用户名: 密码: 验证码:
无线网格网中关键技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着人们通信需求的提高,无处不在(Ubiquitous)、宽带(Broadband)和无线(Wireless)成为了当前通信领域最流行和最关键的三个词。在这种形势下,做为下一代无线网络关键技术的无线网格网由于有望满足以上条件而受到了越来越多的关注,成为了工业界和学术界的一个研究热点。
     无线网格网中的关键技术涉及到网络中的方方面面,本论文的研究侧重点放在MAC层、网络层以及入侵检测方面的相关协议及算法。在对现有的相关技术进行深入研究的基础上,本论文完成了以下一些具有创新性的工作:
     1.针对多跳多信道的无线网格网提出了基于快速转发的媒体接入控制方案。现有的媒体接入控制方案只考虑了一跳范围内的信道竞争,并不适合于多跳的无线网格网,尤其不适合于需要传输实时业务的无线网格网。因此,本文针对IEEE 802.11s在MAC层进行路由选择的特点,提出了一种基于快速转发的媒体接入控制方案,对提高实时业务的服务质量、减少端到端时延具有重要作用。
     2.针对多收发器多信道无线网格网提出了基于未来信道预留的媒体接入控制协议。为了减轻多信道无线网格网中常见的“耳聋问题”和“多信道隐藏终端问题”,常用的方法就是设置一条公共控制信道。然而,控制信道的使用引入了信道利用率低、信道请求相对集中的问题。因此,本文提出了基于未来信道预留的媒体接入控制协议,对提高数据信道利用率、降低端到端时延、增加系统吞吐量具有重要作用。
     3.针对感知无线网格网提出了基于频谱树的按需路由协议。无线网格网虽被认为是下一代无线网络的关键技术,它的性能却被拥挤的无执照频段所限制。而感知无线电技术支持无线频谱的灵活使用,允许无执照用户动态的接入空闲频谱。因此,本文将感知无线电技术与无线网格网有效结合起来,并提出了基于频谱树的按需路由协议,有效解决了路由选择和频谱决定之间的协作问题。此外,本文还提出了一个新的路由度量因子和频谱自适应的路由恢复算法。
     4.针对感知无线网格网提出了基于能量节约的路由算法。在基于客户端网络结构的无线网格网中,能量问题显得尤为关键。因此,本文提出了一种节能的路由算法,该算法通过将按需频谱侦听和节省功率消耗的路由发现机制相结合,有效的解决了路由选择和频谱决定之间的协作问题并减少了不必要的功率消耗。
     5.针对无线网格网中的分布式入侵检测提出了ConvexQuadratic优化合并算法。因为缺乏集中式的网络结构,分布式入侵检测成为保护无线网格网的必要手段。在分布式入侵检测中,一个常见的问题就是如何有效的整合从多个分散的节点接收到的不同的本地检测信息。因此,本文针对多个本地信息的整合提出了一种ConvexQuadratic优化合并算法,大大减少了对入侵检测的不正确判断。在该算法的基础上,本文还提出了节点可信度的计算方法和一个增强入侵检测可靠度的反馈机制。
As the increasing expectations for communication, "Ubiquitous", "Broadband" and "Wireless" have become the three most popular and important words in Telecommunication. In this situation, wireless mesh networks (WMNs), as a promising technology to meet the target, are attracting more and more attention from both industry and academia.
     However, for a WMN to achieve the expectations, considerable research efforts are still needed. There are open issues in physical layer, medium access control (MAC) layer, routing layer, transport layer and application layer. This thesis focuses on the algorithms and protocols of MAC layer, routing layer and intrusion detection in WMNs. Based on the state of the arts in-depth studies, I have done the following innovative works:
     1. Proposed a fast forward MAC (FFMAC) protocol for IEEE 802.11s based multi-hop multi-channel WMNs. Most of the current MAC protocols have been designed only for one-hop communication and they are not suitable for multi-hop WMNs, especially not suitable for multi-hop WMNs with real-time applications. Therefore, the FFMAC is proposed for quality of service (QoS) guarantee in multi-hop multi-channel WMNs. By providing higher priority for real-time applications, FFMAC reduces the end-to-end delay and increases throughput significantly.
     2. Proposed a future channel reservation MAC (FCR-MAC) for multi-radio multi-channel WMNs. To mitigate the "deafness" and the "multi-hop hidden terminal" problems, a feasible solution is to equip each node with a control radio and fix it on a common control channel (CCC). However, the application of the CCC introduces other problems. Depending on the number of available data channels, the CCC may be under-utilized or may become a bottleneck. To address these challenges, a novel MAC protocol based on future channel reservation is proposed in this thesis. The proposed FCR-MAC guarantees higher utilization of channel resources and reduces the average delay in performing channel negotiation and reservation.
     3. Proposed a spectrum-tree based on-demand routing protocol (STOD-RP) for cognitive wireless mesh networks. Although WMN is regarded as the key technology for next-generation wireless networks, its performance is limited by the crowded unlicensed band. Meanwhile, cognitive radio (CR), with its capability to support flexible usage of wireless radio spectrum, can let unlicensed users to access licensed band opportunistically. Hence, I used the CR capability to complement the WMN and proposed a spectrum-tree based on-demand routing protocol. The STOD-RP addresses the cooperation between spectrum decision and route selection in an efficient way. In addition, a new route metric is proposed as well as a spectrum-adaptive route recovery method.
     4. Proposed a spectrum- and energy-aware routing protocol (SEA-RP) for cognitive wireless mesh networks. Energy is a crucial factor for client WMNs because many devices are powered by batteries with a limited lifetime. By combining the on-demand spectrum sensing mode with an energy-save route discovery scheme, the proposed SEA-RP addresses the cooperation between spectrum decision and route selection in an efficient way and eliminates unnecessary energy consumption.
     5. Proposed a convex quadratic optimization approach for distributed intrusion detection in WMNs. Due to the lack of a centralized infrastructure, the distributed intrusion detection is necessary for protecting WMNs. A generic problem in distributed intrusion detection is to integrate a variety of local detection information from multiple dispersed nodes effectively. Therefore, a convex quadratic optimization approach is proposed to integrate the dispersed local detected information. The proposed approach can considerably reduces incorrect judgment and has low complexity. Moreover, an algorithm for node's trustworthiness and a feedback scheme is presented as well.
引文
[1]N.Pogkas,G.E.Karastergios,C.P.Antonopoulos,et al,"Architecture Design and Implementation of an Ad-Hoc Network for Disaster Relief Operations," IEEE Transactions on Industrial Informatics,vol.3,no.1,Feb.2007,pp.63-72.
    [2]W.Wei,A.Zakhor,"Multiple Tree Video Multicast Over Wireless Ad Hoc Networks," IEEE Transactions on Circuits and Systems for Video Technology,vol.17,no.1,Jan.2007,pp.2-15.
    [3]J.Eshet,B.Liang,"Randomly Ranked Mini Slots for Fair and Efficient Medium Access Control in Ad Hoc Networks," IEEE Transactions on Mobile Computing,vol.6,no.5,May 2007,pp.433-445.
    [4]P.C.Ng,S.C.Liew,"Throughput Analysis of IEEE802.11 Multi-Hop Ad Hoc Networks," IEEE/ACM Transactions on Networking,vol.15,no.2,Apr.2007,pp.309-322.
    [5]Y.Pan,W.Hamouda,A.Elhakeem,"An efficient medium access control protocol for mobile ad hoc networks using antenna arrays," IEEE Canadian Journal of Electrical and Computer Engineering,vol.32,no.1,2007,pp.19-25.
    [6]R.M.de Moraes,H.R.Sadjadpour,J.J.Garcia-Luna-Aceves,"Taking Full Advantage of Multiuser Diversity in Mobile Ad Hoc Networks," IEEE Transactions on Communications,vol.55,no.6,Jun.2007,pp.1202-1211.
    [7] B. J. Wolf, J. L. Hammond, D. L. Noneaker, et al, "A protocol for construction of broadcast transmission schedules in mobile ad hoc networks," IEEE Transactions on Wireless Communications, vol. 6, no. 1, Jan. 2007, pp. 74-78.
    [8] S. C. Wang, H. Z. Chou, D. S. L. Wei, "On the fundamental performance limits of peer-to-peer data replication in wireless ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 25, no. 1, Jan. 2007, pp. 211-221.
    [9] G. Ferrari, O. K. Tonguz, "Impact of Mobility on the BER Performance of Ad Hoc Wireless Networks," IEEE Transactions on Vehicular Technology, vol. 56, no. 1, Jan. 2007, pp. 271-286.
    [10]H. Zhai, X. Chen, Y. Fang, "Improving Transport Layer Performance in Multihop Ad Hoc Networks by Exploiting MAC Layer Information," IEEE Transactions on Wireless Communications, vol. 6, no. 5, May 2007, pp. 1692-1701.
    [11]R. H. Gau, "Performance analysis of slotted Aloha in interference-dominating wireless ad-hoc networks," IEEE Communications Letters, vol. 10, no. 5, May 2006, pp. 402-404.
    [12]C. Comaniciu, H. V. Poor, "On the capacity of mobile ad hoc networks with delay constraints," IEEE Transactions on Wireless Communications, vol. 5, no. 8, Aug. 2006, pp. 2061-2071.
    [13]F. Eshghi, A. K. Elhakeem, Y. R. Shayan, "Performance evaluation of multihop ad hoc WLANs," IEEE Communications Magazine, vol. 43, no. 3, March 2005, pp. 107-115.
    [14]C. Chaudet, D. Dhoutaut, I. G. Lassous, "Performance issues with IEEE 802.11 in ad hoc networking," IEEE Communications Magazine, vol. 43, no. 7, July 2005, pp. 110-116.
    [15] S. Toumpis, A. J. Goldsmith, "Capacity regions for wireless ad hoc networks," IEEE Transactions on Wireless Communications, vol. 2, no. 4, Jul 2003. pp. 736-748.
    [16] F. Eshghi, A. K. Elhakeem. "Performance analysis of ad hoc wireless LANs for real-time traffic," IEEE Journal on Selected Areas in Communications, vol. 21, no. 2, Feb. 2003, pp. 204-215.
    [17] I. F. Akyildiz, X. Wang, W. Wang, "Wireless Mesh Networks: a Survey," Computer Networks, vol.47, no. 4, Mar. 2005, pp. 445-487.
    [18] I. F. Akyildiz, X. Wang, "A Survey on Wireless Mesh Networks," IEEE Radio Communications, vol. 43, no. 9, Sep. 2005, pp. s23-s30.
    [19] S. Fashandi, T. D. Todd, "Real-Time Handoff in Solar/Battery Powered ESS Mesh Networks," In Proc. of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2005), vol. 3, Sept. 2005, pp. 1489-1494.
    [20] L. Maccari, R. Fantacci, T. Pecorella, et al, "Secure, fast handhoff techniques for 802.1X based wireless network," In Proc. of IEEE International Conference on Communications 2006, vol. 9, Jun. 2006, pp. 3917-3922.
    [21]H.-Y. Wei, S. Kim, S. Ganguly, et al, "Seamless Handoff Support in Wireless Mesh Networks," In Proc. of IEEE Workshop on Operator-Assisted (Wireless Mesh) Community Networks 2006, Sept. 2006, pp. 1-8.
    [22]Y.-J. Choi, K. B. Lee, S. Bahk, "All-IP 4G Network Architecure for Efficient Mobility and Resource Managemetn," IEEE Wireless Communications/IEEE Personal Communications, vol. 14, no. 2, Apr. 2007, pp. 42-46.
    [23] L. Becchetti, F. D. Priscoli, T. Inzerilli, et al, "Enhancing IP service provision over heterogeneous wireless networks: a path toward 4G," IEEE Communications Magazine, vol. 39, no. 8, Aug. 2001, pp. 74-81.
    [24] A. Misra, S. Das, A. Dutta, et al, "IDMP-based fast handoffs and paging in IP-based 4G mobile networks," IEEE Communications Magazine, vol. 40, no. 3, March 2002, pp. 138-145.
    [25] V. Marques, R. L. Aguiar, C. Garcia, et al, "An IP-based QoS architecture for 4G operator scenarios," IEEE Wireless Communications/ IEEE Personal Communications, vol. 10, no. 3, June 2003, pp. 54-62.
    [26]Raffaele Bruno, Marco Conti, Enrico Gregori, "Mesh Networks: Commodity Multihop Ad Hoc Networks," IEEE Communications Magazine, March 2005, pp. 123-131.
    [27] P. Whitehead, "Mesh Networks: A New Architecture for Broadband Wireless Access Systems," In Proc. of IEEE Radio and Wireless Conference 2000, 10-13 Sept. 2000, pp. 43-46.
    [28]T. Fowler, "Mesh Networks for Broadband Access," IEEE Review, vol. 47, no. 1, Jan 2001, pp. 17-22.
    [29]K. Rayner, "Mesh Wireless Networking," Communications Engineer, vol. 1, no. 5, Oct.-Nov. 2003, pp. 44-47.
    [30]Tomas Krag, Sebastian Buettrich, "Wireless Mesh Networking," http://www.orellynet.com, 2004.1.
    [31]Y.Zheng,K.Lu,D.W.Fang,"Performance Analysis of IEEE 802.11 DCF in Imperfect Channels," IEEE Transactions on Vehicular Technology,vol.55,no.5,Sept.2006,pp.1648-1656.
    [32]T.Sakurai,H.L.Vu,"MAC Access Delay of IEEE 802.11 DCF," IEEE Transactions on Wireless Communications,vol.6,no.5,May 2007,pp.1702-1710.
    [33]J.Choi,J.Yoo,S.Choi,et al,"EBA:an enhancement of the IEEE 802.11 DCF via distributed reservation," IEEE Transactions on Mobile Computing,vol.4,no.4,July-Aug.2005,pp.378-390.
    [34]C.Wang;B.Li;L.Li,"A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF," IEEE Transactions on Vehicular Technology,vol.53,no.4,July 2004,pp.1235-1246.
    [35]P.Bahl,R.Chandra,J.Dunagan,"SSCH:Slotted seeded channel hopping for capacity improvement in ieee 802.11 ad-hoc wireless networks," In Proc.of ACM MobiCom 2004,2004,pp.216-230.
    [36]J.So,N.Vaidya,"Multi-channel mac for ad hoc networks:Handling multi-channel hidden terminals using a single transceiver," In Proc.of ACM MobiHoc 2004,2004,pp.222-233.
    [37]A.Tyamaloukas,J.J.Garcia-Luna-Aceves,"'Channel-hopping multiple access,"In Proc.of IEEE ICC 2000,2000,pp.415-419.
    [38]A.Tzamaloukas,J.J.Garcia-Luna-Aceves,"Channel hopping multiple access with packet trains for ad hoc networks," In Proc.of IEEE MoMuC 2000,2000.
    [39]C.Y.Li,A.K.Jeng,R.H.Jan,"A medium access control protocol for multi-channel multi-interface wireless mesh network," In Proc.of IEEE WASN 2006,2006,pp.357-364.
    [40]A.K.Das,S.Roy,R.Vijaykumar,"Static channel assignment in multi-radio multi-channel 802.11 wireless mesh networks:Issues,metrics and algorithms," In Proc.of IEEE GLOBECOM 2006,2006.pp.1-6.
    [41]J.S.Pathmasuntharam,A.Das,A.K.Gupta,"Primary channel assignment based MAC(PCAM) - a multi-channel MAC protocol for multi-hop wireless networks,"In Proc.of IEEE WCNC 2004,2004,pp.1110-1115.
    [42]K.Pradeep,N.H.Vaidya,"Routing and link-layer protocols for multi-channel multi-interface ad hoc wireless networks," ACM SIGMOBILE Mobile Computing and Communications Review,vol.10,no.15,2006,pp.31-43.
    [43] S. L. Wu, C. Y. Lin, Y. C. Tseng, et al, "A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks," In Proc. of IEEE ISPAN 2000, 2000, pp. 232-237.
    [44] S. L. Wu, C. Y. Lin, Y. C. Tseng, et al, "A multi-channel MAC protocol with power control for multi-hop mobile ad hoc networks," The Computer Journal, vol. 45,no.1, Jan. 2002 pp. 101-110.
    [45] C. P. P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance Vector Routing (DSDV) for Mobile Computer," In Proc. of ACM SIGCOMM'94, Sept. 1994, pp. 234-244.
    [46] D. B. Johnson, D.A. Maltz, "Dynamic Source Routing in Ad-hoc Wireless Networks," Mobile Computing, 1996, pp. 153-181.
    [47] C. Perkins, E. Royer, "Ad-Hoc On-Demand Distance Vector Routing," In Proc. of the 2~(nd) IEEE Workshop on Mobile Computing Systems and Applications, Feb. 1999, pp. 90-100.
    [48] R. Draves, J. Padhye, B. Zill, "Routing in multi-radio, multi-hop wireless mesh networks," In Proc. of ACM MOBICOM 2004, May 2004, pp. 114-128.
    [49] K. Jain, J. Padhye, V. Padmanabhan, et al, "Impact of interference on multi-hop wireless networks performance," In Proc. of ACM MOBICOM 2003, Step. 2003, pp. 66-80.
    [50] L. Wang, L. Zhang, Y. Shu, et al, "Multipath Source Routing in Wireless Ad Hoc Networks," In Proc. of Canadian Conference on Electrical and Computer Engineering, vol. 1, 2000, pp. 479-483.
    [51] A. K. Saha, D. B. Johnson, "Self-organizing hierarchical routing for scalable ad hoc networking," Technical Report, TR04-433, Department of Computer Science, Rice University.
    [52] [52] L. Iannone, R. Khalili, K. Salamatian, et al, "Cross-Layer Routing in Wireless Mesh Networks," Computer Networks, Mar., 2005, pp. 445-487.
    [53]ANSI/IEEE Std 802.11i, "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements," 2004.
    [54] Ferguson N, Kelsey J, Schneier B, et al, "Improved Cryptanalysis of Rijndael," Fast Software Encryption 2000, LNCS 1978, B Schneier, Ed., Springer-Verlag, 2001, pp. 213-231.
    [55] W. Baodian, L. Dongsu, W. Xinmei, "The Principle, Implementation and Cryptanalysis of AES Algorithm Rijndael," Communications Technology, vol. 12, 2002, pp. 22-29.
    [56] L. Zhou, Z. J. Haas, "Securing ad hoc networks," IEEE Networks, vol.13, no.6, 1999, pp. 24-30.
    [57] H. Luo, S. Lu, "Ubiquitous and robust authentication services for ad hoc wireless networks," Technical Report 200030, UCLA Computer Science Department 2000.
    [58] J. P. Hubaux, L. Buttyan, S. Capkun, "The quest for security in mobile ad hoc networks," In Proc. of ACM MobiHoc 2001, 2001, pp. 146-155.
    [59] Y. Zhang, W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," In Proc. of ACM Mobile Computing and Networking, 2000, pp. 275-283.
    [60]T.M. Chen, V. Venkataramanan, "Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks," IEEE Internet Computing, vol. 9, no. 6, Nov-Dec. 2005, pp. 35-41.
    [61]F. Kargl et al., "Sensors for Detection of Misbehaving Nodes in MANETs," In Proc. of Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA 2004), 2004; www.dimva.org/dimva2004/.
    [62] V. Karpijoki, "Security in Ad Hoc Networks," http://www.hut.fi/~vkarpijo/netsec00/netsec00_manet_sec.ps.
    [63]A. Siraj, R.B. Vaughn, S.M. Bridges, "Intrusion Sensor Data Fusion in An Intelligent Intrusion Detection System Architecture," In Proc. of the 37~(th) Hawaii International Conference on System Sciences, Jan. 2004, pp. 1-10.
    [64] N. Einwechter, "An Introduction to Distributed Intrusion Detection Systems," http://www.securityfocus.com/infocus/1532.
    [65] Y. F. Zhang, Z. Y. Xiong, X. Q. Wang, "Distributed Intrusion Detection Based on Clustering," In Proc. of the 4~(th) International Conference on Machine Learning and Cybernetics, 2005, pp. 2379-2383.
    [66]R.Braden. D.Clark, S. Shenker. "Integrated Services Architecture," Internet Engineering Task Group (IETF), Request for Comment (RFC): 1633, June 1994.
    [67] S. Blake, D. Black, M. Carlson, et al, "An Architecture for Differentiated Services," Internet Engineering Task Group (IETF), Request for Comment (RFC): 2475, December 1998.
    [68] C. Zhu, M .S .Corson, "QoS routing for mobile ad hoc networks," In Proc. of IEEE INFOCOM 2002, New York, USA,2002, vol.2, pp. 958-967.
    [69] C. R. Lin, J. S. Liu, "QoS routing in ad hoc wireless networks," IEEE J. Selected Areas in Communications, vol. 17, no. 8,1999, pp. 1426-1438.
    [70] S. Chen, K. Nahrstedt, "Distributed quality of service routing in ad-hoc networks," IEEE J. Selected Areas in Communications, vol. 17, no. 8, 1999, pp.1488-1505.
    [71]R. Sivakumar, P.Sinha, V. Bharghavan, "CEDAR: A core-extraction distributed ad hoc routing algorithm," IEEE J. Selected Areas in Communications, Special Issue on Ad Hoc Networks, vol. 17, no. 8,1999, pp. 1454-1465.
    [72] S. H. Shah, K. Nahrstedt, "Predictive location-based QoS routing in mobile ad hoc networks," In Proc. of IEEE ICC 2002, New York, USA, vol.2, 2002, pp. 1022-1027.
    [73] C. R. Lin, "On-demand QoS Routing in Multihop Mobile Networks," In Proc. of IEEE INFOCOM 2001, vol. 3, April 2001, pp. 1735-1744.
    [74] C. Huang, F. Dai, J. Wu, "On-Demand Location-Aided QoS Routing in Ad Hoc Networks," In Proc. of International Conference on Parallel Processing (ICPP 2004), Aug.2004, pp. 502-509.
    [75] C. Zhu, M. S. Corson, "A Five-phase Reservation Protocol (FPRP) for Mobile Ad Hoc Networks," In Proc. of IEEE INFOCOM'98, San Francisco, CA, USA, April 1998, vol.1, pp. 322-331.
    [76] J. L. Sobrinho, A. S. Krishnakumar, "Quality-of-Service in Ad Hoc Carrier Sense Multiple Access Networks," IEEE J. Selected Areas in Communications, vol. 17, no.8, August 1999, pp. 1353-1368.
    [77]S. Mangold, S. Choi, P. May, et al, "IEEE 802.11e Wireless LAN for Quality of Service (invitedp aper)," In Proc. of the European Wireless, Florence, Italy, vol. 1, February 2002, pp. 32-39.
    [78] Jie Hui, Devetsikiotis, M., "Designing improved MAC packet schedulers for 802.11e WLAN," In Proc. of IEEE GLOBECOM'03, vol.1, 2003, pp. 184-189.
    [79]G. S. Ahn, A. T. Campbell, A. Veres, et al, "Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad Hoc Networks (SWAN)," IEEE Transaction on Mobile Computing, vol. 1, no. 3, 2002, pp. 192-207.
    [80] A. Veres, A. T. Campbell, M. Barry, et al, "Supporting Service Differentiation in Wireless Packet Networks Using Distributed Control," IEEE J. of Selected Areas in Communications, vol. 19, no. 10, Oct. 2001, pp. 2081-2093.
    [81] David Julian, Mung Chiang, et al, "QoS and Fairness Constrained Convex Optimization of Resource Allocation for Wireless Ad Hoc Networks," In Proc. of IEEE INFOCOM 2002, New York, USA, June 2002, pp. 477-486.
    [82] L. P. Tung, W. K. Shih, T. C. Cho, et al, "TCP Throughput Enhancement over Wireless Mesh Networks," IEEE Communications Magazine, vol. 45, no. 11, November 2007, pp. 64-70.
    [83]C. Liu, F. Shen, M. Sun, "A Unified TCP Enhancement for Wireless Mesh Networks," In Proc. of IEEE ICPPW 2007, 10-14 Sept. 2007, pp. 71-77.
    [84] M. Malekesmaeili, M. Shiva, M. Soltan, "Topology Optimization for Backbone Wireless Mesh Networks," In Proc. of the 5~(th) Annual Conference on Communication Networks and Services Research, 14-17 May 2007, pp. 221-230.
    [85] A. Naveed, S. S. Kanhere, S. K. Jha, "Topology Control and Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks," In Proc. of IEEE MASS 2007,8-11 Oct. 2007, pp. 1-9.
    [86] D. Huang, P. Lin, C. Gan, "Design and Performance Study for a Mobility Management Mechanism (WMM) Using Location Cache for Wireless Mesh Networks," IEEE Transactions on Mobile Computing, vol. 7, no. 5, May 2008, pp. 546-556.
    [1]O.Aboul-Magd et al.,"Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs," IEEE 802.11 s document,DCN 802.11-06/0328r0,February 27.2006,http://www.802wirelessworld.com/index.jsp.
    [2]C.Perkins,E.Belding-Royer and S.Das,"Ad hoc On-Demand Distance Vector (AODV) Routing",IETF RFC 3561,July 2003.
    [3]M.Benveniste and Z.Tao,"Performance Evaluation of a Medium Access Control Protocol for IEEE 802.11s Mesh Networks," IEEE 802.11s document,DCN 802.11-05/0877r2,September 2005,http://www.802wirelessworld.com/index.jsp.
    [4]ANSI/IEEE Std 802.11,1999 Edition(R2003),"Part 11:Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) specifications," Reaffirmed,1999.
    [5]Ian F.Akyildiz and X.Wang,"A Survey on Wireless Mesh Networks," IEEE Communications Magazine,vol.43,no.9,Sep.2005,pp.S23-S30.
    [6]D.E.Eastlake 3rd,"IEEE 802.11s Call for Proposals," IEEE 802.11s document,DCN 802.11-04/1430r12,January 2005,http://www.802wirelessworld.com/index.jsp
    [7]http://www.ieee802.org/15/pub/TG5.html
    [8]M.S.Gast,802.11 Wireless Networks:The Definitive Guide,2nd ed.Cambridge,MA:O'Reilly,2005,ch.A peek ahead at 802.11n:MIMO-OFDM.
    [9]J.-C.Chen,M.-C.Jiang and Y.Liu,"Wireless LAN security and IEEE 802.11i," in Proc.IEEE Wireless Communications,Feb.2005,pp.27-36.
    [10]A.Acharya,A.Misra and S.Bansal,"High-Performance Architectures for IP-Based Multihop 802.11 Networks," IEEE Wireless Communications,Oct.2003,pp.22-28.
    [11]P.Kyasanur,J.So,C.Chereddi and N.H.Vaidya,"Multichannel Mesh Networks:Challenges and Protocols," IEEE Wireless Communications,Aprl 2006,pp.30-36.
    [12]S.L.Zhao,Z.Wu,A.Acharya and D.Raychaudhuri,"PARMA:a PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate Radios," In Proc.of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks(WoWMoM'05),2005.
    [13]G.Bianchi,"Performance analysis of the IEEE 802.11 Distributed Coordination Function," IEEE J.Sel.Areas Commun.,vol.18,no.3,Mar.2000,pp.535-547.
    [14]K.Sundaresan,H.Y.Hsieh and R.Sivakumanr,"IEEE 802.11 over multi-hop wireless networks:Problems and new perspectives," Elsevier Ad Hoc Networks,vol.2,no.2,Apr.2004,pp.109-132.
    [15]J.S.Pathmasuntharam,A.Das and A.K.Gupta,"Primary Channel Assignment based MAC(PCAM) - A Multi-Channel MAC Protocol for Multi-Hop Wireless Networks," Proc.of IEEE WCNC 2004,March 2004,pp.1110-1115.
    [16]E.Carlson et al."A Distributed End-to-End Reservation Protocol for IEEE 802.11-Based Wireless Mesh Networks," IEEE J.Sel.Areas Communications,vol.24,no.11,Nov.2006,pp.2018-2027.
    [1]IEEE 802.11 WG,IEEE Std.802.11,1999 ed,Part Ⅱ:Wireless LAN MAC and PHY layer specs.1999.
    [2]Network Simulator(NS),www.isi.edu/nsnam/ns.
    [3]I.F.Akyildiz,X.Wang,and W.Wang,"Wireless mesh networks:a survey,"Computer Networks,vol.47,no.4,pp.445-487,2005.
    [4]P.Bahl,R.Chandra,and J.Dunagan,"SSCH:Slotted seeded channel hopping for capacity improvement in ieee 802.11 ad-hoc wireless networks," in proc.of ACM MobiCom 2004,2004,pp.216-230.
    [5]A.K.Das,S.Roy,and R.Vijaykumar,"Static channel assignment in multi-radio multi-channel 802.11 wireless mesh networks:Issues,metrics and algorithms." in proc.of IEEE Globecom 2006,2006.
    [6]M.Gong,S.Mao,S.Midkiff,and B.Hart,"Medium access control in wireless mesh networks'" Wireless Mesh Networking,vol.1,pp.147-182,Auerbach Publications,2007.
    [7]P.Kyasanur and Vaidya N.H,"Capacity of multi-channel wireless networks:impact of number of channels and interfaces." in proc.of ACM Mobicom 2005,2005,pp.43-57.
    [8]C.Y.Li,A.K.Jeng,and R.H.Jan,"A medium access control protocol for multi-channel multi-interface wireless mesh network," in proc.of IEEE WASN 2006,2006,pp.357-364.
    [9]J.Mo,H.S.W.So,and J.Walrand,"Comparison of multi-channel mac protocols," in proc.of ACM MSWiM 2005,2005,pp.209-218.
    [10]J.S.Pathmasuntharam,A.Das,and A.K.Gupta,"Primary channel assignment based mac(pcam) - a multi-channel mac protocol for multi-hop wireless networks," in proc.of IEEE WCNC 2004,2004,pp.1110-1115.
    [11]K.Pradeep and N.H.Vaidya,"Routing and link-layer protocols for multi-channel multi-interface ad hoc wireless networks," ACM SIGMOBILE Mobile Computing and Communications Review,vol.10,no.15,pp.31-43,2006.
    [12]J.So and N.Vaidya,"Multi-channel mac for ad hoc networks:Handling multi-channel hidden terminals using a single transceiver," in proc.of ACM MobiHoc 2004,2004,pp.222-233.
    [13]A.Tyamaloukas and J.J.Garcia-Luna-Aceves,"Channel-hopping multiple access," in proc.of IEEE ICC 2000,2000,pp.415-419.
    [14]A.Tzamaloukas and J.J.Garcia-Luna-Aceves,"Channel hopping multiple access with packet trains for ad hoc networks," in proc.of IEEE MoMuC 2000,2000.
    [15]S.-L.Wu,C.-Y Lin,Y.-C.Tseng,and J.-P.Sheu,"A new multi-channel mac protocol with on-demand channel assignment for multi-hop mobile ad hoc networks," in proc.of IEEE ISPAN 2000,2000,pp.232-237,.
    [16]S.-L.Wu,C.-Y Lin,Y.-C.Tseng,and J.-P.Sheu,"A multi-channel mac protocol with power control for multi-hop mobile ad hoc networks," The Computer Journal,vol.45,no.1,pp.101-110,2002.
    [17]S.Xu and T.Saadawi,"Revealing the problems with 802.11 medium access control protocol in multi-hop wireless ad hoc networks," Computer Networks,vol.38,no.4,pp.531-548,2002.
    [1]FCC,ET Docket No.03-222 Notice of proposed rule making and order,December 2003.
    [2]I.F.Akyildiz,W.Lee,M.Vuran,and S.Mohanty,"Next generation/dynamic spectrum access/cognitive radio wireless networks:a survey," Computer Networks,vol.50,no.13,2006,pp.2127-2159.
    [3]I.F.Akyildiz,X.Wang,and W.Wang,"Wireless mesh networks:a survey,"Computer Networks,vol.47,no.4,2005,pp.445-487.
    [4]I.F.Akyildiz,J.Laskar,and Y.Li,"OCRA:OFDM-based cognitive radio networks," Broadband and Wireless Networking Laboratory Technical Report,March 2006.
    [5]J.Mitola Ⅲ and G.Maguire Jr,"Cognitive radio:making software radios more personal," Personal Communications,IEEE[see also IEEE Wireless Communications],vol.6,no.4,1999,pp.13-18.
    [6]C.Cordeiro,K,Challapali,D.Birru,and S.Shankar,"IEEE 802.22:the first worldwide wireless standard based on cognitive radios," in proc.of IEEE DySPAN 2005,November 2005,pp.328-337.
    [7]IEEE 802.22 Working group on wireless regional area networks,Available from:http://www.ieee802.org/22/.
    [8]J.Sydor,"Messaging and spectrum sharing between ad-hoc cognitive radio networks," in proc.of IEEE International Symposium on Circuits and Systems,May 2006,pp.21-24.
    [9]R.Pal,"Efficient routing algorithms for multi-channel dynamic spectrum access networks," in proc.of IEEE Dy SPAN 2007,April 2007,pp.288-291.
    [10]C.Xin,B.Xie,and C.Shen,"A novel layered graph model for topology formation and routing in dynamic spectrum access networks," in proc.of IEEE DySPAN 2005,November 2005,pp.308-317,.
    [11]Q.Wang and H.Zheng,"Route and spectrum selection in dynamic spectrum networks," in proc.of IEEE CCNC 2006,January 2006,pp.625-629.
    [12]G.Cheng,W.Liu,Y.Li,and W.Cheng,"Joint on-demand routing and spectrum assignment in cognitive radio networks," in proc.of IEEE ICC 2007,June 2007,pp.6499-6503.
    [13]B.Zhang,Y.Takizawa,A.Hasagawa,A.Yamauchi,and S.Obana,"Tree-based routing protocol for cognitive wireless access networks," in proc.of IEEE WCNC 2007,March 2007,pp.4207-4211.
    [14]O.Aboul-Magd et al.,"Joint SEE-mesh/Wi-mesh proposal to 802.11 TGs," IEEE 802.11 s document,DCN 802.11-06/0328r0,Feb.2006,http://www.802wirelessworld.com/index.jsp.
    [15]S.Haykin,"Cognitive radio:brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications,vol.23,no.2,2005,pp.201-220.
    [16]R.W.Thomas,L.A.DaSilva,and A.B.MacKenzie,"Cognitive networks," in proc.of IEEE DySPAN 2005,November 2005,pp.352-360.
    [17]J.Mo,H.So,and J.Walrand,"Comparison of multi-channel MAC protocols,"IEEE Transaction on Mobile Computing,in press.
    [18]C.Perkins,E.Belding-Royer,and S.Das,"Ad hoe on-demand distance vector (AODV) routing," IETF RFC 3561,July 2003.
    [19]T.Chen,H.Zhang,G.M.Maggio,and I.Chlamtac,"CogMesh:a cluster-based cognitive radio network," in proc.of IEEE DySPAN 2007,April 2007,pp.168-178.
    [20]G.Chen,W.Liu,Y.Li,and W.Cheng,"Spectrum aware on-demand routing in coginitive radio networks," in proc.of IEEE DySPAN 2007,April 2007,pp.571-574.
    [21]C.Xin and C.Shen,"Reliable routing in programmable radio wireless networks,"in proc.of IEEE Workshop on Networking Technologies for Software Defined Radio Networks 2006(SDR'06),September 2006,pp.84-92.
    [22]S.Krishnamurthy,M.Thoppian,S.Venkatesan,and R.Prakash,"Control channel based MAC-layer configuration,routing and situation awareness for cognitive radio networks," in proc.of IEEE MILCOM 2005,October 2005,pp.455-460.
    [23]The network simulator - ns-2.http://www.isi.edu/nsnam/ns/index.html.
    [24]Multi-channel multi-interface simulation in NS2,http://www.cse.msu.edu/-wangbol/ns2/nshowtoS.html.
    [25]M.McHenry,"Spectrum white space measurements," presentation to New America Foundation BroadBand Forum,June 20,2003.http://www.newamerica.net/Download_Docs/pdfs/Doc_File_185_1.pdf.
    [26]M.McHenry and D.McCloskey,"New York City Spectrum Occupancy Measurements September 2004,"http://www.sharedspectrum.com/inc/content/measurements/nsf/NYC_report.pdf.
    [1]FCC,ET Docket No.03-222 Notice of proposed rule making and order,December 2003.
    [2]I.F.Akyildiz,W.Lee,M.Vuran,and S.Mohanty,"Next generation/dynamic spectrum access/cognitive radio wireless networks:a survey," Computer Networks,vol.50,no.13,2006,pp.2127-2159.
    [3]J.Mitola Ⅲ,and G.Magnire Jr,"Cognitive radio:making software radios more personal," Personal Communications,IEEE[see also IEEE Wireless Communications],vol.6,no.4,1999,pp.13-18.
    [4]W.Lee,and I.F.Akyildiz,"Optimal sepectrum sensing framework for cognitive radio networks," appeared to IEEE Transaction on Wireless Communications.
    [5]H.Su,and X.Zhang,"Cross-Layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks," IEEE Journal on Selected Areas in Communications,vol.26,no.1,Jan.2008,pp.118-129.
    [6]Y.Chen,Q.Zhao,and A.Swami,"Joint design and separation principle for opportunistic spectrum access in the prensence of sensing errors," IEEE Transaction on Information Theory,vol.54,no.5,May 2008,pp.2053-2071.
    [7]C.Chou,S.Shankar,H.Kim,and K.G.Shin,"What and how much to gain by spectrum agility?," IEEE Journal on Selected Areas in Communications,vol.25, no.3,Apr.2007,pp.576-588.
    [8]L.Yang,L.Cao,and H.Zheng,"Proactive channel access in dynamic spectrum networks," in proc.of CROWNCOM 2007,Aug.2007.
    [9]C.Xin,B.Xie,and C.Shen,"A novel layered graph model for topology formation and routing in dynamic spectrum access networks," in proc.of IEEE DySPAN 2005,Nov.2005,pp.308-317.
    [10]C.Perkins,E.Belding-Royer,and S.Das,"Ad hoc on-demand distance vector (AODV) routing," IETF RFC 3561,July 2003.
    [11]X.Zhu,L.Shen,and T.P.Yum,"Analysis of cognitive radio spectrum access with optimal channel reservation," IEEE Communication Letter,vol.11,no.4,Apr.2007,pp.304-306.
    [12]D.R.Cox,Renewal Theory,New York:John Wiley & Sons Inc,1962.
    [13]N.Sarma,S.Nandi,and R.Tripathi,"Enhancing route recovery for QAODV routing in mobile ad hoc networks," in proc.of IEEE I-SPAN 2008,May 2008,pp.39-44.
    [14]J.G.Andrews,S.Weber,and M.Haenggi,"Ad hoc networks:to spread or not to spread?," IEEE Communications Magazine,vol.45,no.12,pp.84-91,Dec.2007.
    [15]H.Wu,C.Qiao,S.De,and O.Tonguz,"Integrated cellular and ad hoc relaying systems:iCAR," IEEE Journal on Selected Areas in Communications,vol.19,no.10,Oct.2001,pp.2105-2115.
    [16]I.F.Akyildiz,J.Laskar,and Y.Li,"OCRA:OFDM-based cognitive radio networks," Broadband Wireless Networking Laboratory Technical Report,March 2006.
    [17]S.Haykin,"Cognitive radio:brain-empowered wireless communications," IEEE J.on Selected Areas in Communications,vol.23,no.2,Feb.2005,pp.201-220.
    [18]Q.Wang and H.Zheng,"Route and specrum selection in dynamic spectrum networks," in proc.of IEEE CCNC 2006,Jan.2006,pp.625-629.
    [19]G.Chen.W.Liu.Y.Li.and W.Cheng,"Spectrum aware on-detouand routing in coginitive radio networks." in proc.of IEEE DySPAN 2007.Apr.2007,pp.571-574.
    [20]R.Pal,"Efficient routing algorithms for multi-channel dynamic spectrum access networks," in proc.of IEEE DySPAN 2007,Apr.2007,pp.288-291.
    [21]The network simulator - ns-2.http://www.isi.edu/nsnam/ns/index.html.
    [22]Multi-channel multi-interface simulation in NS2, http://www.cse.msu.edu/-wangbol/ns2/nshowto8.html
    [1]Ian F.Akyildiz and Xudong Wang,"A Survey on Wireless Mesh Networks,"IEEE Communications Magazine,vol.43,no.9,Sep.2005,pp.S23-S30.
    [2]Y.Zhang and W.Lee,"Intrusion Detection in Wireless Ad-Hoc Networks," In Proc.of ACM Mobile Computing and Networking,2000,pp.275-283.
    [3]T.M.Chen and V.Venkataramanan,"Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks," IEEE Internet Computing,vol.9,no.6,Nov-Dec.2005,pp.35-41.
    [4]S.Marti,T.J.Giuli,K.Lai and M.Baker,"Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," In Proc.of ACM Mobile Computing and Networking,2000,pp.255-265.
    [5]H.Deng,W.Li and D.Agrawal,"Routing Security in Wireless Ad Hoc Networks," IEEE Communications Magazine,vol.40,no.10,Oct.2002,pp.70-75.
    [6]G.Thamilarasu,A.Balasubramanian,S.Mishra and R.Sridhar,"A Cross-layer based Intrusion Detection Approach for Wireless Ad Hoc Networks," In Proc.of IEEE Mobile Ad hoc and Sensor Systems,Nov.2005,pp.855-861.
    [7]A.Dempster,"Upper and Lower Probabilities Induced by a Multivalued Mapping," Ann.Mathematical Statistics,vol.38,no.2,1967,pp.325-339.
    [8]G.Shafer,A Mathematical Theory of Evidence,Princeton Univ.Press,1976.
    [9]H.Wu et al.,"Sensor Fusion Using Dempster-Shafer Theory," In Proc.of IEEE Instrumentation and Measurement,2002,pp.7-12.
    [10]K.Sanzgiri et al.,"Authenticated Routing for Ad Hoc Networks," IEEE JSAC,vol.23,no.3,2005,pp.598-610.
    [11]F.Kargl et al.,"Sensors for Detection of Misbehaving Nodes in MANETs," In Proc.of Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA 2004),2004;www.dimva.org/dimva2004/.
    [12]A.Hasswa,M.Zulkernine and H.Hassanein,"Routeguard:An Intrusion Detection and Response System for Mobile Ad Hoc Networks," In Proc.of Wireless and Mobile Computing,Networking and Communications (WiMob'2005),Aug.2005,pp.336-343.
    [13]V.Karpijoki,"Security in Ad Hoc Networks,"http://www.hut.fi/-vkarpijo/netsec00/netsec00_manet_sec.ps.
    [14]L.J.Li,Z.Q.Luo,K.M.Wong and E.Bosse,"Convex Optimization Approach to Identity Fusion for Multisensor Target Tracking," IEEE transactions on system,man,and cybernetics--Part A:Systems and Humans,vol.31,no.3,May 2001,pp.172-178.
    [15]A.Siraj,R.B.Vaughn and S.M.Bridges,"Intrusion Sensor Data Fusion in An Intelligent Intrusion Detection Systedm Architecture," In Proc.of the 37~(th) Hawaii International Conference on System Scieneces,Jan.2004,pp.1-10.
    [16]N.Einwechter,"An Introduction to Distributed Intrusion Detection Systems,"http://www.securityfbcus.com/infocus/1532.
    [17]Y.F.Zhang,Z.Y.Xiong and X.Q.Wang,"Distributed Intrusion Detection Based on Clustering," In Proc.of the 4th International Conference on Machine Learning and Cybernetics,2005,pp.2379-2383.
    [18]P.Yi et al.,"Distributed Intrusion Detection for Mobile Ad Hoc Networks," In Prof.of the 2005 Symposium on Applications and the Internet Workshops (SAINT-W'05),Jan.2005,pp.94-97.
    [19]D.Sterne et al.,"A General Cooperative Intrusion Detection Architecture for MANETs," In Prof.of the 3rd International Workshop on Information Assurance (IWIA'05),Mar.2005,pp.57-70.
    [20]R.Puttini et al.,"A Fully Distributed IDS for MANET," In Proc.of the 9th International Symposium on Computers and Communications(ISCC'2004),June/July 2004,pp.331-338.
    [21]O.Kachirski and R.Guha,"Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks," In Proc.of the IEEE Workshop on Knowledge Media Networking(KMN'02),July 2002,pp.153-158.
    [22]O.Kachirski and R.Guha,"Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks," In Proc.of the 36~(th) Hawaii International Conference on System Sciences(HICSS'03),Jan.2003,pp.1-8.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700