首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we present a special spectrum sharing scheme that is a joint optimization of relay selection and power allocation at the secondary transmitter, where the primary user is incapable of supporting its target signal-to-noise ratio(SNR). Specifically, the selected secondary transmitter assists the primary user with achieving its target SNR via two-phase cooperative amplify-and-forward relaying. By searching for the candidate secondary transmitters which have already satisfied the primary user's target SNR, we can select the optimal secondary transmitter. This optimal secondary transmitter not only satisfies the primary user's target SNR,but also maximizes the throughput of the secondary user. We study this joint optimization problem such that the secondary user's throughput is maximized under the constraint that satisfies the primary user's target SNR.Numerical results show that our scheme can maximize the throughput of the secondary user, and can obtain the win-win solution for the primary and secondary systems.  相似文献   

2.
Ad hoc网络由于其自身的特点,具有抗攻击能力差,终端节点资源有限,计算能力差等弱点.目前已经提出的密钥交换协议都是以有限域离散对数为基础建立起来的,运算量大,需要中心节点验证,不能完全符合Ad hoc网络的特点.椭圆曲线加密体制加密强度大,速度快,占用的处理单元和带宽较小.提出了一种在Ad hoc网络的节点之间用椭圆曲线加密进行密钥交换的方案,并扩展到一组Ad hoc网络节点中,既保证了网络中节点间的通信安全,又具有很强的实用性.  相似文献   

3.
The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless networks. The quality of a virtual backbone is measured not only by approximation factor, which is the ratio of its size to that of minimum CDS, but also time complexity and message complexity. In this paper, a distributed algorithm is presented to construct a minimum CDS for ad hoc and sensor networks. By destroying triangular loops in the virtual backbone, the proposed algorithm can effectively construct a CDS with smaller size. Moreover, our algorithm, which is fully localized, has a constant approximation ratio, linear message and time complexity, and low implementation complexity. The simulation results and theoretical analysis show that our algorithm has better efficiency and performance than conventional approaches.  相似文献   

4.
为了解决车载通信网中的信息安全问题,根据数字签名原理,综合考虑车载通信网实际状况,基于适合大规模群体的双线性对技术,提出快速高效并具有隐私保护功能的信息认证方案,把车辆分成私家车辆和公用车辆,分别采用群签名和基于身份签名的方法对相应信息进行认证,并引入积聚信息批量验证和矛盾信息量化对比确认技术,使车载通信网中信息认证效率比现有方案提高33%以上.仿真结果表明,信息认证的效率与预期分析符合,具有较强的鲁棒性和可扩充性,能够满足车载通信网的运行需求.  相似文献   

5.
An Adaptive Scheme for Neighbor Discovery in Mobile Ad Hoc Networks   总被引:1,自引:0,他引:1  
The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile node uses fixed period to send HELLO messages to notify its existence. An adaptive scheme was proposed. The objective is that when mobile nodes are distributed sparsely or move slowly, fewer HELLO messages are needed to achieve reasonable accuracy, while in a mutable network where nodes are dense or move quickly, they can adaptively send more HELLO messages to ensure the accuracy. Simulation results show that the adaptive scheme achieves the objective and performs effectively.  相似文献   

6.
Introduction Mobile ad hoc networks (MANETs) are newinfrastructureless networks without the usual rout-ing infrastructure like fixed routers and routingbackbones. A mobile ad hoc network is a multi-hop temporary self-organizing system compromisedof a group of mobile nodes with radios. MANETshave some special characteristics: self organizing,dynamic topology, limited bandwidth, resourceconstraint nodes, multi-hop routing, vulnerable tosecurity attacks etc. Recently, MANET has beenone of t…  相似文献   

7.
基于Pederson分布式密钥产生方案,采用椭圆曲线密码体制提出一个分布式密钥产生协议,该方案高效且能抵制内外恶意节点的攻击,并采用门限数字签名方案给出一个安全的移动自组网的成员控制方案.通过方案的性能和安全性分析得出结论,该成员控制策略非常适合于资源受限的移动自组网.  相似文献   

8.
移动Ad Hoc网络(MANET)是由移动节点组成的一个多跳的临时自治性网络,没有预先部署的网络基础设施,主要应用于需要临时、快速组网的场合.在Ad Hoc网络中,节点的随机移动性给网络协议的化设计带来了一定挑战.Ad Hoc网络的吞吐量很大程度上取决于路由协议算法.由于Ad Hoc网络的特殊性,其路由协议的设计与传统的具有固定基础设施的网络有很大不同.首先介绍了Ad hoc网络的特点,重点分析了几种常用的Ad Hoc网络路由协议,并对一些典型的路由协议进行了性能比较,最后得出结论.  相似文献   

9.
在无线Ad Hoc网络中,采用分簇的方法将移动自组网进行簇划分,形成由簇头、簇间节点和簇内节点构成的分簇网络结构,从而提供对无线Ad Hoc网络资源进行管理的一种简便构架,文中基于无线AdH oc网络簇结构的特点,提出了一种在无线AdHoc网络中实现的多播路由算法,该算法通过对无线AdHoc网络分簇,形成由簇头和簇间节点构成的虚拟骨干网,再对其进行回路检测和冗余剪枝算法处理,最终得到一个能满足多播要求的多播树.通过对仿真实验结果的分析,该算法具有稳定的数据包发送率,较低的路由建立时间。  相似文献   

10.
Mobile ad hoc networks create additional challenges for implementing the group key establishment due to resource constraints on nodes and dynamic changes on topology. The nodes in mobile ad hoc networks are usually low power devices that run on battery power. As a result, the costs of the node resources should be minimized when constructing a group key agreement protocol so that the battery life could be prolonged. To achieve this goal, in this paper we propose a security efficient group key agreement protocol based on Burmester-Desmedt (BD) scheme and layer-cluster group model, referred to as LCKM-BD, which is appropriate for large mobile ad hoc networks. In the layer-cluster group model, BD scheme is employed to establish group key, which can not only meet security demands of mobile ad hoc networks but also improve executing performance. Finally, the proposed protocol LCKM-BD are compared with BD, TGDH (tree-based group Diffe-Hellman), and GDH (group Diffie-Hellman) group key agreement protocols. The analysis results show that our protocol can significantly decrease both the computational overhead and communication costs with respect to these comparable protocols.  相似文献   

11.
在分析多径路由技术的基础E,提出了一种基于AODV的多径QOS路由协议AODVMQR.该协议采用了降低开销和时延的机制、多径路由机制和移动预测的思想,并提供了QoS保障.仿真结果表明,该协议减少了路由开销,提高了分组传输率,降低了时延,改善了网络的服务质量.  相似文献   

12.
This paper studies the existing problems of message authentication protocols in vehicular ad hoc networks(VANETs) due to their significance in the future of commuting and transportation. Our contribution has been devoted to implementing a new protocol for VANETs so that inherent security problems in past works are resolved. Exclusive security measures have been considered for the system which protects the users against threat of any attack. The new protocol shows a great hardness guaranteed by certificate based 80 bit security which assures messages to remain confidential in any time. Also, new unprecedented features like V2 X which improves system performance effectively have been instantiated. The simulation results indicate that message signature generation and verification both take place in much less time than present comparable rival protocols.  相似文献   

13.
Ad Hoc网络基于蚁群的按需路由算法研究   总被引:2,自引:0,他引:2  
目前已有一些研究将蚁群优化算法应用于Ad Hoc网络,文中在分析已有成果的基础上提出了一种新的按需路由算法,该算法综合了蚁群优化和AODV及DSR协议的思想,在源和目的之间建立起多路径路由,有效地提高了网络传输性能.模拟结果显示,该算法能较好地适应MANET动态变化的拓扑环境,在性能上优于一些相关的算法.  相似文献   

14.
移动自组网QoS路由协议研究   总被引:6,自引:7,他引:6  
移动自组网是建立军事和民用快速通信系统的理想技术.如何在移动自组网中提供不同的服务质量(QoS)是其面临的一个重要问题,而QoS路由技术则是其中的核心技术和热点问题.文中对不同研究者提出的几种QoS路由算法进行了分析和研究,并从单向链路的支持、多播功能以及QoS参数选择几个方面进行了比较和分析,指出了移动自组网的QoS路由存在的问题,并针对问题提出了解决思路.  相似文献   

15.
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks   总被引:3,自引:0,他引:3  
Introduction Anadhocnetworkisacollectionofau-tonomousnodesthatcommunicatewitheachother byformingamulti-hopwirelessnetwork.The propertyofnotrelyingonthesupportfromany fixedinfrastructuremakesitusefulforawide rangeofapplications,suchasinstantconsultation betweenmobileusersinthebattlefields,emergen-cy,anddisastersituations,wheregeographicalor terrestrialconstraintsdemandtotallydistributed networks.Whileadhocnetworkprovidesagreat flexibilityforestablishingcommunications,italso bringsalotofresearch…  相似文献   

16.
In this paper,we propose a mathematical model of aggregate co-channel interference over Rayleigh fading in cognitive networks.Unlike the statistical models in the literature that aim at finding the bound or approximation of the interference,the proposed model gives an accurate expression of probability density function(PDF),cumulative distribution function(CDF) and mean and variance of the interference,which takes into account a number of factors,such as spectrum sensing scheme,and spatial distribution of the secondary users(SUs).In particular,we focus on a more general spatial structure where there are two roles of primary users(PUs)and the interfering SUs distributed in the two-dimensional space.The framework developed in this paper is easy to be applied in power control,error evaluation and other applications.  相似文献   

17.
如何在移动自组网中实现有效的多播路由技术是当前此领域研究中亟待解决的间题.文中对当前一些典型的多播路由协议进行了研究,从多播路由的拓扑结构、发现策略以及对单播路由的依赖等方面对它们进行了分析比较,并对多播路由的进一步研究方向进行了展望.  相似文献   

18.
Ad Hoe网络具有网络拓扑结构动态变化的特点,而且网络中的源节点与目的节点间通常存在多条路径.因此Ad Hoe网络中的路由协议必须适应网络的动态性且充分利用有效的多条路径.文中基于动态源路由协议DSR,提出了一种基于移动节点移动预测和多路径路由机制的路由协议PMDSR.该协议可根据移动节点的位置、速度和移动方向等信息,对相邻节点的链路最大生存时间进行预测,并选择相对稳定的多条路径投递分组.仿真结果表明,与经典的DSR协议相比,PMD-SR协议可有效地提高分组平均投递率,降低平均端到端时延.  相似文献   

19.
由于移动Ad Hoc网络的特殊性,带宽、延时以及节点的剩余能量才是反映其本质特性的重要参量,文中以可用带宽作为第一度量,同时考虑节点剩余能量、延时和延时抖动等因素,提出了基于最大可用带宽的多QoS约束的多播路由算法MRQW,给出了算法的实现过程和步骤,进行了算法的正确性证明和复杂性分析,仿真结果表明,该算法在带宽和路由成功率等方面均具有较好特性。  相似文献   

20.
移动Ad Hoc网络的自身特点,使它比有线网络更容易遭受攻击。文章首先分析了威胁移动Ad Hoc网络安全的典型攻击,主要讨论了移动Ad Hoc网络的安全路由技术和入侵检测技术两种安全技术,对一些典型安全方案进行了论述与比较。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号