hoc网络的安全问题 被引量:1
3
作者 叶成绪 《甘肃科技》 2008年第23期33-35,3,共4页
Ad Hoc网络是一种没有固定基础设施、网络拓扑不断变化的新型网络,固有的脆弱性使它容易遭受各种安全威胁。主要介绍了首先分析了移动Ad Hoc网络的不安全因素以及现有协议的不足之处,然后将移动Ad Hoc网络在密钥分配与管理、入侵检测两... Ad Hoc网络是一种没有固定基础设施、网络拓扑不断变化的新型网络,固有的脆弱性使它容易遭受各种安全威胁。主要介绍了首先分析了移动Ad Hoc网络的不安全因素以及现有协议的不足之处,然后将移动Ad Hoc网络在密钥分配与管理、入侵检测两个方面的安全方案进行了分类论述,并指出了下一步研究方向。 展开更多
关键词 AD hoc网络 AD hoc网络协议 密钥管理 入侵检测
下载PDF
基于Ad Hoc的有效广播路由算法 被引量:2
4
作者 王琳珠 范亚芹 胡可刚 《吉林大学学报(信息科学版)》 CAS 2009年第1期40-43,共4页
为解决Ad Hoc网络中节点的复杂性问题,提出一种基于MWMCDS(Maximal Weight Minimum ConnectedDominating Set)路由算法。该方法考虑到网络中节点的多样性和复杂性,将节点的功率大小或在线时间长短对应为每个节点的权值,在寻找尽可能小的... 为解决Ad Hoc网络中节点的复杂性问题,提出一种基于MWMCDS(Maximal Weight Minimum ConnectedDominating Set)路由算法。该方法考虑到网络中节点的多样性和复杂性,将节点的功率大小或在线时间长短对应为每个节点的权值,在寻找尽可能小的CDS(Connected Dominating Set)的同时使其权值尽可能大,为更好地协调管理网络中其他节点提供一个高效可靠的通信路由。并对其中3种路由协议进行了网络仿真及性能分析比较。结果表明,在相同的仿真场景下,DSR(Dynamic Source Routing)和AODV(Ad Hoc On-DemandDistance Vector)协议的PDF(Packet Delivery Fraction)传输性能都能达到94%以上,好于DSDV(Destination-Sequenced Distance Vector)协议。 展开更多
关键词 AD hoc网络协议 网络仿真 分组投递率 MWMCDS
下载PDF
Routing Protocol Based on Grover’s Searching Algorithm for Mobile Ad-hoc Networks 被引量:3
5
作者 孟利民 宋文波 《China Communications》 SCIE CSCD 2013年第3期145-156,共12页
In Mobile Ad-hoc Networks (MANETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated wit... In Mobile Ad-hoc Networks (MANETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated with traditional routing protocols in MANETs, such as poor anti-fading performance and slow convergence rate, for basic Dynamic Source Routing (DSR), we propose a new routing model based on Grover's searching algorithm. With this new routing model, each node maintains a node vector function, and all the nodes can obtain a node probability vector using Grover's algorithm, and then select an optimal routing according to node probability. Simulation results show that compared with DSR, this new routing protocol can effectively extend the network lifetime, as well as reduce the network delay and the number of routing hops. It can also significantly improve the anti-jamming capability of the network. 展开更多
关键词 Grover's channel fading additive bit error rate searching algorithm noise network delay
下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
6
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
下载PDF
A mesh based routing protocol in vehicular ad hoc networks
7
作者 黄宏宇 Li +2 位作者 Minglu Wu Minyou 《High Technology Letters》 EI CAS 2009年第4期363-368,共6页
This paper studies a routing protocol used in the application of collecting real-time traffic information using mobile vehicles to monitor traffic status. The biggest challenge of vehicular ad hoe network routing prot... This paper studies a routing protocol used in the application of collecting real-time traffic information using mobile vehicles to monitor traffic status. The biggest challenge of vehicular ad hoe network routing protocol lies in the mismatch between the direction of moving vehicles and routed data. In order to deal with this mismatch, a mesh based routing protocol with a two-tier network architecture is proposed. By using mesh nodes deployed at intersections, data can be routed through an optimized path which can improve the delivery ratio and reduce the consumption of network resources. The simulation uses the mobility model processed from the GPS data of taxis mnning in Shanghai urban areas. The result shows that the proposed protocol outperforms the existing flooding protocol. 展开更多
关键词 vehicular ad hoe networks (vANETs) DEPLOYMENT routing protocol
下载PDF
A Trusted Routing Protocol Based on GeoDTN+Nav in VANET 被引量:3
8
作者 WU Qiwu LIU Qingzi +1 位作者 ZHANG Long ZHANG Zhiming 《China Communications》 SCIE CSCD 2014年第A02期166-174,共9页
Because the node of vehicular ad-hoc networks has the characteristics of high mobility and encounter temporary, a trust management between the nodes in the routing process becomes more difficult. To solve this problem... Because the node of vehicular ad-hoc networks has the characteristics of high mobility and encounter temporary, a trust management between the nodes in the routing process becomes more difficult. To solve this problem, this paper proposes a new trusted routing protocol in VANET based on GeoDTN+Nav by using trust management model of Bayesian and the three opportunistic routing forwarding models, which includes four steps of the routing initialization, the routing discovery, the trusted routing establishment and the routing deletion. The proposed protocol not only improves the security of routing, but also has the lower time complexity. Besides, experimental results and analysis show that the protocol has achieved good performance in the removal ratio of malicious nodes, correct reception ratio of packet and the message payload. 展开更多
关键词 vehicular ad-hoc network geographic DTN routing with navigator prediction trust management trust routing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部