期刊文献+
共找到430篇文章
< 1 2 22 >
每页显示 20 50 100
Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
1
作者 季晓君 田畅 张毓森 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期188-191,196,共5页
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and prio... Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET. 展开更多
关键词 虫眼腐蚀 通信网络 网络安全 恢复方法
下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
2
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc network(manet).
下载PDF
Survivability modeling and analysis on 3D mobile ad-hoc networks 被引量:2
3
作者 彭三城 王国军 +1 位作者 胡忠望 陈建平 《Journal of Central South University》 SCIE EI CAS 2011年第4期1144-1152,共9页
Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and ... Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and air defense systems.The impact on network survivability due to node behaviors was presented,and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity.Node behaviors were modeled by using a semi-Markov process.The node minimum degree of 3D MANETs was discussed.An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors,based on the model of node isolation.The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description,and the effectiveness and rationality of the proposed approach are verified through numerical analysis.The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors. 展开更多
关键词 网络生存性 3D 移动ad 建模 manet 定量分析方法 半马尔可夫过程 不良行为
下载PDF
A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks 被引量:2
4
作者 胡志刚 马好 +1 位作者 王国军 廖麟 《Journal of Central South University of Technology》 EI 2005年第6期714-719,共6页
A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structure... A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad hoc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routingreliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distancevector routing protocol. 展开更多
关键词 计算机网络 路由算法 模糊PETRI网 移动网络
下载PDF
A Composite Service Provision Method Based on Novel Node Model in Mobile Ad Hoc Networks 被引量:1
5
作者 WU Xiaokun TIAN Yue WU Jiyan CHENG Bo CHEN Junlian 《China Communications》 SCIE CSCD 2014年第4期130-142,共13页
Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Compo... Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Composite service is built through the service composition.In mobile ad hoc networks,the factors influencing the success rate of service composition are mainly the number of nodes and the time spent for the composition.The node's failure probability is proportional to the length of time the node exist in the networks.In order to improve the success rate of service composition,we take several measures.First,we split the service requirement into several segments and cluster the nodes,so that the nodes' waiting time for service composition can be reduced.Second,we propose a new node model of "one node contains multiple services" in mobile ad hoc networks.Using this type of nodes model,the number of nodes required for service composition can be reduced.These means can increase the success rate of service composition. 展开更多
关键词 节点模型 移动ad 网络 模型组合 综合服务 服务组合 业务 移动ad
下载PDF
A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
6
作者 YU Genjian ZHENG Baoyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1789-1792,共4页
Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the m... Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly. 展开更多
关键词 manetmobile ad hoe networks) MULTILEVEL trust algorithm
下载PDF
Integrating Mobile Ad Hoc Network to the Internet
7
作者 王茂宁 《Journal of Electronic Science and Technology of China》 CAS 2005年第4期304-309,共6页
A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, emplo... A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, employ the optimize d link state routing (OLSR) protocol for routing within the MANET. Mobility management across WLANs and MANETs is achieved through the hierarchical mobile IPv6 (HMIPv6) protocol. The performance is evaluated on a HMIPv6 based test-bed composed of WLANs and MANETs. The efficiency gain obtained from using HMIPv6 in such a hybrid network is investigated. The investigation result shows that the use of HMIPv6 can achieve up to 27% gain on reducing the handoff latency when a mobile roams within a domain. Concerning the reduction of the signaling load on the lnternet, the use of HMIPv6 can achieve at least a 54% gain and converges to 69%. 展开更多
关键词 mobile ad hoc network (manet optimized link state routing (OLSR) wireless networks mobile IPv6 hierarchical mobile 1Pv6
下载PDF
A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS
8
作者 Li Yanping Wang Xin +1 位作者 Xue Xiangyang C. K. Toh 《Journal of Electronics(China)》 2006年第5期650-655,共6页
Although clustering is a convenient framework to enable traffic control and service support in Mo- bile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for... Although clustering is a convenient framework to enable traffic control and service support in Mo- bile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is dissemi- nated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering. 展开更多
关键词 易变ad HOC网络 簇类 路由 环基
下载PDF
Geographic Drone-based Route Optimization Approach for Emergency Area Ad-Hoc Network
9
作者 V.Krishnakumar R.Asokan 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期985-1000,共16页
Wireless sensor Mobile ad hoc networks have excellent potential in moving and monitoring disaster area networks on real-time basis.The recent challenges faced in Mobile Ad Hoc Networks(MANETs)include scalability,local... Wireless sensor Mobile ad hoc networks have excellent potential in moving and monitoring disaster area networks on real-time basis.The recent challenges faced in Mobile Ad Hoc Networks(MANETs)include scalability,localization,heterogeneous network,self-organization,and self-sufficient operation.In this background,the current study focuses on specially-designed communication link establishment for high connection stability of wireless mobile sensor networks,especially in disaster area network.Existing protocols focus on location-dependent communications and use networks based on typically-used Internet Protocol(IP)architecture.However,IP-based communications have a few limitations such as inefficient bandwidth utilization,high processing,less transfer speeds,and excessive memory intake.To overcome these challenges,the number of neighbors(Node Density)is minimized and high Mobility Nodes(Node Speed)are avoided.The proposed Geographic Drone Based Route Optimization(GDRO)method reduces the entire overhead to a considerable level in an efficient manner and significantly improves the overall performance by identifying the disaster region.This drone communicates with anchor node periodically and shares the information to it so as to introduce a drone-based disaster network in an area.Geographic routing is a promising approach to enhance the routing efficiency in MANET.This algorithm helps in reaching the anchor(target)node with the help of Geographical Graph-Based Mapping(GGM).Global Positioning System(GPS)is enabled on mobile network of the anchor node which regularly broadcasts its location information that helps in finding the location.In first step,the node searches for local and remote anticipated Expected Transmission Count(ETX),thereby calculating the estimated distance.Received Signal Strength Indicator(RSSI)results are stored in the local memory of the node.Then,the node calculates the least remote anticipated ETX,Link Loss Rate,and information to the new location.Freeway Heuristic algorithm improves the data speed,efficiency and determines the path and optimization problem.In comparison with other models,the proposed method yielded an efficient communication,increased the throughput,and reduced the end-to-end delay,energy consumption and packet loss performance in disaster area networks. 展开更多
关键词 mobile ad hoc networks(manets) geographical graph-based mapping(GGM) geographic drone based route optimization data speed anchor node’s
下载PDF
Signcryption-Based Key Management for MANETs Applications in Mobile Commerce
10
作者 LI Jingfeng ZHU Yuefei ZHANG Yajuan PAN Heng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1621-1624,共4页
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the busin... Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management. 展开更多
关键词 manets mobile ad hoe networks) SIGNCRYPTION threshold eryptography mobile commerce
下载PDF
Flooding attack and defence in Ad hoc networks 被引量:5
11
作者 Yi Ping Hou Yafei +2 位作者 Zhong Yiping Zhang Shiyong Dai Zhoulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期410-416,共7页
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T... Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently. 展开更多
关键词 computer networks SECURITY mobile ad hoe networks routing protocol denial of service ad hoc flooding attack.
下载PDF
An effective connected dominating set based mobility management algorithm in MANETs
12
作者 Xin-yu WANG Xiao-hu YANG Jian-ling SUN Wei LI Wei SHI Shan-ping LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第10期1318-1325,共8页
This paper proposes a connected dominating set (CDS) based mobility management algorithm, CMMA, to solve the problems of node entering, exiting and movement in mobile ad hoc networks (MANETs), which ensures the connec... This paper proposes a connected dominating set (CDS) based mobility management algorithm, CMMA, to solve the problems of node entering, exiting and movement in mobile ad hoc networks (MANETs), which ensures the connectivity and efficiency of the CDS. Compared with Wu's algorithm, the proposed algorithm can make full use of present network conditions and involves fewer nodes. Also it has better performance with regard to the approximation factor, message complexity, and time complexity. 展开更多
关键词 移动ad HOC网络 CDS 迁移率 管理算法
下载PDF
Speed aware self-adapting and reconfigurable routing mechanism in MANET
13
作者 Zhang Qinjuan Wu Muqing Zhen Yan 《High Technology Letters》 EI CAS 2012年第3期321-325,共5页
关键词 路由机制 manet 速度自适应 可重构 OPNET仿真 路由协议 移动速度 网络流量
下载PDF
DECLARATIVE HYBRID ROUTING PROTOCOLS IN AD HOC NETWORKS
14
作者 Gao Xiang Li Zhongyuan Wang Min 《Journal of Electronics(China)》 2013年第4期341-351,共11页
This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, w... This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, which is well adapted to the Mobile Ad hoc NETwork (MANET). The adaptive hybrid protocol is designed for ad hoc networks which have characteristics like self-organizing, no trusted party, flexibility, etc. The nodes that run the hybrid protocol can automatically select one routing protocol that is suitable for different network environment. The Bayesian-estimation based adaptive strategy, that improves the adaptability and stability of the protocol, succeeds in the Rapidnet, a declarative network engine. The result in the Rapidnet proves that the hybrid protocol and the adaptive strategy are feasible. The experiment on the ns-3 simulator, an emerging discrete-event network simulator, validates that this protocol performs well and reduces communication overheads. 展开更多
关键词 网络环境 路由协议 移动ad HYBRID 自适应策略 混合协议 贝叶斯估计 网络模拟器
下载PDF
Effect of Varying Mobility on the Performance of MANET Protocols
15
作者 Ibrahiem M. M. El Emary Samir S. Malallah Shatha J. Kadhim 《通讯和计算机(中英文版)》 2011年第7期523-535,共13页
关键词 动态源路由协议 性能变化 移动ad manet 网络拓扑结构 AODV协议 无线路由协议 移动节点
下载PDF
Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET
16
作者 S.Padmapriya R.Shankar +3 位作者 R.Thiagarajan N.Partheeban A.Daniel S.Arun 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期491-505,共15页
The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various t... The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio. 展开更多
关键词 mobile ad-hoc network(manet) wireless ad hoc network adOV ATTACKS denial of service
下载PDF
MANET中TCP改进研究综述 被引量:34
17
作者 冯彦君 孙利民 +1 位作者 钱华林 宋成 《软件学报》 EI CSCD 北大核心 2005年第3期434-444,共11页
传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现... 传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现象.当出现非拥塞因素丢包时,传统 TCP 将错误地触发拥塞控制,从而引起TCP 性能低下.任何改进机制都可以分为发现问题和解决问题两个阶段.首先概括了 MANET 中影响 TCP 性能的若干问题;然后针对发现问题和解决问题两个阶段,详细地对每一阶段中存在的各种可行方法进行了分类、分析和比较;最后指出了 MANET 中 TCP 性能优化的研究方向. 展开更多
关键词 manet(mobile ad HOC network) TCP(transmission control protocol) 性能 包丢失
下载PDF
一个应用于移动Ad Hoc网络管理的簇生成算法 被引量:19
18
作者 冯永新 王光兴 +1 位作者 刘治国 姜月秋 《软件学报》 EI CSCD 北大核心 2003年第1期132-138,共7页
移动Ad hoc网络(mobile Ad hoc network,简称MANET)作为一种新型移动无线通信网,与其他通信网络相比独有的特性增加了网络管理的难度.目前对MANET网络管理的研究处于起步阶段,一些标准尚未制定,而且像存在单向链路和节点的相对移动性这... 移动Ad hoc网络(mobile Ad hoc network,简称MANET)作为一种新型移动无线通信网,与其他通信网络相比独有的特性增加了网络管理的难度.目前对MANET网络管理的研究处于起步阶段,一些标准尚未制定,而且像存在单向链路和节点的相对移动性这类问题也在研究中被忽视.为此,提出了一个利用令牌机制与最小节点标识相结合,适用于层次性管理结构的基于图的MANET簇生成算法,以及对MIB(management information base)的建议性改进.算法充分考虑了网络存在的单向链路和节点的相对移动性,提高了网络管理的灵活性和可扩展性,为MANET的网络管理提出了一种新方法. 展开更多
关键词 移动adHOC网络 簇生成算法 网络管理 移动通信网 无线网络接口
下载PDF
MANET节点移动模型仿真研究 被引量:12
19
作者 石丛军 任清华 +1 位作者 郑博 刘芸江 《计算机工程》 CAS CSCD 北大核心 2009年第14期101-103,共3页
移动自组网(MANET)节点移动特性对网络拓扑结构有重要影响,在合理的节点移动模型下对网络性能的评估才真实可靠。通过对网络仿真软件NS2进行拓展,实现个体、群体和具有地域限制的节点移动模型,提出物理链路和路由协议2个层面的评估准则... 移动自组网(MANET)节点移动特性对网络拓扑结构有重要影响,在合理的节点移动模型下对网络性能的评估才真实可靠。通过对网络仿真软件NS2进行拓展,实现个体、群体和具有地域限制的节点移动模型,提出物理链路和路由协议2个层面的评估准则,给出不同类节点模型对路由协议性能的影响程度。对研究和评估MANET的路由协议有重要的参考价值。 展开更多
关键词 移动自组网 节点移动模型 路由协议 网络仿真
下载PDF
移动ad hoc网络安全路由协议综述 被引量:4
20
作者 朱道飞 汪东艳 +2 位作者 刘欣然 陈前斌 程平 《计算机工程与应用》 CSCD 北大核心 2005年第27期116-119,133,共5页
移动adhoc网络路由协议对于各种针对路由协议的攻击无能为力,因为路由协议并未考虑安全因素,攻击者肆意利用路由协议中的安全隐患来破坏网络。论文综述了移动adhoc网络安全路由协议研究方面的一些最新工作,对该领域各种安全路由协议进... 移动adhoc网络路由协议对于各种针对路由协议的攻击无能为力,因为路由协议并未考虑安全因素,攻击者肆意利用路由协议中的安全隐患来破坏网络。论文综述了移动adhoc网络安全路由协议研究方面的一些最新工作,对该领域各种安全路由协议进行了研究分析,并描述了移动adhoc网络安全路由协议所面临的安全挑战。 展开更多
关键词 移动 ad HOC 网络 安全路由 认证
下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部