期刊文献+
共找到1,224篇文章
< 1 2 62 >
每页显示 20 50 100
Deep Reinforcement Learning-Based Collaborative Routing Algorithm for Clustered MANETs 被引量:1
1
作者 Zexu Li Yong Li Wenbo Wang 《China Communications》 SCIE CSCD 2023年第3期185-200,共16页
Flexible adaptation to differentiated quality of service(QoS)is quite important for future 6G network with a variety of services.Mobile ad hoc networks(MANETs)are able to provide flexible communication services to use... Flexible adaptation to differentiated quality of service(QoS)is quite important for future 6G network with a variety of services.Mobile ad hoc networks(MANETs)are able to provide flexible communication services to users through self-configuration and rapid deployment.However,the dynamic wireless environment,the limited resources,and complex QoS requirements have presented great challenges for network routing problems.Motivated by the development of artificial intelligence,a deep reinforcement learning-based collaborative routing(DRLCR)algorithm is proposed.Both routing policy and subchannel allocation are considered jointly,aiming at minimizing the end-to-end(E2E)delay and improving the network capacity.After sufficient training by the cluster head node,the Q-network can be synchronized to each member node to select the next hop based on local observation.Moreover,we improve the performance of training by considering historical observations,which can improve the adaptability of routing policies to dynamic environments.Simulation results show that the proposed DRLCR algorithm outperforms other algorithms in terms of resource utilization and E2E delay by optimizing network load to avoid congestion.In addition,the effectiveness of the routing policy in a dynamic environment is verified. 展开更多
关键词 artificial intelligence deep reinforcement learning collaborative routing manetS 6G
下载PDF
EsECC_SDN:Attack Detection and Classification Model for MANET
2
作者 Veera Ankalu Vuyyuru Youseef Alotaibi +2 位作者 Neenavath Veeraiah Saleh Alghamdi Korimilli Sirisha 《Computers, Materials & Continua》 SCIE EI 2023年第3期6665-6688,共24页
Mobile Ad Hoc Networks(MANET)is the framework for social networking with a realistic framework.In theMANETenvironment,based on the query,information is transmitted between the sender and receiver.In the MANET network,... Mobile Ad Hoc Networks(MANET)is the framework for social networking with a realistic framework.In theMANETenvironment,based on the query,information is transmitted between the sender and receiver.In the MANET network,the nodes within the communication range are involved in data transmission.Even the nodes that lie outside of the communication range are involved in the transmission of relay messages.However,due to the openness and frequent mobility of nodes,they are subjected to the vast range of security threats inMANET.Hence,it is necessary to develop an appropriate security mechanism for the dataMANET environment for data transmission.This paper proposed a security framework for the MANET network signature escrow scheme.The proposed framework uses the centralised Software Defined Network(SDN)with an ECC cryptographic technique.The developed security framework is stated as Escrow Elliptical Curve Cryptography SDN(EsECC_SDN)for attack detection and classification.The developed EsECC-SDN was adopted in two stages for attack classification and detection:(1)to perform secure data transmission between nodes SDN performs encryption and decryption of the data;and(2)to detect and classifies the attack in theMANET hyper alert based HiddenMarkovModel Transductive Deep Learning.Furthermore,the EsECC_SDN is involved in the assignment of labels in the transmitted data in the database(DB).The escrow handles these processes,and attacks are evaluated using the hyper alert.The labels are assigned based on the k-medoids attack clustering through label assignment through a transductive deep learning model.The proposed model uses the CICIDS dataset for attack detection and classification.The developed framework EsECC_SDN’s performance is compared to that of other classifiers such as AdaBoost,Regression,and Decision Tree.The performance of the proposed EsECC_SDN exhibits∼3%improved performance compared with conventional techniques. 展开更多
关键词 manet security CLASSIFIER CRYPTOGRAPHY ATTACK escrow ECC
下载PDF
Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications
3
作者 M.V.Narayana Vadla Pradeep Kumar +2 位作者 Ashok Kumar Nanda Hanumantha Rao Jalla Subba Reddy Chavva 《Computers, Materials & Continua》 SCIE EI 2023年第4期587-607,共21页
Mobile ad hoc networks (MANETs) are subjected to attack detectionfor transmitting and creating new messages or existing message modifications.The attacker on another node evaluates the forging activity in themessage d... Mobile ad hoc networks (MANETs) are subjected to attack detectionfor transmitting and creating new messages or existing message modifications.The attacker on another node evaluates the forging activity in themessage directly or indirectly. Every node sends short packets in a MANETenvironment with its identifier, location on the map, and time through beacons.The attackers on the network broadcast the warning message usingfaked coordinates, providing the appearance of a network collision. Similarly,MANET degrades the channel utilization performance. Performancehighly affects network performance through security algorithms. This paperdeveloped a trust management technique called Enhanced Beacon TrustManagement with Hybrid Optimization (EBTM-Hyopt) for efficient clusterhead selection and malicious node detection. It tries to build trust amongconnected nodes and may improve security by requiring every participatingnode to develop and distribute genuine, accurate, and trustworthy materialacross the network. Specifically, optimized cluster head election is done periodicallyto reduce and balance the energy consumption to improve the lifetimenetwork. The cluster head election optimization is based on hybridizingParticle Swarm Optimization (PSO) and Gravitational Search OptimizationAlgorithm (GSOA) concepts to enable and ensure reliable routing. Simulationresults show that the proposed EBTM-HYOPT outperforms the state-of-thearttrust model in terms of 297.99 kbps of throughput, 46.34% of PDR, 13%of energy consumption, 165.6 kbps of packet loss, 67.49% of end-to-end delay,and 16.34% of packet length. 展开更多
关键词 manet malicious nodes CLUSTERING trust management beacon message
下载PDF
Optimized Resource Allocation and Queue Management for Traffic Control in MANET
4
作者 I.Ambika Surbhi Bhatia +1 位作者 Shakila Basheer Pankaj Dadheech 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1323-1342,共20页
A set of mobile devices that employs wireless transmission for communication is termed Mobile Ad hoc Networks(MANETs).Offering better communication services among the users in a centralized organization is the primary... A set of mobile devices that employs wireless transmission for communication is termed Mobile Ad hoc Networks(MANETs).Offering better communication services among the users in a centralized organization is the primary objective of the MANET.Due to the features of MANET,this can directly End-to-End Delay(EED)the Quality of Service(QoS).Hence,the implementation of resource management becomes an essential issue in MANETs.This paper focuses on the efficient Resource Allocation(RA)for many types of Traffic Flows(TF)in MANET.In Mobile Ad hoc Networks environments,the main objective of Resource Allocation(RA)is to process consistently available resources among terminals required to address the service requirements of the users.These three categories improve performance metrics by varying transmission rates and simulation time.For solving that problem,the proposed work is divided into Queue Management(QM),Admission Control(AC)and RA.For effective QM,this paper develops a QM model for elastic(EL)and inelastic(IEL)Traffic Flows.This research paper presents an AC mechanism for multiple TF for effective AC.This work presents a Resource Allocation Using Tokens(RAUT)for various priority TF for effective RA.Here,nodes have three cycles which are:Non-Critical Section(NCS),Entry Section(ES)and Critical Section(CS).When a node requires any resources,it sends Resource Request Message(RRM)to the ES.Elastic and inelastic TF priority is determined using Fuzzy Logic(FL).The token holder selects the node from the inelastic queue with high priority for allocating the resources.Using Network Simulator-2(NS-2),simulations demonstrate that the proposed design increases Packet Delivery Ratio(PDR),decrease Packet Loss Ratio(PLR),minimise the Fairness and reduce the EED. 展开更多
关键词 manet resource allocation end-to-end delay fuzzy logic QOS
下载PDF
A Novel Gradient Boosted Energy Optimization Model(GBEOM)for MANET
5
作者 Neenavath Veeraiah Youseef Alotaibi +1 位作者 Saleh Alghamdi Satish Thatavarti 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期637-657,共21页
Mobile Ad Hoc Network(MANET)is an infrastructure-less network that is comprised of a set of nodes that move randomly.In MANET,the overall performance is improved through multipath multicast routing to achieve the qual... Mobile Ad Hoc Network(MANET)is an infrastructure-less network that is comprised of a set of nodes that move randomly.In MANET,the overall performance is improved through multipath multicast routing to achieve the quality of service(quality of service).In this,different nodes are involved in the information data collection and transmission to the destination nodes in the network.The different nodes are combined and presented to achieve energy-efficient data transmission and classification of the nodes.The route identification and routing are established based on the data broadcast by the network nodes.In transmitting the data packet,evaluating the data delivery ratio is necessary to achieve optimal data transmission in the network.Furthermore,energy consumption and overhead are considered essential factors for the effective data transmission rate and better data delivery rate.In this paper,a Gradient-Based Energy Optimization model(GBEOM)for the route in MANET is proposed to achieve an improved data delivery rate.Initially,the Weighted Multi-objective Cluster-based Spider Monkey Load Balancing(WMC-SMLB)technique is utilized for obtaining energy efficiency and load balancing routing.The WMC algorithm is applied to perform an efficient node clustering process from the considered mobile nodes in MANET.Load balancing efficiency is improved with a higher data delivery ratio and minimum routing overhead based on the residual energy and bandwidth estimation.Next,the Gradient Boosted Multinomial ID3 Classification algorithm is applied to improve the performance of multipath multicast routing in MANET with minimal energy consumption and higher load balancing efficiency.The proposed GBEOM exhibits∼4%improved performance in MANET routing. 展开更多
关键词 manet ROUTING load balancing CLUSTERING gradient boosting
下载PDF
Avoid Suspicious Route of Blackhole Nodes in MANET’s:Using A Cooperative Trapping
6
作者 Abdllkader Esaid Mary Agoyi 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1901-1915,共15页
Mobile Ad hoc Network(MANET)is decentralized wireless network and can communicate without existing infrastructure in many areas.MANET is vulnerable to various attacks that affect its performance such as blackhole atta... Mobile Ad hoc Network(MANET)is decentralized wireless network and can communicate without existing infrastructure in many areas.MANET is vulnerable to various attacks that affect its performance such as blackhole attack.Blackhole attacker,inject fault routing information to persuade the source node to select the path with malicious node as the shortest path.To eliminate malicious nodes from launching any collaborative attack.A cooperative Trapping Approach(CTA)was proposed based on modifying Ad-hoc On-demand Distance Vector(AODV)routing protocol and trapping the malicious nodes by responding to the trap request message.The approach aims to eliminate and rule out both single and collaborative malicious blackhole nodes from any attack.The approach realizes a backward tracking mechanism to perform the elimination process.The proposed algorithm(CTA)was executed using NS-2 network simulator.The performance metrics that has been considered to evaluate the performance of the proposed algorithm such as throughput,end to end delay,packet delivery ratio,and consuming energy.The experimental results have shown the performance metrics of the proposed approach outperformed other state of at algorithms. 展开更多
关键词 AODV Blackhole manet Malicious node
下载PDF
Intrusion Detection System Through Deep Learning in Routing MANET Networks
7
作者 Zainab Ali Abbood DoguÇagdaşAtilla Çagatay Aydin 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期269-281,共13页
Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in promi-nence.For... Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in promi-nence.For reasons including node mobility,due to MANET’s potential to provide small-cost solutions for real-world contact challenges,decentralized management,and restricted bandwidth,MANETs are more vulnerable to security threats.When protecting MANETs from attack,encryption and authentication schemes have their limits.However,deep learning(DL)approaches in intrusion detection sys-tems(IDS)can adapt to the changing environment of MANETs and allow a sys-tem to make intrusion decisions while learning about its mobility in the environment.IDSs are a secondary defiance system for mobile ad-hoc networks vs.attacks since they monitor network traffic and report anything unusual.Recently,many scientists have employed deep neural networks(DNNs)to address intrusion detection concerns.This paper used MANET to recognize com-plex patterns by focusing on security standards through efficiency determination and identifying malicious nodes,and mitigating network attacks using the three algorithms presented Cascading Back Propagation Neural Network(CBPNN),Feedforward-Neural-Network(FNN),and Cascading-Back-Propagation-Neural-Network(CBPNN)(FFNN).In addition to Convolutional-Neural-Network(CNN),these primary forms of deep neural network(DNN)building designs are widely used to improve the performance of intrusion detection systems(IDS)and the use of IDS in conjunction with machine learning(ML).Further-more,machine learning(ML)techniques than their statistical and logical methods provide MANET network learning capabilities and encourage adaptation to differ-ent environments.Compared with another current model,The proposed model has better average receiving packet(ARP)and end-to-end(E2E)performance.The results have been obtained from CBP,FFNN and CNN 74%,82%and 85%,respectively,by the time(27,18,and 17 s). 展开更多
关键词 ARP CBPNN CNN DNN DL E2E FFNN IDS ML manet security
下载PDF
Improving QoS Using Mobility-Based Optimized Multipath Routing Protocol in MANET
8
作者 S.J.Sangeetha T.Rajendran 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1169-1181,共13页
Mobile Ad-hoc Networks(MANETs)connect numerous nodes to communicate data from the sender node to the target node.Due to the lack of an infrastructure network,mobile nodes communicate through wireless without an access... Mobile Ad-hoc Networks(MANETs)connect numerous nodes to communicate data from the sender node to the target node.Due to the lack of an infrastructure network,mobile nodes communicate through wireless without an access point.MANET does not have a centralized controller and has a dynamic network topology,which increases link failure and energy consumption resulting in excessive path delay,loss of Quality of service(QoS),and reduced throughput during data communication.Congestion is a significant problem when the QoS of the link carrying the data is degraded.Routing is one of the vital challenges of MANET due to the very dynamic and distributed nature of MANET.This article introduces a Mobility-Based Optimized Multipath Routing Protocol(MBOMRP)and an Efficient Reliable Link-State Transmission(ERLST)algorithm to overcome these problems.The proposed Mobility-Based Optimized Multipath Routing Protocol(MBOMRP)is utilized for route discovery and maintenance to efficiently avoid traffic and sleeping nodes.ERLST algorithm is used for efficient data transmission to increase QoS measurement parameters like throughput,Packet Delivery Ratio(PDR),and minimize the latency performance.The proposed MBOMRP-ERLST algorithm improves data communication network lifetime,avoids link failures,and provides efficient results compared with previous algorithms. 展开更多
关键词 manet QOS link failure improve data communication avoid traffic network lifetime MBOMRP-ERLST
下载PDF
Region Centric GL Feature Approximation Based Secure Routing for Improved QoS in MANET
9
作者 S.Soundararajan R.Prabha +1 位作者 M.Baskar T.J.Nagalakshmi 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期267-280,共14页
Secure routing in Mobile Adhoc Network(Manet)is the key issue now a day in providing secure access to different network services.As mobile devices are used in accessing different services,performing secure routing bec... Secure routing in Mobile Adhoc Network(Manet)is the key issue now a day in providing secure access to different network services.As mobile devices are used in accessing different services,performing secure routing becomes a challenging task.Towards this,different approaches exist whichfind the trusted route based on their previous transmission details and behavior of different nodes.Also,the methods focused on trust measurement based on tiny information obtained from local nodes or with global information which are incomplete.How-ever,the adversary nodes are more capable and participate in each transmission not just to steal the data also to generate numerous threats in degrading QoS(Quality of Service)parameters like throughput,packet delivery ratio,and latency of the network.This encourages us in designing efficient routing scheme to max-imize QoS performance.To solve this issue,a two stage trust verification scheme and secure routing algorithm named GL-Trust(Global-Local-Trust)is presented.The method involves in route discovery as like popular AODV(Adaptive On-demand Distance Vector)which upgrades the protocol to collect other information like transmission supported,successful transmissions,energy,mobility,the num-ber of neighbors,and the number of alternate route to the same destination and so on.Further,the method would perform global trust approximation to measure the value of global trust and perform local trust approximation to measure local trust.Using both the measures,the method would select a optimal route to perform routing.The protocol is designed to perform localized route selection when there is a link failure which supports the achievement of higher QoS performance.By incorporating different features in measuring trust value towards secure routing,the proposed GL-Trust scheme improves the performance of secure routing as well as other QoS factors. 展开更多
关键词 manet secure routing two stage trust GL-trust quality of service
下载PDF
Design of Fuzzy Logic Control Framework for QoS Routing in MANET
10
作者 M.Vargheese S.Vanithamani +1 位作者 D.Stalin David Ganga Rama Koteswara Rao 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3479-3499,共21页
Wireless networks with no infrastructure arise as a result of multiple wireless devices working together.The Mobile Ad hoc Network(MANET)is a system for connecting independently located Mobile Nodes(MNs)via wireless l... Wireless networks with no infrastructure arise as a result of multiple wireless devices working together.The Mobile Ad hoc Network(MANET)is a system for connecting independently located Mobile Nodes(MNs)via wireless links.A MANET is self-configuring in telecommunications,while MN produces non-infrastructure networks that are entirely decentralized.Both the MAC and routing layers of MANETs take into account issues related to Quality of Service(QoS).When culling a line of optical discernment communication,MANET can be an effective and cost-saving route cull option.To maintain QoS,however,more or fewer challenges must be overcome.This paper proposes a Fuzzy Logic Control(FLC)methodology for specifying a probabilistic QoS guaranteed for MANETs.The framework uses network node mobility to establish the probabil-istic quality of service.Fuzzy Logic(FL)implementations were added to Network Simulator-3(NS-3)and used with the proposed FLC framework for simulation.Researchers have found that for a given node’s mobility,the path’s bandwidth decreases with time,hop count,and radius.It is resolutely based on this fuzzy rule that the priority index for a packet is determined.Also,by avoiding sending pack-ets(PKT)out of source networks when there are no beneficial routes,bandwidth is not wasted.The FLC outperforms the scheduling methods with a wide range of results.To improve QoS within MANETs,it is therefore recommended that FLC is used to synchronize packets.Thus,using these performance metrics,the QoS-responsible routing can opt for more stable paths.Based on network simulation,it is evident that incorporating QoS into routing protocols is meant to improve traf-fic performance,in particular authentic-time traffic. 展开更多
关键词 manet quality of service fuzzy logic mobile node network traffic
下载PDF
Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET
11
作者 S.Padmapriya R.Shankar +3 位作者 R.Thiagarajan N.Partheeban A.Daniel S.Arun 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期491-505,共15页
The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various t... The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio. 展开更多
关键词 Mobile ad-hoc network(manet) wireless ad hoc network ADOV ATTACKS denial of service
下载PDF
An Improved Multi-Objective Particle Swarm Optimization Routing on MANET
12
作者 G.Rajeshkumar M.Vinoth Kumar +3 位作者 K.Sailaja Kumar Surbhi Bhatia Arwa Mashat Pankaj Dadheech 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1187-1200,共14页
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized organization.The primary a... A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized organization.The primary aim of MANETs is to extendflexibility into the self-directed,mobile,and wireless domain,in which a cluster of autonomous nodes forms a MANET routing system.An Intrusion Detection System(IDS)is a tool that examines a network for mal-icious behavior/policy violations.A network monitoring system is often used to report/gather any suspicious attacks/violations.An IDS is a software program or hardware system that monitors network/security traffic for malicious attacks,sending out alerts whenever it detects malicious nodes.The impact of Dynamic Source Routing(DSR)in MANETs challenging blackhole attack is investigated in this research article.The Cluster Trust Adaptive Acknowledgement(CTAA)method is used to identify unauthorised and malfunctioning nodes in a MANET environment.MANET system is active and provides successful delivery of a data packet,which implements Kalman Filters(KF)to anticipate node trustworthiness.Furthermore,KF is used to eliminate synchronisation errors that arise during the sending and receiving data.In order to provide an energy-efficient solution and to minimize network traffic,route optimization in MANET by using Multi-Objective Particle Swarm Optimization(MOPSO)technique to determine the optimal num-ber of clustered MANET along with energy dissipation in nodes.According to the researchfindings,the proposed CTAA-MPSO achieves a Packet Delivery Ratio(PDR)of 3.3%.In MANET,the PDR of CTAA-MPSO improves CTAA-PSO by 3.5%at 30%malware. 展开更多
关键词 manet intrusion detection system CLUSTER kalmanfilter dynamic source routing multi-objective particle swarm optimization packet delivery ratio
下载PDF
Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation
13
作者 Y.M.Mahaboob John G.Ravi 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3653-3666,共14页
Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To redu... Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To reduce this drawback,this paper proposes a new secure routing algorithm based on real-time partial ME(Mobility,energy)approximation.The routing method RRME(Real-time Regional Mobility Energy)divides the whole network into several parts,and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly.It is done in the path discovery phase,estimated to identify and remove malicious nodes.In addition,Trusted Forwarding Factor(TFF)calculates the various nodes based on historical records and other characteristics of multiple nodes.Similarly,the calculated QoS Support Factor(QoSSF)calculating by the Data Forwarding Support(DFS),Throughput Support(TS),and Lifetime Maximization Support(LMS)to any given path.One route was found to implement the path of maximizing MANET QoS based on QoSSF value.Hence the proposed technique produces the QoS based on real-time regional ME feature approximation.The proposed simulation implementation is done by the Network Simulator version 2(NS2)tool to produce better performance than other methods.It achieved a throughput performance had 98.5%and a routing performance had 98.2%. 展开更多
关键词 Mobile ad-hoc network(manet) routing problem regional approximation secure routing QoS support factor trusted forwarding factor data forwarding support(DFS) mobility energy
下载PDF
MANET中TCP改进研究综述 被引量:34
14
作者 冯彦君 孙利民 +1 位作者 钱华林 宋成 《软件学报》 EI CSCD 北大核心 2005年第3期434-444,共11页
传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现... 传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现象.当出现非拥塞因素丢包时,传统 TCP 将错误地触发拥塞控制,从而引起TCP 性能低下.任何改进机制都可以分为发现问题和解决问题两个阶段.首先概括了 MANET 中影响 TCP 性能的若干问题;然后针对发现问题和解决问题两个阶段,详细地对每一阶段中存在的各种可行方法进行了分类、分析和比较;最后指出了 MANET 中 TCP 性能优化的研究方向. 展开更多
关键词 manet(mobile ad HOC network) TCP(transmission control protocol) 性能 包丢失
下载PDF
一种基于机器学习的MANET网络入侵检测性能评估方法研究 被引量:10
15
作者 蒋一波 王雨晨 +2 位作者 王万良 张祯 陈琼 《计算机科学》 CSCD 北大核心 2013年第11A期170-174,191,共6页
移动Ad hoc网络(MANET,Mobile Ad hoc Networks)正得到越来越广泛的应用,相应的网络安全问题也开始得到广泛的关注。研究MANET网络可能遭遇的攻击方式,提出基于机器学习技术的入侵检测性能评估模型,并提出一个综合评价指标,比较了7种机... 移动Ad hoc网络(MANET,Mobile Ad hoc Networks)正得到越来越广泛的应用,相应的网络安全问题也开始得到广泛的关注。研究MANET网络可能遭遇的攻击方式,提出基于机器学习技术的入侵检测性能评估模型,并提出一个综合评价指标,比较了7种机器学习算法在MANET网络入侵检测中的性能表现,对于构建安全有效的MANET网络具有重要的意义。使用GloMoSim仿真工具对MANET网络正常行为及黑洞、洪水、丢包3种入侵行为进行模拟,并详细分析了各种攻击情况下,7种机器学习算法的性能表现。分析结果显示,该评估模型能较好地反映出各种机器学习算法的性能,其中,多层感知器、逻辑回归和支持向量机具有较高的检测率及较低的误报率。 展开更多
关键词 manet 入侵检测 机器学习 性能评估
下载PDF
MANET路由协议研究进展 被引量:21
16
作者 周伯生 吴介一 张飒兵 《计算机研究与发展》 EI CSCD 北大核心 2002年第10期1168-1177,共10页
MANET(mobile ad- hoc network)是独立的网络自治系统 ,不依赖于固定主干网 (但可以与其配合 ) ,该系统能快速部署到位 ,建立起一套完整、强大、高抗毁的网络通信系统 ,提供有效的数据和多媒体通信服务 .MANET使用无线通信技术 ,所有主... MANET(mobile ad- hoc network)是独立的网络自治系统 ,不依赖于固定主干网 (但可以与其配合 ) ,该系统能快速部署到位 ,建立起一套完整、强大、高抗毁的网络通信系统 ,提供有效的数据和多媒体通信服务 .MANET使用无线通信技术 ,所有主机均可以移动 ,主机间以无线链路连接 .为了进行有效通信 ,必须在移动主机间建立合适的路由 .回顾了 MANET路由技术的研究进展 ,并对有关路由协议进行了评述 ,这些协议涵盖了目前能见到的绝大部分类型的 MANET路由协议 . 展开更多
关键词 manet 路由协议 分组无线网络 多媒体通信 网络自治系统
下载PDF
MANET路由协议及其性能研究 被引量:6
17
作者 肖书成 唐学文 +2 位作者 王康 邹宗惠 罗娅 《计算机工程与设计》 CSCD 2004年第7期1133-1136,共4页
MANET(Mobile Ad Hoc Network)是由一组无线移动主机组成的一个没有任何建立好的基础设施或集中管理设备的临时网络。网络拓扑易变、带宽、能源有限是Ad Hoc移动网络的主要特点。重点介绍了Ad hoc网络的组网关键技术——路由协议,并对... MANET(Mobile Ad Hoc Network)是由一组无线移动主机组成的一个没有任何建立好的基础设施或集中管理设备的临时网络。网络拓扑易变、带宽、能源有限是Ad Hoc移动网络的主要特点。重点介绍了Ad hoc网络的组网关键技术——路由协议,并对现在的具有代表性的协议性能进行了比较,研究了在不同环境下的各自路由协议仿真实验所体现出来的性能差别,对Ad hoc的组网具有指导意义。 展开更多
关键词 manet 路由协议 AD HOC网络 目的节点序列距离矢量协议 DSDV
下载PDF
MANET网络中一种基于灰色区域的移动预测路由协议及多径备份路由扩展 被引量:7
18
作者 周文佳 陈旿 +2 位作者 肖迪 张鹏飞 慕德俊 《西北工业大学学报》 EI CAS CSCD 北大核心 2012年第5期739-745,共7页
MANET网络中拓扑结构频繁变化的特点,经常导致网络存在通信路径不稳定,通信质量较差的情况。文章提出一种基于灰色区域的移动预测路由协议LP-OLSR,该协议能够适应网络拓扑结构的快速变化,结合节点灰色区域范围,预测链路未来时刻的连接状... MANET网络中拓扑结构频繁变化的特点,经常导致网络存在通信路径不稳定,通信质量较差的情况。文章提出一种基于灰色区域的移动预测路由协议LP-OLSR,该协议能够适应网络拓扑结构的快速变化,结合节点灰色区域范围,预测链路未来时刻的连接状态,在链路失效前重新计算路由,减少因为链路中断产生的时延。并且结合多径技术扩展至LP-OLSR-M协议,通过多径路由算法寻找一条备份路径,在当前链路即将失效前切换至备份路径,进一步保证了数据的稳定传输。仿真结果表明,新协议的QoS指标较OLSR协议相比有了明显改善,有效提高了MANET网络的通信质量。 展开更多
关键词 路由算法 路由协议 网络协议 网络路由 卡尔曼滤波 计算机仿真 manet网络 移动预测 灰色区域 多径路由
下载PDF
MANET路由选择协议的比较分析研究 被引量:24
19
作者 张禄林 李承恕 《电子学报》 EI CAS CSCD 北大核心 2000年第11期88-92,共5页
本文对MANET路由协议的研究现状进行了综述 ,揭示了它们的特点和功能 ,比较了各自的贡献和不足 ,本文还对协议仿真的进展情况进行了综述 ,并对四种有代表意义的协议的仿真结果进行了分析 。
关键词 路由选择 manet 通信协议 INTERNET
下载PDF
一种基于身份标识的MANET组密钥协商协议 被引量:6
20
作者 宋震 周贤伟 窦文华 《电子学报》 EI CAS CSCD 北大核心 2008年第10期1862-1868,共7页
组密钥是安全组通信中实现信息机密性和完整性的关键.适应于MANET有限的计算、通信资源,MANET组密钥管理协议应具有较少的计算量,较低的运算强度.分析了MANET组密钥管理方案所应具备的性质;结合固定网络环境下具有最小通信量的组密钥协... 组密钥是安全组通信中实现信息机密性和完整性的关键.适应于MANET有限的计算、通信资源,MANET组密钥管理协议应具有较少的计算量,较低的运算强度.分析了MANET组密钥管理方案所应具备的性质;结合固定网络环境下具有最小通信量的组密钥协商协议STR协议及基于身份标识的公钥密码技术,提出了一个基于身份标识的贡献式MANET组密钥协商管理协议CEAGKP,具有较小的通信量、较强的安全性与可扩展性,能够很好地适应MANET环境的要求.仿真结果证明了CEAGKP具有较好的伸缩性. 展开更多
关键词 manet 身份标识 组密钥 协商
下载PDF
上一页 1 2 62 下一页 到第
使用帮助 返回顶部