Trust-based on-demand multipath vector routing algorithm of Ad Hoc network

A multi-path and routing technology, applied in the direction of wireless communication, electrical components, etc., can solve the problems such as the stability of the transfer rate and the quality of service that have not been significantly improved, the balance of the transfer rate and overhead, and the fixed network environment. Achieve the effect of realizing the credibility of the monitoring path, the evaluation process is simple and efficient, and the scalability is strong

Inactive Publication Date: 2015-06-17
SHANDONG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, there are some multi-path solutions, such as bandwidth-based multi-path routing and multi-path routing based on first-hop signs and public node signs. Although bandwidth-based solutions formally solve the problem of propagation speed, the transfer rate and other The quality of service related to stability has not been significantly improved, and it is still not suitable for use in environments with high reliability requirements
The scheme based on the first-hop flag and public node flag extends the original AOMDV routing reply process, and can find a multi-path set with higher irrelevance. However, this scheme lacks necessary countermeasures when encountering malicious nodes and cannot be effective. Identify or bypass malicious nodes
Most of the current multipath schemes ignore the insecure characteristics of wireless networks
[0006] At present, there are not many schemes for evaluating path credibility in the field of self-organizing networks, and most studies assume that the network environment is fixed or slowly moving, and only focus on the direct credibility of nodes.
In the face of path credibility, most protocols have inherent serious flaws. Some protocols use a global algorithm, and the convergence speed decreases exponentially with the increase in the number of nodes. The scalability problem is serious; some protocols can efficiently deal with black boxes or malicious The node loses packets according to the same packet loss rate for all neighbor nodes, but does not fully consider the problem of malicious nodes only dropping packets for some neighbors; there are also some protocols that seem perfect in theory, but do not consider the computing power of nodes And the assumption that computing energy consumption is much less than communication energy consumption
At the same time, although some protocols have obtained a better delivery rate, they send a large number of control packets, which causes too much network overhead and wastes a lot of energy; If some nodes defected after the route was established, it cannot deal with
Moreover, these existing protocols more or less have problems in the balance of delivery rate and overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust-based on-demand multipath vector routing algorithm of Ad Hoc network
  • Trust-based on-demand multipath vector routing algorithm of Ad Hoc network
  • Trust-based on-demand multipath vector routing algorithm of Ad Hoc network

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0072] Example 1 explains the routing maintenance mechanism, such as Figure 7 . Assume that source node 0 has established two link-disjoint paths 01235 and 04265 to destination node D. In the initial state, the latter path is more credible, so it is selected as the forwarding path by the source node. At a certain moment, node 6 defected and randomly discarded the packets transmitted from node 2. After a short period of time, node 2's evaluation of 6 has become lower than the threshold value of 0.26. When the next data packet arrives at node 2, node 2 finds that the next hop is 6 according to the previous hop query path precursor table, and node 6 is a malicious node, thus triggering a path error. Node 2 puts the problem path and other path information whose next hop is node 6 into the path error message, and sends the data packet to the upstream node 4 in unicast. After node 4 receives it, it deletes the relevant problem path, and sends a path error message to the path pre...

example 2

[0073] Example 2 describes another common situation, such as Figure 8. The above example is multiple paths of the same source / destination node pair, while the second example is different paths of different node pairs. Nodes 1 and 2 in the figure are source nodes, and node 6 is a common destination node. The routing table in the normal state is as shown in the figure, and the current nodes 1 and 2 both use the path 3456 to transmit data. And when node 5 defected, after a short period of time, neighbor 4 detected that node 5 defected, and after encountering the data packet sent upstream, node 4 started the path error mechanism to unicast and send it to node 3. Node 3 unicasts to source nodes 1 and 2, but these paths have no predecessors at this time, so they are no longer forwarded. If node 1 wants to send data again, it needs to reroute the request, and node 2 automatically switches to the path passing through node 7.

[0074] Therefore, using the route maintenance mechani...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trust-based on-demand multipath vector routing algorithm of an Ad Hoc network The trust-based on-demand multipath vector algorithm of the Ad Hoc network includes that simple and practical credible theories are utilized to improve and expand an AOMDV (Ad Hoc On-demand Multipath Distance Vector) routing protocol, and the packet loss rate is used as a measurement of credibility to establish a credible multipath, so that the data transfer rate is greatly increased. Meanwhile, the path maintenance system is added based on the original route maintenance, and the original route error broadcast is changed to the wrong path unicast, so that the maintenance overhead of trusted paths is reduced. According to the Ad Hoc network trust-based on-demand multipath vector routing algorithm, a balance is found between the transmission rate and the network overhead, and the quality of service is substantially improved due to the fact that the trust-based on-demand multipath vector routing algorithm of the Ad Hoc network is verified by an NS2 simulation testing and a field testing.

Description

technical field [0001] The invention relates to an on-demand multi-path vector routing algorithm, in particular to a trust-based on-demand multi-path vector routing algorithm in an Ad Hoc network. Background technique [0002] Mobile Ad Hoc network is a self-organizing and reconfigurable wireless network with strong environmental adaptability. Each node is equal in status, and the node can act not only as a host, but also as a router, forwarding packets for surrounding neighbor nodes. MANET network has a wide range of applications in distributed collaborative systems such as military, disaster relief, and environmental monitoring. In mobile ad hoc networks, due to the random movement of nodes, limited resources, unreliable links and channels, and imperfect anti-intrusion systems, traditional multi-path routing protocols are difficult to adapt to the needs of modern applications. [0003] In the Ad Hoc network, there are various forms of attacks such as selective delivery a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W40/04
Inventor 贾智平鞠雷曲传浩颜冲
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products