用户名: 密码: 验证码:
基于主动网络的MANET路由和信任度路由的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
移动Ad hoc网络(MANET)是一种无需任何提前构建的基础设施就能进行组网的网络,是由一组带有无线收发装置的移动终端组成的一个临时的多跳自治系统。网络中的节点既是移动终端,又具有路由器功能。MANET的这些特点使它更加适合用于军事领域和应急救灾通信。但又由于它的网络拓扑结构动态变化,带宽和能量受限这样的不利因素,使得MANET的应用仍然面临很大的挑战。
     本文首先介绍MANET的路由协议,指出了现有MANET协议存在的不足,分析了MANET体系结构、关键技术、设计要求以及国内外研究现状。根据几种不同的协议分类方法,对一些典型MANET路由协议的进行了分析,指出了现有协议存在的问题。
     为了解决现有MANET路由协议中存在的问题,在介绍主动网络的原理、特点和体系结构的基础上,深入分析了主动网络和MANET相结合的可行性和有效性。在前人工作的基础上,将主动网络的思想运用到MANET的路由协议中,提出了基于主动网络的MANET路由策略。根据用户传输数据量和对路由可靠性的不同要求,结合主动网络思想,给出更为合理的路由选择方式,以提高MANET路由的性能。
     考虑到MANET所面临的安全问题,以及现有安全手段所存在的不足,本文还提出了将主动网络思想运用到解决MANET的路由信任问题中,提出了一种基于相邻节点信任度的MANET主动路由,用以提高MANET的路由安全性。
     本文的最后部分是将前面提出的策略在网络仿真软件NS2中进行仿真。通过对仿真实验结果的分析,可以看出,结合主动网络思想后的MANET路由和信任度路由在某些网络性能上得到了提高,并指出了本文工作中仍然存在的不足和有待解决的问题。
Mobile Ad hoc Network (MANET) is a network that can establish a network without any prior base stations. It is a multi-hop, temporary and autonomy system, which consists of a set of mobile terminals with receiver and transmitter. All the mobile nodes in MANET are both a terminal and a router. Since these characters, MANET is suitable for military affairs and emergency. But, because of the change of network topology and the limitation of bandwidth and energy, there is a lot of challenge for the wider application of MANET.
     This paper focuses on MANET routing protocols and indicates the shortage of current MAENT routing protocols. We introduce the framework, key technology and present research firstly. We analyses the requirement of MANET routing design and introduce some methods of MANET routing protocols' classification. By introducing some typical routing protocols, the problems in current routing protocols are advanced.
     In order to solve the problems in current routing protocols, we use the idea of applying active network technology to MANET routing. Based on the idea, we introduce active network's principle, character and structure. Then we analyses the feasibility and validity of combining active network with MANET. Based on predecessor's work, we present a MANET routing strategy by combining with active network. According to sender's data quantity or different requirement to route reliability, combining with active network, a more reasonable routing method is presented, which can enhance the performance of MANET routing.
     In addition, this paper also tries to apply active network to MANET routing reliability. We introduce the security problems MANET meets with, and introduce some security solutions used in MANET and their shortage. We present an active MANET routing based on neighbor nodes' credit degree in order to improve MANET routing reliability.
     The last part in this paper is simulation. We make some simulation of the routing methods we presented in this paper. By comparing of simulation results, the improvement of network performance by applying active network technology to MANET routing is showed directly. And we also indicate the shortage of our work in this paper and some problemneed to be solved in the future.
引文
[1] Toh. C.K., Ad hoc Mobile Wireless Networks Protocols and Systems. Prentice Hall, Inc,2002.
    [2] Samba Sesay, Zongkai Yang and Jianhua He, A Survey on Mobile Ad Hoc Wireless Network Information Technology. 2004 Journal 3 (2): 168-175,
    [3] Corson, S. and J. Macker, Mobile ad hoc networking (MANET):Routing Protocol Performance Issues and Evaluation Considerations[S], IETF RFC 2501, January, 1999.
    [4] 李勇,黄均才,王凤碧等,Ad hoc网络体系结构研究,计算机应用,第25卷第1期2005年1月163-164,175.
    [5] Murthy, Garcia-Luna-Aceves, An efficient routing protocol for wireless network[A], ACM/Baltzer Mobile Networks and Applications[C], 1996, (2):183-197.
    [6] CK. Toh, A Novel Distributed Routing Protocol to Support Ad Hoc Mobile Computing[A],Proc. 1996 IEEE 15th Annual International Phoenix Conference Computer and Communication[C], 1996:480-486.
    [7] Andrea J,Fold Smith, Design challenges for energy-constrained Ad hoc wireless networks [J].IEEE Wireless Communications,2002,9(4):8-25.
    [8] 肖书成,邱珊,Ad hoc网络及其路由性能研究,重庆邮电学院学报,2004(6):103-107.
    [9] Talucci,F., M.Gerla, MACA-BI (MACA By Invitation) A wireless MAC protocol for high speed ad hoc networking. In Proceedings of ICUPC_97, November, 1997, vol.2:913-17.
    [10] Xu, S.S.T, Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks IEEE Communication Magazine, 2001:130-137.
    [11] Xu, S.S.T, Revealing the problems with 802.11 MAC protocol in multi-hop wireless networks. Computer Networks, 2002 (38):531-548
    [12] Anastasi, G., M. Conti and E. Gregori, IEEE 802.11 ad hoc networks: protocols,performance and open issues. IEEE Press and John Wiley and Sons,Inc., New York, USA, 2003.
    [13] Bianchi G., L.Fratta and M.Oliveri, Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs, In Proceedings of PIMRC, Taipei, Taiwan, 1996:392-396.
    [14] Ramanathan, R, On the performance of ad hoc networks with beamforming antennas. In Proceedings of ACM MobiHoc, 2001.10:95-105.
    [15] Karn. P, MACA-A new channel access method for packet radio. In ARRL/CRRL Amateur Radio 9th Computer Networking Conference, 1990: 134-140.
    [16] Belding-Royer, E.M. and C.K. Toh, A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine 1999: 46-55.
    [17] Royer, E. M. and C.E. Perkins, Multicast operation of the ad-hoc on-demand distance vector routing protocol. In Proceedings ACM/IEEE MOBICOM '99, Seattle, WA, Aug. 1999:207-218.
    [18] Maltz, D.A., J. Broch, J. Jetcheva etc, The effects of on-demand behavior in Routing protocols for multi-hop wireless Ad hoc networks.IEEE JSAC, 1999, 17 (8):1439-1453.
    [19] Petteri, K., Classication of ad hoc routing protocols, Seminar paper presented to Finnish De fence Forces, Naval Academy, Finland. Available at .
    [20] Broch, J., A.M. David and B. David, A Performance comparison of multi-hop wireless ad hoc network Routing protocols. Proc. IEEE/ACM MOBICOM'98,1998: 85-97.
    [21] Gerla M, Hong X, Pei G, Fisheye State Routing Protocol (FSR) for Ad Hoc Networks [Z]. IETF Internet Draft Draft-ietf-manet-fsr-03.txt, 2002..
    [22] Samir, R., D. Perkins, C.E.Elizabeth, etc, Performance comparison of two on-demand routing protocols for ad hoc networks, In Proceedings INFOCOM,Tel Aviv, Israel, 2000:3-12.
    [23] Maltz, J.B. and D. Johnson, Lessons from a full-scale multi-hop wireless ad hoc network test bed, IEEE Personal Communications Magazine, 2001 Vol 8, Issue 1: 8-15.
    [24] Broch, J., D. Johnson, D. Maltz,etc,. The Dynamic Source Routing Protocol for mobile Ad hoc Networks, Internet-Draft, draft-ietf-manet-dsr-05.txt. 2001.
    [25] Johnson DB, Maltz DA, Hu Y-C, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) [Z], draft-ietf-manet-dsr-09.txt, 2003.
    [26] Perkins, C.E. and E.M. Royer, Ad-hoc on-demand distance vector routing, In Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications. 1999: 90-100.
    [27] Perkins, C.E., E.M. Royer and S.R. Das, Ad hoc on-demand distance vector (AODV) routing, http://www.ietf.org/internet-drafts/draft-ietf-manetaodv-08-txt,IETF Internet Draft. 2001
    [28] Park, V. and S. Corson, Temporally-ordered Routing algorithm (TORA), Internet Draft,draft-ieftmanet-tora-spec-04-txt.July, 2001.
    [29] Haas, Z.J. and M.R. Pearlman, The zone routing protocol (ZRP) for ad hoc networks, Internet Draft hdraft-haaszone-routing-protocol-00.txti, 1997,pp:153-181.
    [30] Kui, Wu. and H. Janelle, QOS support in mobile ad hoc networks, Crossing Boundaries an Interdisciplinary J., 2001: 92-107.
    [31] Xiao, H., W.K.G. Seah, A. Lo etc, A flexible quality of service model for mobile ad-hoc networks, IEEE VTC2000-spring, Tokyo, Japan, May,2000:445-449.
    [32] S.B. Lee, G-S Ann, X. Zhang, A. Campbell, INSIGNIA:An IP-Based Quality of Service Framework for Mobile Ad Hoc Networks Journal of Parallel and Distributed Computing (Academic Press), Special issue on Wireless and Mobile Computing and Communications, April 2000 Vol. 60 No.4:374-406.
    [33] Chen, W., T. Tsai and Gerla, QoS Routing performance in multi-hop, multimedia wireless networks in Proc. IEEE ICUPC, 1997 vol. 2: 557-561.
    [34] Leonard, B.A. and S. Takuo, A Genetic Algorithm (GA) based routing method for Mobile Ad-hoc Networks, J. Interconnection Networks, 2003 (4):257-270.
    [35] Chen, S. and K. Nahrstedt, Distributed Quality-of-Service Routing in Ad hoc Networks, IEEE J. Selected Areas in Communication, 1999 (17): 1488-1505.
    [36] Goff, T., N.B. Abu-Ghazaleh, D.S. Phatak etc, Preemptive Routing in Ad hoc Networks, ACM Sigmobile.2001: 43-52.
    [37] Toh, C-K., H. Cobb and D.A. Scout, Performance Evaluation of Battery-life Aware Routing Schemes for Wireless Ad hoc Networks, IEEE, ICC.2001,9:2824-2829
    [38] Zhang, Y. and W. Lee, Intrusion detection in wireless ad-hoc networks, In Proceedings of the Sixth ACM International Conference on Mobile Computing and Networking (MOBICOM 2000), Boston, MA,USA., August 6-11. 2000:275-283
    [39] Ramanujan, A.A., J. Bonney, R. Hagelstrom etc, Techniques for intrusion-resistant ad hoc routing algorithms (TIARA), In Proceedings of MILCOM. 2000
    [40] Capkun, S., L. Buttyan, J.P. Hubaux, Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing 2003 (2): 1536-1553.
    [41] J.J ubin and J. D. Tornow, The DARPA packet radio network protocols, Proc. IEEE, vol. 75,Jan. 1978:21-32.
    [42] G. Lauer, Advanced protocols for the SURAN packet radio network, Proc of the SHAPE Packet Radio Symposium, 1989:1-53
    [43] B. M. Leiner, R. J. Ruth and A. R. Sastry, Goals and Challenges of the DARPA Glomo Program, IEEE Personal Commun. Dec, 1996:34-43.
    [44] ITT Industries Aerospace/Communications Division (IINA/CD), "SINCGARS SIP IP Network System Software Implementation of MIL-STD-188-220A," Feb.1997.
    [45] Joint Tactical Radio System-JTRS, http://jtrs.army.mil/
    [46] Finke, C. R., TPRS Quarterly Report, Texas Packet Radio Society, Feb. 1992.
    [47] Jones G., G.Knezek, M.Hata, Packet Radio Prospects for Educational Data Communications in Proceedings of the Ninth International Conference on Technology in Education, Paris, France, 1992:218-219
    [48] Ricardo Sanchez, Joseph Evans, Gary Minden, Networking on the Battlefield: Challenges in Highly Dynamic Multi-hop Wireless Networks, IEEE Military Communications Conference; Atlantic City, NJ, Oct. 1999:751-755
    [49] S.Dao, Yongguang Zhang, E.Shek, etc, High-speed Digital Wireless Battlefield Network, Proceedings of SPIE-Digitization of the Battlespace Ⅳ, Orlando, Florida, Apr 1999, Vol.3709:129-137
    [50] K.sohrabi, etc, A self-organizing sensor network[A],Proc of the 37th Allerton Conference on Communication, Control, and Computing[C]. 1999.
    [51] F. Akyildiz, W. Su, Y. Sankarasubramaniam, etc, Wireless Sensor Networks:A Survey, Computer Networks, March 2002,38 (4):393-422.
    [52] IEEE 802.15 Working Group for WPAN, http://grouper.ieee.org/groups/802/15/
    [53] 史美林,英春,自组网路由协议综述[J],通信学报,2001,22(11):93-101.
    [54] 王海涛,刘晓明,Ad hoc网络的安全问题综述[J],计算机安全,2004,7:26-30.
    [55] Lee Sungju, Hsu Julian, Selecting a Routing Strategy for Your ad Hoc Network[J], Computer Communications,2003,26:723-733.
    [56] Lee S, Kim C, A New Wireless Ad Hoc Multicast Routing Protocol[J], Computer Networks 2002,38:121-135.
    [57] 马云涛,吴国新,移动自组网的MAC层研究[J],微机发展,2003,13(5):1-3,6.
    [58] Stevens, W.R., 1994 TCP/IP Illustrated, Vol.1, The Protocol, Addison-Wesley, Reading, MA.
    [59] Zhenghua, F., Z. Petros, X. Kaixin, etc, The impact of multihop wireless channel on tcp throughput and loss, In Proceedings of INFOCOM 2003, San Francisco, April, 2003: 1733-1753.
    [60] Gavin, H. and H.V. Nitin, Analysis of TCP performance over mobile ad hoc networks.ACM/Kluwer J. Wireless Networks, 2002 (8): 275-288.
    [61] Tang, K. and M. Gerla, Fair sharing of MAC under TCP in wireless ad hoc networks, In Proceedings of IEEE MMT99, Venice (1), October,1999.
    [62] 洪锡军,车克南,张激,无线自组网路由协议研究[J],计算机工程,2005.4(8):105-107.
    [63] 齐卫宁,丁宏毅,栾玉洁,自组网路由协议综述[J],计算机应用,2005.3:511-514.
    [64] 易平,蒋嶷川,张世永等,移动ad hoc网络安全综述[J],电子学报,2005(5):893-899.
    [65] 陶亚军,肖建华,基于NS-2的网络仿真与扩展[J],计算机系统应用2005.5,84-87.
    [66] Ilyas.M., The Handbook of Ad Hoc Wireless Networks[M], Florida: CRC press, 2003.
    [67] Adrian Perrig, Ran Canetti, etc, Efficient and Secure Source Authentication for Multicast, In Proceedings of the 2001 Network and Distributed System Security Symposium, NDSS'01:35-46.
    [68] Vikram Srinivasan, Pavan Nuggehalli, etc, Cooperation in Wireless Ad Hoc Networks, IEEE INFOCOM 2003
    [69] Garcia-Luna-Aceves J.J., Spohn M, Beyer D, Source Tree Adaptive Routing (STAR) Protocol[Z], draft-ietf-manet-star-00.txt, 1999.
    [70] Ogier R, Templin F, Lewism, Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) [Z], Draft-ietf-manet-tbrpf-11.txt, 2004.
    [71] Tennenhouse DL etc, A Survey of Active Network Research.[J], IEEE Communications Magazine, 1997:35 (1):80-86
    [72] 邱航,主动网络的分析与研究,计算机与现代化[J],2004年第1期:44-46,52.
    [73] Tennenhouse DL, D.J.Wetherall, Towards an active network architecture[J], Computer Communication Review, 1996,26 (2): 56-67.
    [74] D.Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, etc, A secure active network environment architecture:realization in switchware[J], IEEE Network, 1998,12 (3):37-45.
    [75] K. Calvert, etc, Architectural Framework for Active Networks, AN Architecture Working Group. Draft. July 3, 1998.
    [76] Konstantinos Psounis, Active networks: Application, security, safety and architectures [EB/OL], IEEE Communication Surveys, http://www.comsoc.org.pubs/surveys, First Quarter,1999;2-16.
    [77] 王建国,韩冬,李增智等,主动网络中的节点资源管理[J],计算机工程与应用,2002.03:170-171,227
    [78] Michael Fry and Atanu Ghosh, Application level active networking[J], Computer Networks, 1999, (31): 655-667.
    [79] Miki Yamamoto,Performance Aspects of Active Network Applications[M],Osaka University, 2001.
    [80] Amir E, McCanne S, katz R, An active service framework and its application to real-time multimedia transcoding[A], ACM SIGCOMM [C], September 1998.
    [81] Perterson, Larry, NodeOS Interface Specification[R], DARPA Architecture Working Group draft specification, January 24,2000.
    [82] 华蓓,李正,熊焰等,主动网络节点操作系统(NodeOS)的研究[J],计算机工程,2005,31(14):119-121.
    [83] D. Scott Alexander, Paul B. Menage etc, The price of safety in an active network. Journal of Communications and Networks, 2001.3 (1):4-18.
    [84] Andrew T.Campbell, etc, A Survey of Programmable Networks[J], ACM SIGCOMM Computer Communication Review, 1999, 29 (2):7-24.
    [85] Mark-Oliver Stehr and Carolyn L. Talcott, Plan in Maude Specifying an Active Network Programming Language, Electronic Notes in Theoretical Computer Science, Volume71, April 2004:221-241.
    [86] Wetherall, Guttag, Tennenhouse, ANTS:A Tool kit for Building and Dynamically Deploying Network Protocols, Submitted to IEEE OPENARCH'98, San Francisco, April 1998: 117-129.
    [87] Wetherall, Tennenhouse, The Active IP Option, Proceedings of the 7th ACM SIGOPS European Workshop, Connemara, Ireland, Sept.1996.
    [88] L.Zhou, Z.J.Haas, Securing Ad Hoc Networks, IEEE network,1999,13 (6):24-39.
    [89] L Buttyan, J P Hubaux, Report on a working session on security in wireless Ad Hoc networks[J], Mobile Computing and Communications Review,2003,7 (1):74-94.
    [90] 徐雷鸣.庞博,赵耀,NS与网络模拟,人民邮电出版社,2003.11
    [91] Jiejun Kong, Petros Zerfos, etc, Providing robust and ubiquitous security support for mobile Ad hoc networks[A], IEEE 9th International Conference on Network Protocols (ICNP'01)[C], Riverside, California, 2001:251-260.
    [92] Jean-Pierre Hubaux, Levente Buttyan, Srdjan Capkun, The quest for security in mobile Ad Hoc networks[A], Proc of the 2001 ACM International Symposium on Mobile ad hoc networking &computing 2001[C], Long Beach, CA, USA, 2001:146-155.
    [93] Yongguang Zhang, Wenke Lee, Intrusion detection in wireless Ad Hoc networks[A], Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000) [C],Boston, MA, 2000:275-283.
    [94] T Kaya, GLin, etc, Secure multicast groups on Ad Hoc networks[A], Proc of the 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks[C], Fairfax, VA, USA, 2003:94-102.
    [95] Loukas Lazos, Radha Poovendran, Energy-aware secure multicast communication in Ad hoc networks using geographic location information[A], Proc of IEEE International Conference on Acoustics Speech and Signal Processing[C], Hong Kong, China, 2003:201-204.
    [96] Bernhard Plattner, James P.G. Sterbenz, Mobile Wireless Active Networking: Issues and Research Agenda[C], ANTA, March 2002:25-26.
    [97] S.K. Song, S. Shannon, M. Hicks, etc, Evolution in Action:Using Active networking to Evolve Network Support for Mobility[C], IWAN 2002:146-161.
    [98] 赵昭灵,黄道颖,郭玉华等,主动网络技术[J],计算机工程与应用 2002.15:39-42.
    [99].倪金金,李德敏,李皓,基于主动网络的MANET路由研究[J],计算机应用研究,2007.04.
    [100] Oleg Kachirski, Ratan Guha, Intrusion detection using mobile agents in wireless Ad Hoc networks[A],IEEE Workshop on Knowledge Media Networking[C],Kyoto,JAPAN,2002:153-158.
    [101] Chin-Yang Tseng, Poornima Balasubramanyam, etc, A specification based intrusion Detection system for AODV[A], ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03) [C], Fairfax, VA, USA, October 2003:125-134.
    [102] Levente Buttyan, Jean-Pierre Hubaux, Enforcing service availability in mobile Ad Hoc WANs[A], Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing(MobiHOC) [C], Boston, MA, USA, August 2000:87-96.
    [103] L Buttyan, J-P Hubaux, Stimulating cooperation in self-organizing mobile Ad Hoc networks[J], Mobile Networks and Applications, 2003, 8 (5):579-592.
    [104] Sergio Marti,T J Giuli, etc, Mitigating routing misbehavior in mobile ad hoc networks[A],Proc of the Sixth International Conference on Mobile Computing and Networking(Mobicom2000) [C], Boston,August 2000:255-265.
    [105] 倪金金,李德敏,倪姬娜,基于节点信任度的MANET安全研究,上海机电学会学术年会,2006(5):78-81.
    [106] B.R.Smith, S.Murphy and J.J.Garcia-Luna-aceves, Securing distance-vector routing protocols, In Proceedings of Symposium on Network and Distributed System Security, Los Alamitos, CA, The Internet Society, IEEE Computer Society Press, February, 1997: 85-92.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700