期刊文献+
共找到431篇文章
< 1 2 22 >
每页显示 20 50 100
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
1
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc networkmanet).
在线阅读 下载PDF
A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks 被引量:2
2
作者 胡志刚 马好 +1 位作者 王国军 廖麟 《Journal of Central South University of Technology》 EI 2005年第6期714-719,共6页
A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structure... A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad boc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol. 展开更多
关键词 mobile ad hoe network fuzzy Petri net certainty factor ad hoc on demand distance vector routing algorithm
在线阅读 下载PDF
A Composite Service Provision Method Based on Novel Node Model in Mobile Ad Hoc Networks 被引量:1
3
作者 WU Xiaokun TIAN Yue WU Jiyan CHENG Bo CHEN Junlian 《China Communications》 SCIE CSCD 2014年第4期130-142,共13页
Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Compo... Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Composite service is built through the service composition.In mobile ad hoc networks,the factors influencing the success rate of service composition are mainly the number of nodes and the time spent for the composition.The node's failure probability is proportional to the length of time the node exist in the networks.In order to improve the success rate of service composition,we take several measures.First,we split the service requirement into several segments and cluster the nodes,so that the nodes' waiting time for service composition can be reduced.Second,we propose a new node model of "one node contains multiple services" in mobile ad hoc networks.Using this type of nodes model,the number of nodes required for service composition can be reduced.These means can increase the success rate of service composition. 展开更多
关键词 service provision service composition mobile ad hoe networks CLUSTER requirement splitting
在线阅读 下载PDF
A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
4
作者 YU Genjian ZHENG Baoyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1789-1792,共4页
Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the m... Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly. 展开更多
关键词 manet(mobile ad hoe networks) MULTILEVEL trust algorithm
在线阅读 下载PDF
Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
5
作者 季晓君 田畅 张毓森 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期188-191,196,共5页
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and prio... Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET. 展开更多
关键词 mobile ad hoc network manet SECURITY wormhole attack RECOVERY
在线阅读 下载PDF
A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS
6
作者 Li Yanping Wang Xin +1 位作者 Xue Xiangyang C. K. Toh 《Journal of Electronics(China)》 2006年第5期650-655,共6页
Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for... Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop composed of setup procedure, regular procedure and emergent route recovering. suggests smart route recovery strategy. Our approach is recovery procedure to achieve clustering, routing and 展开更多
关键词 mobile ad hoc network manet CLUSTERING ROUTING Loop-based
在线阅读 下载PDF
Signcryption-Based Key Management for MANETs Applications in Mobile Commerce
7
作者 LI Jingfeng ZHU Yuefei ZHANG Yajuan PAN Heng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1621-1624,共4页
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the busin... Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management. 展开更多
关键词 manets (mobile ad hoe networks) SIGNCRYPTION threshold eryptography mobile commerce
在线阅读 下载PDF
Integrating Mobile Ad Hoc Network to the Internet
8
作者 王茂宁 《Journal of Electronic Science and Technology of China》 CAS 2005年第4期304-309,共6页
A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, emplo... A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, employ the optimize d link state routing (OLSR) protocol for routing within the MANET. Mobility management across WLANs and MANETs is achieved through the hierarchical mobile IPv6 (HMIPv6) protocol. The performance is evaluated on a HMIPv6 based test-bed composed of WLANs and MANETs. The efficiency gain obtained from using HMIPv6 in such a hybrid network is investigated. The investigation result shows that the use of HMIPv6 can achieve up to 27% gain on reducing the handoff latency when a mobile roams within a domain. Concerning the reduction of the signaling load on the lnternet, the use of HMIPv6 can achieve at least a 54% gain and converges to 69%. 展开更多
关键词 mobile ad hoc network manet optimized link state routing (OLSR) wireless networks mobile IPv6 hierarchical mobile 1Pv6
在线阅读 下载PDF
Flooding attack and defence in Ad hoc networks 被引量:5
9
作者 Yi Ping Hou Yafei +2 位作者 Zhong Yiping Zhang Shiyong Dai Zhoulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期410-416,共7页
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T... Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently. 展开更多
关键词 computer networks SECURITY mobile ad hoe networks routing protocol denial of service ad hoc flooding attack.
在线阅读 下载PDF
An effective connected dominating set based mobility management algorithm in MANETs
10
作者 Xin-yu WANG Xiao-hu YANG +3 位作者 Jian-ling SUN Wei LI Wei SHI Shan-ping LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第10期1318-1325,共8页
This paper proposes a connected dominating set (CDS) based mobility management algorithm, CMMA, to solve the problems of node entering, exiting and movement in mobile ad hoc networks (MANETs), which ensures the connec... This paper proposes a connected dominating set (CDS) based mobility management algorithm, CMMA, to solve the problems of node entering, exiting and movement in mobile ad hoc networks (MANETs), which ensures the connectivity and efficiency of the CDS. Compared with Wu's algorithm, the proposed algorithm can make full use of present network conditions and involves fewer nodes. Also it has better performance with regard to the approximation factor, message complexity, and time complexity. 展开更多
关键词 mobile ad hoc network manet Connected dominating set (CDS) mobilITY Dominator No-key dominator Approximation factor
在线阅读 下载PDF
DECLARATIVE HYBRID ROUTING PROTOCOLS IN AD HOC NETWORKS
11
作者 Gao Xiang Li Zhongyuan Wang Min 《Journal of Electronics(China)》 2013年第4期341-351,共11页
This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, w... This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, which is well adapted to the Mobile Ad hoc NETwork (MANET). The adaptive hybrid protocol is designed for ad hoc networks which have characteristics like self-organizing, no trusted party, flexibility, etc. The nodes that run the hybrid protocol can automatically select one routing protocol that is suitable for different network environment. The Bayesian-estimation based adaptive strategy, that improves the adaptability and stability of the protocol, succeeds in the Rapidnet, a declarative network engine. The result in the Rapidnet proves that the hybrid protocol and the adaptive strategy are feasible. The experiment on the ns-3 simulator, an emerging discrete-event network simulator, validates that this protocol performs well and reduces communication overheads. 展开更多
关键词 Declarative network Bayesian estimation Hybrid routing protocol adaptive strategy mobile ad hoc network manet
在线阅读 下载PDF
MANETs环境下的模糊信任模型 被引量:1
12
作者 罗俊海 范明钰 叶丹霞 《计算机应用研究》 CSCD 北大核心 2008年第11期3449-3450,3454,共3页
详细剖析了MANETs路由协议中存在的节点自私问题,提出了一种综合、有效的解决方案。
关键词 移动自组织网络 自私 推荐 模糊信任
在线阅读 下载PDF
基于频率域多目标MANETs可信路由决策研究 被引量:1
13
作者 罗俊海 郑龙 范明钰 《电子与信息学报》 EI CSCD 北大核心 2010年第7期1602-1607,共6页
移动Ad-hoc网络(MANETs)具有开放的媒质,动态的拓扑结构,分布式的合作和受限的网络能力等基本特点。网络中移动节点具有匿名性和高度自治的特点,网络通讯依靠在通信路径上的中间节点转发数据包,实现无线传输范围外节点间的正常通信。该... 移动Ad-hoc网络(MANETs)具有开放的媒质,动态的拓扑结构,分布式的合作和受限的网络能力等基本特点。网络中移动节点具有匿名性和高度自治的特点,网络通讯依靠在通信路径上的中间节点转发数据包,实现无线传输范围外节点间的正常通信。该文提出了一种独特的MANETs中基于频率下多目标可信路由决策算法,它和现在大多数路由算法都是在时间域下使用单一约束参数选择路由的方式截然不同。利用概率理论分析安全和可信路由,基于概率密度函数的时频相互转化,减小计算复杂度,解决MEANTs中节点间缺乏物理安全以及在低信任水平和节点相互勾结扰乱网络操作情况下,发现可信安全路由难的问题。实例分析证明了此算法的可行性。 展开更多
关键词 移动自组织网络 可信路由 频率域
在线阅读 下载PDF
MANETS中基于选定缓存节点的数据一致性研究 被引量:1
14
作者 雷向东 熊稳华 《计算机工程与应用》 CSCD 北大核心 2011年第23期93-95,98,共4页
移动自组网络(MANETS)是一种具有弱连接性、低带宽、高查询延迟的网络。协缓存技术被广泛用来实现MANETS中数据的高效分发与共享,然而协缓存技术极易引发数据不一致性。为了有效解决现有MANETS中存在的数据不一致性问题,提出一种使用移... 移动自组网络(MANETS)是一种具有弱连接性、低带宽、高查询延迟的网络。协缓存技术被广泛用来实现MANETS中数据的高效分发与共享,然而协缓存技术极易引发数据不一致性。为了有效解决现有MANETS中存在的数据不一致性问题,提出一种使用移动窗口来预测选定缓存节点的协缓存算法(Mobile Window Caching Consistency,MWCC)。实验表明,该算法能有效解决MANETS中因协缓存技术带动来的数据不一致性问题,并在很大程度上减少了通信拥塞与查询延迟。 展开更多
关键词 移动自组网 协缓存 一致性 移动窗口 自适应 可预测
在线阅读 下载PDF
适用于MANETs的前摄性门限签名协议 被引量:1
15
作者 洪璇 温蜜 万中美 《计算机工程》 CAS CSCD 2012年第1期127-129,共3页
现有的门限签名方案存在大量动态的用户集合,不适用于移动Ad-hoc网络(MANETs)。为此,提出一种适用于MANETs网络的高效门限签名协议。该协议的安全性基于标准RSA假设,且满足通用可组合安全性。高效门限签名协议具有前摄性,能够同时提供&q... 现有的门限签名方案存在大量动态的用户集合,不适用于移动Ad-hoc网络(MANETs)。为此,提出一种适用于MANETs网络的高效门限签名协议。该协议的安全性基于标准RSA假设,且满足通用可组合安全性。高效门限签名协议具有前摄性,能够同时提供"分享密钥"和"更新用户子密钥"的功能。安全性分析结果证明该协议的高效性。 展开更多
关键词 门限签名协议 门限RSA签名协议 前摄性安全 强壮性 不可否认性 移动ad-HOC网络 通用可组合安全
在线阅读 下载PDF
Wireless ad hoc video transmission:a Bayesian network-based scheme
16
作者 蒋荣欣 田翔 +1 位作者 谢立 陈耀武 《Journal of Southeast University(English Edition)》 EI CAS 2008年第4期407-413,共7页
A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality ar... A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality are formulized and deduced. The relevant factors are obtained by a cross-layer mechanism or Feedback method. According to these relevant factors, the variable set and the Bayesian network topology are determined. Then a Bayesian network prediction model is constructed. The results of the prediction can be used as the bandwidth of the mobile ad hoc network (MANET). According to the bandwidth, the video encoder is controlled to dynamically adjust and encode the right bit rates of a real-time video stream. Integrated simulation of a video streaming communication system is implemented to validate the proposed solution. In contrast to the conventional transfer scheme, the results of the experiment indicate that the proposed scheme can make the best use of the network bandwidth; there are considerable improvements in the packet loss and the visual quality of real-time video.K 展开更多
关键词 mobile ad hoc network manet Bayesian network CROSS-LAYER IEEE 802. 11 real-time video streaming
在线阅读 下载PDF
MANETs中分段式的节点不相交多路径QoS路由
17
作者 鲁嫄 贾维嘉 +1 位作者 王国军 彭三城 《计算机工程与应用》 CSCD 北大核心 2008年第16期94-97,共4页
随着多媒体应用日益普及,在移动自组网中提供QoS成为了一个重要的研究领域。提出一种移动自组网中分段式的节点不相交的多路径QoS路由协议。该协议将一条路径划分为多段,在每个段中建立满足多QoS约束的多条节点不相交路径,并在每个段中... 随着多媒体应用日益普及,在移动自组网中提供QoS成为了一个重要的研究领域。提出一种移动自组网中分段式的节点不相交的多路径QoS路由协议。该协议将一条路径划分为多段,在每个段中建立满足多QoS约束的多条节点不相交路径,并在每个段中独立地进行路由维护。模拟研究表明该路由协议具有开销小和路径成功率高的特点。 展开更多
关键词 移动自组网 QOS路由 节点不相交多路径
在线阅读 下载PDF
使用树结构定位符的MANETs路由模型
18
作者 米乐 王海泉 +2 位作者 夏春和 吕良双 胡俊顺 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第2期247-251,共5页
为了解决现有MANETs路由机制的可扩展性问题,提出一种使用树结构定位符的路由模型(TLR),通过DHT方法对节点的标识符和定位符进行分离,并使用基于位置的定位机制来提供一种具有可扩展性的路由服务.定位符描述一个节点在网络拓扑中的相对... 为了解决现有MANETs路由机制的可扩展性问题,提出一种使用树结构定位符的路由模型(TLR),通过DHT方法对节点的标识符和定位符进行分离,并使用基于位置的定位机制来提供一种具有可扩展性的路由服务.定位符描述一个节点在网络拓扑中的相对位置并随着节点的移动发生变化,定位符空间采用树结构进行组织.最后量化分析了该路由模型和其他路由机制的性能.分析结果表明,TLR的可扩展性优于平面主动式路由.在假设条件下,TLR的开销的复杂度小于反应式路由的复杂度.因此,相比于现有的MANETs路由机制,TLR具备很好的可扩展性. 展开更多
关键词 移动自组织网络 分布式哈希表 多跳路由 树结构定位符
在线阅读 下载PDF
Mathematical Model Validation of Search Protocols in MP2P Networks 被引量:1
19
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Saeed Rubaiee 《Computers, Materials & Continua》 SCIE EI 2021年第8期1807-1829,共23页
Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received pa... Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate. 展开更多
关键词 Search protocols random walk manet P2P networks P2P manet mathematical model peer-to-peer wireless ad hoc network FLOODING mobile P2P UNSTRUCTURED P2P NS-2 network simulator
在线阅读 下载PDF
Average flooding distance for MANETs in random graph models with spatial reuse
20
作者 胡细 王汉兴 赵飞 《Journal of Shanghai University(English Edition)》 CAS 2007年第4期336-339,共4页
The flooding distance is an important parameter in the design and evaluation of a routing protocol, which is related not only to the delay time in the route discovery, but also to the stability and reliability of the ... The flooding distance is an important parameter in the design and evaluation of a routing protocol, which is related not only to the delay time in the route discovery, but also to the stability and reliability of the route. In this paper, the average flooding distance (AFD) for a mobile ad hoc network (MANET) in a random graph model was given based on the dynamic source routing (DSR) protocol. The influence of spatial reuse on the AFD was also studied. Compared with that in the model without the spatial reuse, the AFD in the model with the spatial reuse has much smaller value, when the connetivity probability between nodes in the network is small and when the number of reused times is large. This means that the route discovery with the spatial reuse is much more effective. 展开更多
关键词 mobile ad hoc network manet dynamic source routing (DSR) random graph
在线阅读 下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部