用户名: 密码: 验证码:
移动自组网媒体接入控制协议自私行为优化算法设计
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Design of optimization algorithm for selfish misbehavior in medium access control protocol of mobile Ad Hoc network
  • 作者:高士娟 ; 王喜军 ; 朱清超
  • 英文作者:GAO Shijuan;WANG Xijun;ZHU Qingchao;School of Information Engineering, Zhengzhou University of Industry Technology;School of Information Engineering, Engineering University of People's Armed Police;
  • 关键词:自私行为 ; 移动自组网 ; 媒体接入控制协议 ; 稳态 ; 李雅普诺夫算法
  • 英文关键词:selfish misbehavior;;Mobile Ad Hoc NETwork(MANET);;Medium Access Control(MAC) protocol;;stability state;;Lyapunov algorithm
  • 中文刊名:JSJY
  • 英文刊名:Journal of Computer Applications
  • 机构:郑州工业应用技术学院信息工程学院;武警工程大学信息工程学院;
  • 出版日期:2019-01-29 10:10
  • 出版单位:计算机应用
  • 年:2019
  • 期:v.39;No.346
  • 基金:河南省高等学校青年骨干教师培养计划项目(2017GGJS195)~~
  • 语种:中文;
  • 页:JSJY201906039
  • 页数:6
  • CN:06
  • ISSN:51-1307/TP
  • 分类号:236-241
摘要
针对移动自组网媒体接入控制协议的自私行为处理机制中存在的静态性、不公平性和复杂性等问题,提出一种自私行为优化处理算法。首先,结合最优化理论和反馈原理,利用历史样本推导最优接入概率,实现参数的实时动态变化,改善静态性;然后,设置所有节点特定时刻均采用最优接入概率,改善网络公平索引系数;最后,采用线性迭代机制,避免算法复杂度的增加。在此基础上,利用李雅普诺夫算法和全局稳态点,理论上证明了所提算法的稳定性和有效性。实验结果表明,相比优化前,所提算法自私节点数、时延分别降低了30%~50%、8~10 ms,吞吐量、公平索引值分别提高了0.5 Mb/s、0.05,控制开销基本保持不变,自私行为处理机制的性能得到改善。
        To address the problems like static nature, unfairness and complexity in Selfish Misbehavior(SM) processing mechanism of Medium Access Control(MAC) protocol of Mobile Ad Hoc NETwork(MANET), an optimization algorithm for SM was proposed. By using optimization theory and feedback theory, the Optimal Access Probability(OAP) was conducted through the utilization of historical samples, realizing the dynamic change of parameters to improve static nature. Then, all nodes in the network were set to use the OAP at the given period, thus the fairness index of the network was promoted. Finally, linear iteration mechanism was adopted to avoid the increase of complexity. On basis of the above, stability and effectiveness of the proposed algorithm were proved theoretically by Lyapunov algorithm and global stable point. Experimental results show that, by the proposed algorithm, the number of SM decreases by 30%-50%, the end-to-end delay brings down 8-10 ms, the throughput increases about 0.5 Mb/s, the fairness index raises by 0.05, while the control overhead remains unchanged, all of which indicates that the performance of the SM processing mechanism has been improved.
引文
[1]朱清超,陈靖,龚水清,等.移动自组网媒体接入控制协议吞吐量与公平性均衡设计[J].计算机应用,2015,35(11):3275-3279,3311.(ZHU Q C,CHEN J,GONG S Q,et al.Design of medium access control protocol tradeoff between throughput and fairness in MANET[J].Journal of Computer Applications,2015,35(11):3275-3279,3311.)
    [2]朱清超,陈靖,龚水清,等.移动自组网自私行为闭环惩罚模型设计[J].计算机应用研究,2016,33(8):2446-2450.(ZHU QC,CHEN J,GONG S Q,et al.Design of closed-loop model on selfish behavior in MANET[J].Application Research of Computers,2016,33(8):2446-2450.)
    [3]GUANG L,ASSI C,BENSLIMANE A.MAC layer misbehavior in wireless networks:challenges and solutions[J].IEEE Wireless Communications,2008,15(4):6-14.
    [4]TARANNUM R,PANDEY Y.Detection and deletion of selfish MANET nodes a distributed approach[C]//Proceedings of the 2012 1st International Conference on Recent Advances in Information Technology.Piscataway,NJ:IEEE,2012:152-156.
    [5]SANABRIA-RUSSO L,BARCELO J,BELLALTA B,et al.A high efficiency MAC protocol for WLANs:providing fairness in dense scenarios[J].IEEE/ACM Transactions on Networking,2017,25(1):492-505.
    [6]KYASANUR P,VAIDYA N H.Selfish MAC layer misbehavior in wireless networks[J].IEEE Transactions on Mobile Computing,2005,5(4):502-516.
    [7]KYASANUR P,VAIDYA N H.Detection and handling of MAClayer misbehavior in wireless networks[C]//Proceedings of 2003International Conference on Dependable Systems and Networks.Piscataway,NJ:IEEE,2003:1-10.
    [8]HUANG C,LEA C-T,WONG A K-S.Fairness enhancement for802.11 MAC[C]//Proceedings of the 2010 International Conference on Access Networks,LNICST 37.Berlin:Springer,2010:25-39.
    [9]LI M,SALINAS S,LI P,et al.MAC-layer selfish misbehavior in IEEE 802.11 Ad Hoc networks:detection and defense[J].IEEETransactions on Mobile Computing,2015,14(6):1203-1217.
    [10]KONORSKI J.A game-theoretic study of CSMA/CA under a backoff attack[J].IEEE/ACM Transactions on Networking,2006,14(6):1167-1178.
    [11]FRANKLIN G F,POWELL J D,WORKMAN M L.Digital Control of Dynamic Systems[M].Reading,MA:Addison-Wesley,1990:192-196.
    [12]BIANCHI G.Performance analysis of the IEEE 802.11 distributed coordination function[J].IEEE Journal on Selected Areas in Communications,2000,18(3):535-547.
    [13]KALIL H K.Nonlinear Systems[M].3rd ed.New York:Macmillan,2002:174-180.
    [14]MISTRY H P,MISTRY N H.A survey use of ACO on AODV&DSR routing protocols in MANET[C]//Proceedings of the 2015International Conference on Innovations in Information Embedded and Communication System.Piscataway,NJ:IEEE,2015:1-6.
    [15]EASTLAKE 3rd D E,ABLEY J.IANA considerations and IETFprotocol and documentation usage for IEEE 802 parameters:RFC7042[EB/OL].[2018-09-26].https://tools.ietf.org/pdf/rfc7042.pdf.
    [16]CHUNG J,CLAYPOOL M.NS by example[EB/OL].[2018-09-26].http://nile.wpi.edu/NS/.
    [17]JAIN R K,CHIU D-M W,HAVE W R.A quantitative measure of fairness and discrimination for resource allocation in shared computer systems:DEC-TR-301[R].Hudson,MA:Eastern Research Laboratory,1984.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700