期刊文献+

利用ETX路由度量的无线Mesh网络协调机会路由协议 被引量:6

Coordinated opportunistic routing protocol with single-rate using ETX routing metric in WMN
在线阅读 下载PDF
导出
摘要 针对无线网格网络(wireless Mesh network,WMN)中传统路由协议重复传输且频繁运行路由发现过程的问题,提出了基于期望传输次数(expected transmission count,ETX)路由度量的协调机会路由协议。首先,利用无线网络的广播特性寻找拥有最大化吞吐量和最小丢包率的最优路由协议;然后,使用ETX路由度量标记关键问题的计算成本;最后,利用源节点发送的信用和区域成本计算节点的区域,并实现路由发现。仿真结果表明,提出的路由协议在不同参数情况下,平均吞吐量可提高32%,投递率可由10%提高至20%,相比其他几种较新的路由协议,提出的协议在吞吐量、投递率和平均端与端间延迟方面具有更好的性能。 To solve the problem of lots of retransmissions and frequent execution of route discovery process in traditional routing protocols,this paper proposed coordinated opportunistic routing protocol based on ETX routing metric. Firstly,it exploited the broadcast nature of wireless networks to find the optimal routing solution that maximizesd throughput and minimizes packet loss.Then,it addressed the key issue of computational overhead by designing new routing technique. Finally,it used the source node sending credit and cost to calculation node domains and finish routing discovering. The simulation results show that the proposed protocol increases average throughput up to 32%,and increases in delivery ratio( from 10% to 20%) in various parameters.When compared to other novel protocols,the proposed protocol gets better performance in duplicate transmissions and network collisions.
出处 《计算机应用研究》 CSCD 北大核心 2016年第5期1468-1472,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61103143) 河南省基础与前沿技术研究项目(132300410479 142300410339)
关键词 无线MESH网络 期望传输次数 路由度量 机会路由协议 单速率 wireless Mesh network(WMN) expected transmission count(ETX) routing metric opportunistic routing protocol single rate
  • 相关文献

参考文献18

二级参考文献73

  • 1张乃通,李晖,张钦宇.深空探测通信技术发展趋势及思考[J].宇航学报,2007,28(4):786-793. 被引量:76
  • 2STAJANO F, ANDERSON R. The resurrencting duckling: security issues for ad hoc wireless networks[A]. Proc the 7th International Workshop on Security Protocols, Cambridge, UK, 1999.22-26.
  • 3BULUSU N, HEIDEMANN J, ESTRIN D. GPS-less Low Cost Outdoor Localization for Very Small Devices[M]. IEEE Personal Communications Magazine, 2000.
  • 4HU L, EVANS D. Using directional antennas to prevent wormhole attacks[A]. Proceedings of Network and Distributed System Security Symposium (NDSS)[C]. San Diego, 2004.
  • 5HU Y, PERRIG A, JOHNSON D. Packet leashes: a defense against wormhole attacks in wireless networks[A]. Proc 22nd INFOCOM[C]. 2003.1976-1986.
  • 6CHIU H, LUI K. DelPHI: wormhole detection mechanism for ad hoc wireless networks[A]. 1st International Symponium on Wireless Pervasive Computing[C]. Phuket, Thailand, 2006. 1-6.
  • 7SUN C, DOO-YOUNG K, DO-HYEON L, et al. WAP: wormhole attack prevention algorithm in mobile ad hoc networks[A]. Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008)[C]. 2008. 343-348.
  • 8AZER M, EL-KASSAS S, EL-SOUDANI M. lmmuning routing protocols from the Wormhole attack[A]. The Fourth International Conference on Systems and Networks Communications[C]. Porto, Portugal, 2009.31-36.
  • 9TINA H, HUANG C, BLUM B M, et al. Range-free localization schemes for large scale sensor networks[A]. Mobicom 2003[C]. 2003.81-95.
  • 10WANG X, WONG J. A end-to-end detection of wormhole attack in wireless ad hoc networks[A]. 31st Annual International Computer Software and Applications Conference[C]. Beijing, China, 2007.34-41.

共引文献34

同被引文献24

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部