期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Energy Based Random Repeat Trust Computation in Delay Tolerant Network
1
作者 S.Dheenathayalan B.Paramasivan 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2845-2859,共15页
As the use of mobile devices continues to rise,trust administration will significantly improve security in routing the guaranteed quality of service(QoS)supply in Mobile Ad Hoc Networks(MANET)due to the mobility of th... As the use of mobile devices continues to rise,trust administration will significantly improve security in routing the guaranteed quality of service(QoS)supply in Mobile Ad Hoc Networks(MANET)due to the mobility of the nodes.There is no continuance of network communication between nodes in a delay-tolerant network(DTN).DTN is designed to complete recurring connections between nodes.This approach proposes a dynamic source routing protocol(DSR)based on a feed-forward neural network(FFNN)and energybased random repetition trust calculation in DTN.If another node is looking for a node that swerved off of its path in this situation,routing will fail since it won’t recognize it.However,in the suggested strategy,nodes do not stray from their pathways for routing.It is only likely that the message will reach the destination node if the nodes encounter their destination or an appropriate transitional node on their default mobility route,based on their pattern of mobility.The EBRRTC-DTN algorithm(Energy based random repeat trust computation)is based on the time that has passed since nodes last encountered the destination node.Compared to other existing techniques,simulation results show that this process makes the best decision and expertly determines the best and most appropriate route to send messages to the destination node,which improves routing performance,increases the number of delivered messages,and decreases delivery delay.Therefore,the suggested method is better at providing better QoS(Quality of Service)and increasing network lifetime,tolerating network system latency. 展开更多
关键词 MANETS energy competent dynamic source routing protocol delay tolerant network energy-based random repeat trust computation quality of service network lifetime routing
下载PDF
Analysis on topology control boundary conditions in delay tolerant wireless sensor networks
2
作者 李鲁群 李顼 +1 位作者 沈学民 周熔 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第3期15-20,共6页
In wireless sensor networks(WSNs),nodes are often scheduled to alternate between working mode and sleeping mode from energy efficiency point of view.When delay is tolerable,it is not necessary to preserve network conn... In wireless sensor networks(WSNs),nodes are often scheduled to alternate between working mode and sleeping mode from energy efficiency point of view.When delay is tolerable,it is not necessary to preserve network connectivity during activity(working or sleeping) scheduling,enabling more sensors to be switched to sleeping mode and thus more energy savings.In this paper,the nodal behavior in such delay-tolerant WSNs(DT-WSNs) is modeled and analyzed.The maximum hop count with a routing path is derived in order not to violate a given sensor-to-sink delay constraint,along with extensive simulation results. 展开更多
关键词 delay tolerance wireless sensor networks M /G /1 /K queue little’s Law
下载PDF
NPBMT: A Novel and Proficient Buffer Management Technique for Internet of Vehicle-Based DTNs
3
作者 Sikandar Khan Khalid Saeed +3 位作者 Muhammad Faran Majeed Salman A.AlQahtani Khursheed Aurangzeb Muhammad Shahid Anwar 《Computers, Materials & Continua》 SCIE EI 2023年第10期1303-1323,共21页
Delay Tolerant Networks(DTNs)have the major problem of message delay in the network due to a lack of endto-end connectivity between the nodes,especially when the nodes are mobile.The nodes in DTNs have limited buffer ... Delay Tolerant Networks(DTNs)have the major problem of message delay in the network due to a lack of endto-end connectivity between the nodes,especially when the nodes are mobile.The nodes in DTNs have limited buffer storage for storing delayed messages.This instantaneous sharing of data creates a low buffer/shortage problem.Consequently,buffer congestion would occur and there would be no more space available in the buffer for the upcoming messages.To address this problem a buffer management policy is proposed named“A Novel and Proficient Buffer Management Technique(NPBMT)for the Internet of Vehicle-Based DTNs”.NPBMT combines appropriate-size messages with the lowest Time-to-Live(TTL)and then drops a combination of the appropriate messages to accommodate the newly arrived messages.To evaluate the performance of the proposed technique comparison is done with Drop Oldest(DOL),Size Aware Drop(SAD),and Drop Larges(DLA).The proposed technique is implemented in the Opportunistic Network Environment(ONE)simulator.The shortest path mapbased movement model has been used as the movement path model for the nodes with the epidemic routing protocol.From the simulation results,a significant change has been observed in the delivery probability as the proposed policy delivered 380 messages,DOL delivered 186 messages,SAD delivered 190 messages,and DLA delivered only 95 messages.A significant decrease has been observed in the overhead ratio,as the SAD overhead ratio is 324.37,DLA overhead ratio is 266.74,and DOL and NPBMT overhead ratios are 141.89 and 52.85,respectively,which reveals a significant reduction of overhead ratio in NPBMT as compared to existing policies.The network latency average of DOL is 7785.5,DLA is 5898.42,and SAD is 5789.43 whereas the NPBMT latency average is 3909.4.This reveals that the proposed policy keeps the messages for a short time in the network,which reduces the overhead ratio. 展开更多
关键词 delay tolerant networks buffer management message drop policy ONE simulator NPBMT
下载PDF
RFID Based Non-Preemptive Random Sleep Scheduling in WSN
4
作者 Tianle Zhang Lihua Yin +4 位作者 Xiang Cui Abhishek Behl Fuqiang Dong Ziheng Cheng Kuo Ma 《Computers, Materials & Continua》 SCIE EI 2020年第10期835-845,共11页
In Wireless Sensor Network(WSN),because battery and energy supply are constraints,sleep scheduling is always needed to save energy while maintaining connectivity for packet delivery.Traditional schemes have to ensure ... In Wireless Sensor Network(WSN),because battery and energy supply are constraints,sleep scheduling is always needed to save energy while maintaining connectivity for packet delivery.Traditional schemes have to ensure high duty cycling to ensure enough percentage of active nodes and then derogate the energy efficiency.This paper proposes an RFID based non-preemptive random sleep scheduling scheme with stable low duty cycle.It employs delay tolerant network routing protocol to tackle the frequent disconnections.A low-power RFID based non-preemptive wakeup signal is used to confirm the availability of next-hop before sending packet.It eliminates energy consumption of repeated retransmission of the delayed packets.Moreover,the received wakeup signal is postponed to take effect until the sleep period is finished,and the waken node then responds to the sending node to start the packet delivery.The scheme can keep stable duty cycle and then ensure energy saving effect compared with other sleeping scheduling methods. 展开更多
关键词 Sleep scheduling RFID partially connected delay Tolerant Network(DTN) wakeup non-preemptive
下载PDF
Cross-Layer Design for EH Systems with Finite Buffer Constraints
5
作者 Mohammed Baljon Shailendra Mishra 《Computers, Materials & Continua》 SCIE EI 2021年第10期129-144,共16页
Energy harvesting(EH)technology in wireless communication is a promising approach to extend the lifetime of future wireless networks.A cross-layer optimal adaptation policy for a point-to-point energy harvesting(EH)wi... Energy harvesting(EH)technology in wireless communication is a promising approach to extend the lifetime of future wireless networks.A cross-layer optimal adaptation policy for a point-to-point energy harvesting(EH)wireless communication system with finite buffer constraints over a Rayleigh fading channel based on a Semi-Markov Decision Process(SMDP)is investigated.Most adaptation strategies in the literature are based on channeldependent adaptation.However,besides considering the channel,the state of the energy capacitor and the data buffer are also involved when proposing a dynamic modulation policy for EH wireless networks.Unlike the channeldependent policy,which is a physical layer-based optimization,the proposed cross-layer dynamic modulation policy is a guarantee to meet the overflow requirements of the upper layer by maximizing the throughput while optimizing the transmission power and minimizing the dropping packets.Based on the states of the channel conditions,data buffer,and energy capacitor,the scheduler selects a particular action corresponding to the selected modulation constellation.Moreover,the packets are modulated into symbols according to the selected modulation type to be ready for transmission over the Rayleigh fading channel.Simulations are used to test the performance of the proposed cross-layer policy scheme,which shows that it significantly outperforms the physical layer channel-dependent policy scheme in terms of throughput only. 展开更多
关键词 Energy harvesting technology cross-layer design delay tolerant network fading channels resource allocation telecommunication power management telecommunication scheduling
下载PDF
Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks
6
作者 Khairol Amali bin Ahmad Mohammad Nazmul Hasan +1 位作者 Md.Sharif Hossen Khaleel Ahmad 《Computers, Materials & Continua》 SCIE EI 2021年第3期3075-3087,共13页
Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where t... Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where the nodes observe the mobility model of human society.It is a kind of Delay Tolerant Networks(DTNs)that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another.Considering its inception,there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.For routing messages,PSN uses different techniques such asDistributed Expectation-Based Spatio-Temporal(DEBT)Epidemic(DEBTE),DEBT Cluster(DEBTC),and DEBT Tree(DEBTT).Understanding on how the network environment is affected for these routing strategies are the main motivation of this research.In this paper,we have investigated the impact of network nodes,the message copies per transmission,and the overall carrying out of these routing protocols.ONE simulator was used to analyze those techniques on the basis of delivery,overhead,and latency.The result of this task demonstrates that for a particular simulation setting,DEBTE is the best PSN routing technique among all,against DEBTC and DEBTT. 展开更多
关键词 Pocket switched networks routings distributed cluster detections delay tolerant networks mobility in network
下载PDF
Ant Routing Protocol with Location Services in Intermittently Connected MANETs
7
作者 S. Ramesh R. Indira 《Circuits and Systems》 2016年第7期1087-1097,共11页
Wireless and mobile networks seem to deliver tremendous uses. In its way, MANET leads to enormous real world applications. Routing allows us to implement many real world applications. Complete affinity in an infrequen... Wireless and mobile networks seem to deliver tremendous uses. In its way, MANET leads to enormous real world applications. Routing allows us to implement many real world applications. Complete affinity in an infrequent network like ICMANET is highly impossible. Disconnected MANET is also known as ICMANET which is also a DTN (Delay Torrent Network) that supports for higher delays. It is laborious process to execute routing in a diffused network process to execute routing in a diffused network. To deliver the data packets towards the destined node to its best, a new strategy in routing called Ant routing protocol in concoction with storage strategy LoDis has been proposed. Despite of routing, security is still an unsolved problem. To evaluate this situation, this paper presents a methodology called agent technology which yields a secure routing. Hostile node in the network is spotted with the help of agent at each node. A cryptographic algorithm Advanced Encryption Standard (AES) is habituated to improve secure communication in wide range Mobility and total number of nodes in the network act as variables in examining the hostile nodes in the network to judge the standard of security. Improved performance along with the security is the point to be highlighted. 展开更多
关键词 MANET ICMANET delay Tolerant Network ACO A-LODIS Agent AES
下载PDF
DAWN: A Density Adaptive Routing for Deadline-Based Data Collection in Vehicular Delay Tolerant Networks 被引量:2
8
作者 Qiao Fu Bhaskar Krishnamachari Lin Zhang 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第3期230-241,共12页
Vehicular Delay Tolerant Networks (DTN) use moving vehicles to sample and relay sensory data for urban areas, making it a promising low-cost solution for the urban sensing and infotainment applications. However, rou... Vehicular Delay Tolerant Networks (DTN) use moving vehicles to sample and relay sensory data for urban areas, making it a promising low-cost solution for the urban sensing and infotainment applications. However, routing in the DTN in real vehicle fleet is a great challenge due to uneven and fluctuant node density caused by vehicle mobility patterns. Moreover, the high vehicle density in urban areas makes the wireless channel capacity an impactful factor to network performance. In this paper, we propose a local capacity constrained density adaptive routing algorithm for large scale vehicular DTN in urban areas which targets to increase the packet delivery ratio within deadline, namely Density Adaptive routing With Node deadline awareness (DAWN). DAWN enables the mobile nodes awareness of their neighbor density, to which the nodes' transmission manners are adapted so as to better utilize the limited capacity and increase the data delivery probability within delay constraint based only on local information. Through simulations on Manhattan Grid Mobility Model and the real GPS traces of 4960 taxi cabs for 30 days in the Beijing city, DAWN is demonstrated to outperform other classical DTN routing schemes in performance of delivery ratio and coverage within delay constraint. These simulations suggest that DAWN is practically useful for the vehicular DTN in urban areas. 展开更多
关键词 delay tolerant networks node density adaptive routing deadline-based data collection channel capacity
原文传递
Message redundancy removal of multi-copy routing in delay tolerant MANET 被引量:2
9
作者 YU Hai-zheng MA Jian-feng BIAN Hong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第1期42-48,共7页
This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve t... This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve the efficiency that messages are delivered successfully, multiple message copies routing protocols are usually used, but the network load is increased due to a large number of message redundancies. In the study, by using counter method, every node adds an encounter counter based on epidemic routing scheme. The counter records the number which the node encounters other nodes with the same message copy. If the counter of a node reaches tbe installed threshold, the node removes the copy. Theoretical analysis gives a lower bound of threshold in delay tolerant MANET. According to the lower bound of threshold, a rational threshold is installed in real environment. With proposed scheme message copies decrease obviously and are removed completely finally. The successful delivery efficiency is still the same as epidemic routing and the redundant copies are efficiently controlled to a relatively low level Computer simulations give the variation of message copies concerning different thresholds in fast and slow mobility scenes. 展开更多
关键词 delay tolerant networks mobile Ad-hoc networks message routing redundancy removal
原文传递
Geographic Information and Node Selfish-Based Routing Algorithm for Delay Tolerant Networks 被引量:1
10
作者 Fang Lu Jianbo Li +2 位作者 Shan Jiang Youmei Song Fushu Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第3期243-253,共11页
In Delay Tolerant Networks (DTNs), some routing algorithms ignore that most nodes are selfish, i.e., nodes are willing to use their own resources to forward messages to nodes with whom they have a relationship. In v... In Delay Tolerant Networks (DTNs), some routing algorithms ignore that most nodes are selfish, i.e., nodes are willing to use their own resources to forward messages to nodes with whom they have a relationship. In view of this phenomenon, we propose a routing algorithm based on Geographic Information and Node Selfishness (GINS). To choose a forwarding node, GINS combines nodes' willingness to forward and their geographic information to maximize the possibility of contacting the destination. GINS formulates the message forwarding process as a 0-1 Knapsack Problem with Assignment Restrictions to satisfy node demands for selfishness. Extensive simulations were conducted, and results show that GINS can achieve a high delivery ratio and a lower hop count compared with GRONE and LPHU. Furthermore, its overhead ratio is 25% and 30% less than that of GRONE and LPHU, respectively. 展开更多
关键词 delay tolerant networks node willingness routing algorithm geographic information forwarding process
原文传递
A maximum flow algorithm for buffer-limited delay tolerant networks 被引量:1
11
作者 Tao Zhang Songfeng Deng +2 位作者 Hongyan Li Ronghui Hou Haichao Zhang 《Journal of Communications and Information Networks》 2017年第3期52-60,共9页
Deep space networks,satellite networks,ad hoc networks,and the Internet can be modeled as DTNs(Delay Tolerant Networks).As a fundamental problem,the maximum flow problem is of vital importance for routing and service ... Deep space networks,satellite networks,ad hoc networks,and the Internet can be modeled as DTNs(Delay Tolerant Networks).As a fundamental problem,the maximum flow problem is of vital importance for routing and service scheduling in networks.However,there exists no permanent end-to-end path since the topology and the characteristics of links are time-variant,resulting in a crucial maximum flow problem in DTNs.In this paper,we focus on the single-source-single-sink maximum flow problem of buffer-limited DTNs,followed by a valid algorithm to solve it.First,the BTAG(Buffer-limited Time Aggregated Graph)is constructed for modeling the buffer-limited DTN.Then,on the basis of BTAG,the two-way cache transfer series and the relevant transfer rules are designed,and thus a BTAG-based maximum flow algorithm is proposed to solve the maximum flow problem in buffer-limited DTNs.Finally,a numerical example is given to demonstrate the effectiveness of the proposed algorithm. 展开更多
关键词 spatial information networks delay tolerant networks time-varying graph buffer-limited time aggregated graph maximum flow
原文传递
A Buffer Scheduling Method Based on Message Priority in Delay Tolerant Networks
12
作者 En Wang Yong-Jian Yang +1 位作者 Jie Wu Wen-Bin Liu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第6期1228-1245,共18页
Routing protocols in delay tolerant networks usually utilize multiple message copies to guarantee the message delivery, in order to overcome unpredictable node mobility and easily-interrupted connections. A store-carr... Routing protocols in delay tolerant networks usually utilize multiple message copies to guarantee the message delivery, in order to overcome unpredictable node mobility and easily-interrupted connections. A store-carry-and-forward paradigm was also proposed to further improve the message delivery. However, excessive message copies lead to the shortage of buffer and bandwidth. The spray and wait routing protocol has been proposed to reduce the network overload caused by the buffer and transmission of unrestricted message copies. However, when a node's buffer is quite constrained, there still exist congestion problems. In this paper, we propose a message scheduling and drop strategy on spray and wait routing protocol (SDSRP). To improve the delivery ratio, first of all, SDSRP calculates the priority of each message by evaluating the impact of both replicating and dropping a message copy on delivery ratio. Subsequently, scheduling and drop decisions are made according to the priority. In order to further increase delivery ratio, we propose an improved message scheduling and drop strategy on spray and wait routing protocol (ISDSRP) through enhancing the accuracy of estimating parameters. Finally, we conduct extensive simulations based on synthetic and real traces in ONE. The results show that compared with other buffer management strategies, ISDSRP and SDSRP achieve higher delivery ratio, similar average hopcounts, and lower overhead ratio. 展开更多
关键词 delay tolerant network spray and wait BUFFER SCHEDULING PRIORITY
原文传递
Intermittent Geocast Routing in Urban Vehicular Delay Tolerant Networks
13
作者 Zhiyuan Li Panpan Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第6期630-642,共13页
Nowadays, both vehicular active safety service and user infotainment service have become two core applications for urban Vehicular Delay Tolerant Networks(u VDTNs). Both core applications require a high data transmi... Nowadays, both vehicular active safety service and user infotainment service have become two core applications for urban Vehicular Delay Tolerant Networks(u VDTNs). Both core applications require a high data transmission capacity over u VDTNs. In addition, the connection between any two vehicles in u VDTNs is intermittent and opportunistic. Intermittent data dissemination over u VDTNs is a stringent and challenging issue. In this paper,we propose Intermittent Geocast Routing(IGR). For the first step, IGR has to estimate the active connection time interval via the moving directions and velocities between any two vehicles. Second, the throughput function for u VDTNs is fitted by building a wavelet neural network traffic model. Third, the throughput function within the effective connection time interval is integrated to obtain the forwarding capability estimation of the node. Fourth, a high-efficiency geocast routing algorithm using the node forwarding capability for u VDTNs is designed. Finally, IGR is simulated on the opportunistic Network Environment simulator. Experimental results show that IGR can greatly improve the packet delivery ratio, transmission delay, delay jitter, and packet loss rate compared with the state of the art. 展开更多
关键词 urban vehicular delay tolerant networks geocast routing node forwarding capability connection time
原文传递
New spray and wait protocol with node activity in heterogeneous delay tolerant networks
14
作者 Wu Jiagao Ye Ke +1 位作者 Zhu Yiji Liu Linfeng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第2期60-68,共9页
The spray and wait protocol is a classic copy-limited spraying protocol in delay tolerant networks, in which, the binary spray mode can be improved for heterogeneous delay tolerant networks. In this article, a new con... The spray and wait protocol is a classic copy-limited spraying protocol in delay tolerant networks, in which, the binary spray mode can be improved for heterogeneous delay tolerant networks. In this article, a new conception of node activity was defined to weigh the importance of nodes in aspect of message dissemination in the whole network. A new spray and wait protocol with node activity was proposed to improve the performance in heterogeneous delay tolerant networks. A mathematical model used under varieties of the spraying protocols was also proposed to analyze the expected delay of the protocol. Simulations show that the spray token proportion with node activity is optimal and the new protocol is of better performance than other related protocols. Therefore, this protocol has high efficiency and good scalability. 展开更多
关键词 delay tolerant network (DTN) routing protocol spray and wait node activity mathematical model
原文传递
Small World Model-Based Polylogarithmic Routing Using Mobile Nodes 被引量:3
15
作者 吴杰 杨书慧 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第3期327-342,共16页
The use of mobile nodes to improve network system performance has drawn considerable attention recently The movement-assisted model considers mobility as a desirable feature, where routing is based on the store-carry-... The use of mobile nodes to improve network system performance has drawn considerable attention recently The movement-assisted model considers mobility as a desirable feature, where routing is based on the store-carry-forward paradigm with random or controlled movement of resource rich mobile nodes. The application of such a model has been used in several emerging networks, including mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and delay tolerant networks (DTNs). It is well known that mobility increases the capacity of MANETs by reducing the number of relays for routing, prolonging the lifespan of WSNs by using mobile nodes in place of bottleneck static sensors, and ensuring network connectivity in DTNs using mobile nodes to connect different parts of a disconnected network. Trajectory planning and the coordination of mobile nodes are two important design issues aiming to optimize or balance several measures, including delay, average number of relays, and moving distance. In this paper, we propose a new controlled mobility model with an expected polylogarithmic number of relays to achieve a good balance among several contradictory goals, including delay, the number of relays, and moving distance. The model is based on the small-world model where each static node has "short" link connections to its nearest neighbors and "long" link connections to other nodes following a certain probability distribution. Short links are regular wireless connections whereas long links are implemented using mobile nodes. Various issues are considered, including trade-offs between delay and average number of relays, selection of the number of mobile nodes, and selection of the number of long links. The effectiveness of the proposed model is evaluated analytically as well as through simulation. 展开更多
关键词 delay tolerant network (DTN) mobile ad hoc network (MANET) ROUTING simulation small-world model wireless sensor network (WSN)
原文传递
Impact of Strangers on Opportunistic Routing Performance 被引量:3
16
作者 袁培燕 马华东 段鹏瑞 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第3期574-582,共9页
Routing is one of the challenging tasks in Delay Tolerant Networks (DTNs), due to the lack of global knowledge and sporadic contacts between nodes. Most existing studies take a greedy scheme in data forwarding proce... Routing is one of the challenging tasks in Delay Tolerant Networks (DTNs), due to the lack of global knowledge and sporadic contacts between nodes. Most existing studies take a greedy scheme in data forwarding process, i.e., only nodes with higher utility values than current carriers can be selected as relays. They lack an in-depth investigation on the main features of the optimal paths in Epidemic. These features are vital to any forwarding scheme that tends to make a trade-off between packet delivery delay and cost. This is mainly because Epidemic provides an upper bound on cost and a lower bound on delivery delay. Therefore, a deep understanding of these features is useful to make informed forwarding decisions. In this paper, we try to explore these features by observing the roles of different social relationships in the optimal paths through a set of real datasets. These datasets provide evidence that strangers have two sides in data forwarding process, and that the importance of strangers shows a decreasing trend along the forwarding paths. Using this heuristic knowledge, we propose STRON, a distributed and lightweight forwarding scheme. The distributed feature makes it very suitable for opportunistic scenarios and the low communication and computation features make it easy to be integrated with state-of-the-art work. The trace-driven simulations obviously confirm its effectiveness, especially in terms of packet delivery delay and cost. 展开更多
关键词 STRANGER forwarding mechanism social relationship delay Tolerant Network
原文传递
Error- and loss-tolerant bundle fragment authentication for space DTNs 被引量:2
17
作者 Xixiang LV Hui LI 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第6期1012-1023,共12页
To ensure the authenticity and integrity of bundles, the in-transit PDUs of bundle protocol (BP) in space delay/disruption-tolerant networks (DTNs), the bundle security protocol specification (IRTF RFC6257) sugg... To ensure the authenticity and integrity of bundles, the in-transit PDUs of bundle protocol (BP) in space delay/disruption-tolerant networks (DTNs), the bundle security protocol specification (IRTF RFC6257) suggested using a digital signature directly over each bundle. However, when bundle fragment services are needed, this mechanism suffers from heavy computational costs, bandwidth overheads and energy consumption. In this paper, we address the fragment authentication issue for BP by exploiting the combination of RS error correction and erasure codes with the help of batch transmission characteristic of DTNs. The RS error correction and erasure codes are adopted to allow the receivers to locate the false/injected fragments and reconstruct the only one signature shared by all fragments of a bundle, even if some other fragments are lost or routed to a different path. Getting only partial authentic fragments, a DTN node is able to detect and filter the false/injected fragments, and authenticate the origin of a bundle as well. Such an approach tolerates high delays, unexpected link disruption and the BP nature of routing fragments of the same bundle possibly via different paths. The performance analysis demonstrates that both of our schemes, which follow our generic idea based on RS codes, significantly reduce bandwidth overheads and computational costs as compared to the prior works. 展开更多
关键词 space-based delay tolerant networks bundle authentication information security.
原文传递
Routing protocol based on social characteristics for opportunistic networks 被引量:8
18
作者 CHENG Gang SONG Mei +2 位作者 ZHANG Yong XING Yi-hai BAO Xu-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第1期67-73,103,共8页
Opportunistic networks are derived from delay tolerant networks, where mobile nodes have no end-to-end connections. Nodes are represented by people, which means that opportunistic networks can be regarded as social ne... Opportunistic networks are derived from delay tolerant networks, where mobile nodes have no end-to-end connections. Nodes are represented by people, which means that opportunistic networks can be regarded as social networks. Human mobility plays an important role in affecting the performance of forwarding protocols in social networks, furthermore, the trajectory of people's movements are driven by social characteristics. However, current routing protocols rely on simple mobility models, and rarely consider social characteristics. Considering two heterogeneous network models, an social opportunistic networks routing(SONR) was proposed which brings an adapted discrete Markov chain into nodes' mobility model and calculates the transition probability between successive status. Comparison was made between Spray, Wait and Epidemic protocol. Simulation show that SONR can improve performance on delivery ratio, delivery latency and network overhead, meanwhile. SONR approaches the performance of Epidemic routing. 展开更多
关键词 opportunistic networks delay tolerant networks social characteristics Markov chain transition probability
原文传递
Energy Efficient Social Routing Framework for Mobile Social Sensing Networks
19
作者 Fan Li Chenfei Tian +1 位作者 Ting Li Yu Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第4期363-373,共11页
Mobile social sensing network is one kind of emerging networks in which sensing tasks are performed by mobile users and sensing data are shared and collected by leveraging the intermittent inter-contacts among mobile ... Mobile social sensing network is one kind of emerging networks in which sensing tasks are performed by mobile users and sensing data are shared and collected by leveraging the intermittent inter-contacts among mobile users. Traditional ad hoc routing protocols are inapplicable or perform poorly for data collection or data sharing in such mobile social networks because nodes are seldom fully connected. In recent years, many routing protocols (especially social-based routing) are proposed to improve the delivery ratio in mobile social networks, but most of them do not consider the load of nodes thus may lead to unbalanced energy consumption among nodes. In this paper, we propose a simple Energy Efficient framework for Social-based Routing (EE-SR) in mobile social sensing networks to balance the load of nodes while maintaining the delivery ratio within an acceptable range by limiting the chances of forwarding in traditional social-based routing. Furthermore, we also propose an improved version of EE-SR to dynamically adjust the controlling parameter. Simulation results on real-life mobile traces demonstrate the efficiency of our proposed framework. 展开更多
关键词 energy efficient social-based routing delay tolerant networks mobile social sensing networks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部