期刊文献+

VBF水下传感器网络路由协议的路径优化与模拟 被引量:3

Routes Optimization and Simulation of Underwater Sensor Network VBF Protocol
下载PDF
导出
摘要 针对水下传感器网络节点的移动性,以基本VBF(Vector-Based Forwarding Protocol)路由协议为基础,提出了1种适用于水下移动传感器节点的路径优化算法。为了验证此路径优化算法的有效性,分别对基本VBF算法和改进的VBF算法进行了3个模拟实验;从数据包接收成功率和网络负载两方面分析比较了实验模拟结果。比较结果可以看出:文中提出的路径优化的VBF路由协议的数据包成功接收率要优于VBF路由协议,降低了网络负载,并且该优化算法实现简单,不需要增加额外的网络延迟时间。 Aiming at the mobility of underwater sensor net nodes, based on basic VBF(Vector-Based Forwarding Protocol) protocol, a routes optimization algorithm was proposed to suit the situation. To verify the new algorithm, three simulation experiments of the basic VBF algorithm and the optimal VBF algorithm were implemented, respectively. The simulation results are compared in terms of the number of total teceived packets and network load. It shows that the proposed routes optimization algorithm of VBF protocol is more effective than the basic VBF protocol. The proposed algorithm can reduce network loacl and its realization is simple and without additional time delay.
出处 《中国海洋大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第6期1261-1264,共4页 Periodical of Ocean University of China
基金 国家自然科学基金主任基金(40552001)资助
关键词 水下传感器网络 路由协议 VBF(Vector-Based FORWARDING Protocol) 模拟 underwater sensor network route protocol VBF(Vector-Based Forwarding Protocol) simulation
  • 相关文献

参考文献10

  • 1Adjih C, Clausen T, Jacquet P, et al. Optimized link state routing protocol [S]. Pakistan IEEE INMIC, 2001. 被引量:1
  • 2Ogier R, Lewis M, Templin F. Topology dissemination based on reverse-path forwarding(TBRPF) [S]. United States: MANET Internet Draft, 2003. 被引量:1
  • 3Perkins C E, Bhagwat P. Highly dynamic destination sequenced distance-vector routing(DSDV) for mobile computers [J]. In ACMSIGCOMM, 1994, 24(4): 234-244. 被引量:1
  • 4Perkins C E, Royer E M. Ad-Hoc on-demand distance vector routing [ C]. //IEEEWMCSA' 99, IEEE Computer Society, 1999: 90-100. 被引量:1
  • 5David B, Johnson, Maltz D A. Dynamic source routing in adHoe wireless networks [J]. Mobile Computing. 1996, 5: 153-181. 被引量:1
  • 6Xie G, Gibson J. A network layer protocol for UANs to address propagation delay induced performance limitations [C]. //Proc of IEEE OCEANS'01, IEEE 2001, 4: 2087-2094. 被引量:1
  • 7Xie P, Cui J H, Lao L. VBF: Vector-Based forwarding protocol for underwate rSensor networks [ R]. UCONNCSE UbiNet TR 05-03 Technical Report, 2005. 被引量:1
  • 8Sozer E, Stojanovic M, Proakis J. Underwater acoustic networks [J]. IEEE Journal of Oceanic Engineering, 2000, 25(1): 72-83. 被引量:1
  • 9Pompili D, Melodia T, Akyildiz I F. A Resilient muting algorithm for longteml applications in underwater sensor networks [C]. //Proc of MedHocNet. Italy: Lipari, 2006: 25. 被引量:1
  • 10Pompili D, Melodia T, Akyildiz I F. Routing algorithms for delayinsensitive and delay-sensitive applicationsin underwater sensor networks [C]. Mobi Corn'06, USA: ACM, 2006: 23-26. 被引量:1

同被引文献33

  • 1张毅,王小非,夏学知.Ad Hoc网络环境中避免虫洞攻击的路由算法[J].计算机工程,2007,33(3):138-140. 被引量:3
  • 2Mahajan V, Natu M, Sethi A. Analysis of wormhole intrusion attacks in MANETS [C]// Military Communications Conference MILCOM IEEE, 2008: 1-7. 被引量:1
  • 3Keer S, Suryavanshi A. To prevent wormhole attacks using wireless protocol in MANET [C] //Computer and Communication Technology International Conference on, 2010: 159-163. 被引量:1
  • 4PENG Xie, ZHONG Zhou, ZHENG Peng. Aqua-sim: An NS- 2 based simulator for underwater sensor networks [C] // Biloxi, Mississippis USA: Proc of MITS/IEEE OCEANS Conference, USA, 2009: 1-7. 被引量:1
  • 5XIA Wang, Wong J. An end-to-end detection of wormhole at- tack in wireless ad-hoc networks [C] //Computer Software and Applications Conference COMPSAC 31st Annual International, 2007 : 39-48. 被引量:1
  • 6SHI Fei, JIN Dongxu, LIU Weijie, et al. Time-based detection and location of wormhole attacks in wireless Ad Hoc networks [C] // IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011: 1721-1726. 被引量:1
  • 7Farid Nait-Abdesselam, Brahim Bensaou, Jinkyu Yoo. Detecting and avoiding wormhole attacks in optimized link state routing protocol [C] //Wireless Communications and Networking Conference WCNC IEEE, 2007: 3117-3122. 被引量:1
  • 8Khabbazian M, Mercier H, Bhargava V K. Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks [C]//IEEE Transactions on Wireless Communications, 2009: 736-745. 被引量:1
  • 9张亚斌.水下传感器网络分层-分簇路由与仿真平台研究[D].桂林:桂林电子科技大学,2012. 被引量:2
  • 10PARTAW J,KUROSEJ,LEVINEBN.Asurveyofpracticalissuesinunderwaternetworks[C]//Procofthe1stACM SIGMOBILEWorkshoponUnderwaterNetworks.NewYork:ACMPress,2007:23-33. 被引量:1

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部