Journal on Communications ›› 2016, Vol. 37 ›› Issue (8): 119-128.doi: 10.11959/j.issn.1000-436x.2016162
• Papers • Previous Articles Next Articles
Zhi-nan LI1,Xiao-dong YANG1,2
Online:
2016-08-25
Published:
2016-09-01
Zhi-nan LI,Xiao-dong YANG. Routing discovery algorithm based on reliable path stability estimation in MANET[J]. Journal on Communications, 2016, 37(8): 119-128.
[1] | LA R J , HAN Y . Distribution of path durations in mobile ad hoc networks and path selection[J]. IEEE/ACM Transactions on Networking, 2007,15(5):993-106. |
[2] | 王博, 陈训逊 . 直觉模糊时间序列建模及应用[J]. 通信学报, 2013,34(9):92-104. WANG B , CHEN X X . Opportunistic routing algorithm based on trust model for ad hoc network[J]. Journal on Communications, 2013,34(9):92-104. |
[3] | VU T K , KWON S . Mobility assisted on demand routing algorithm for MANETs in the presence of location errors[J]. The Scientific World Journal, 2014,Article ID 790103. |
[4] | NAMUDURI K , PENDSE R . Analytical estimation of path duration in mobile ad hoc networks[J]. IEEE Sensors Journal, 2012,12(6):1828-1835. |
[5] | NAMUDURI K , WAN Y , GOMATHISANKARAN M , et al. Airborne network:a cyber-physical system perspective[C]// The first ACM Mo-biHoc workshop on Airborne Networks and Communications. c2012:55-59. |
[6] | YANG W , YANG X , YANG S , et al. A greedy-based stable multi-path routing protocol in mobile ad hoc networks[J]. Ad Hoc Networks, 2011,9(4): 662-674. |
[7] | SARGOLZAEY H , ALI B M , KHATUN S . A cross layer metric for discovering reliable routes in mobile ad hoc networks[J]. Wireless Personal Communications, 2012,66(1): 207-216. |
[8] | 居熙, 陶军, 陆一飞 , 等. 一种基于迁移可测度的移动自组织网络路由模型[J]. 电子学报, 2010,38(6):1-5. JU X , TAO J , LU Y F , et al. A predictable-delivery-ratio based rout-ing model in mobile ad hoc networks[J]. Acta Electronical Sinica, 2010,38(6):1-5. |
[9] | HUA E Y , HAAS Z J . An algorithm for prediction of link lifetime in MANET based on unscented kalman filter[J]. IEEE Communications Letters, 2009,13(10): 782-784. |
[10] | HAAS Z J , HUA E Y . Residual link lifetime prediction with limited information input in mobile ad hoc networks[C]// The 27th IEEE In-ternational Conference on Computer Communications. c2008:13-18. |
[11] | WU D P , ZHOU J E , WANG R Y . Received signal strength based link lifetime estimating mechanism in MANET[C]// IEEE Conference Anthology. c2013:14-. |
[12] | CARMO R D , WEMER M , HOLLICK M . Signs of a bad neighbor-hood:a lightweight metric for anomaly detection in mobile ad hoc networks[C]// 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks. c2012:47-54. |
[13] | WANG C F , CHIOU Y P , LIAW G H , et al. Next hop selection mechanism for nodes with heterogeneous transmission range in Vanets[J]. Com-puter Communications, 2015,55: 22-31. |
[14] | VIRIYASITAVAT W , BAI F , TONGUZ O K , et al. Dynamics of network connectivity in urban vehicular networks[J]. IEEE Journal on Selected Areas in Communications, 2011,29(3): 515-533. |
[15] | SADAGOPAN N , BAI F , KRISHNAMACHARI B , et al. PATHS:analysis of path duration statistics and their impact on reactive MANET routing protocols[C]// The 4th ACM International Sympo-sium on Mobile Ad Hoc Networking and Computing. c2003:1-3. |
[16] | HAN Y , LA R J , MAKOWSKI A M , et al. Distribution of path dura-tions in mobile ad hoc networks-Palm's theorem to the rescue[J]. Computer Networks, 2006,50(12): 1887-1900. |
[17] | KARAGIANNIS G , ALTINTAS O , EKICI E , et al. Vehicular net-working:a survey and tutorial on requirements,architectures,chal-lenges,standards and solutions[J]. IEEE Communications Surveys and Tutorials, 2011,13(4): 584-616. |
[18] | LU N , CHENG N , ZHANG N , et al. Connected vehicles:solutions and challenges[J]. IEEE Internet Things Journal, 2014,1(4): 289-299. |
[19] | LEI L , WANG D , ZHOU L , et al. Link availability estimation based reliable routing for aeronautical ad hoc networks[J]. Ad Hoc Networks, 2014,20: 53-63. |
[20] | ANTUNES N , JACINTO G , PACHECO A , et al. An analytical framework to infer multihop path reliability in MANETs[C]// The ACM SIG-METRICS International Conference on Measurement and Modeling of Computer Systems. c2010:323-332. |
[21] | LEE G Y , HAAS Z J . Simple,practical,and effective opportunistic routing for short-haul multi-hop wireless networks[J]. IEEE Transac-tions on Wireless Communications, 2011,10(11): 3583-3588. |
[22] | DANA A , ZADEH A K , SADAT NOORI S A . Backup path set selec-tion in ad hoc wireless network using link expiration time[J]. Com-puters and Electrical Engineering, 2008,34(6): 503-519. |
[23] | WU Y S , LEE D H , JUNG J I , et al. Derivation and analysis of link/route maintenance probability in multi hop mobile ad hoc networks[C]// In-ternational Conference on Information Technology:New Generations. c2009:623-627. |
[24] | SHELLY S , VIJAY V , BABU A V , et al. Model for path duration in vehicu-lar ad hoc networks under greedy forwarding strategy[C]// Interna-tional Conference on Computer,Communication and Convergence (ICCC 2014). c2014:394-400. |
[1] | . Yaksha scheme based content publish/subscribe system for NDN [J]. Journal on Communications, 2015, 36(11): 127-135. |
[2] | . Game theory based trust management method for mobile ad hoc networks [J]. Journal on Communications, 2014, 35(11): 6-49. |
[3] | Jing-jing GUO,Jian-feng MA,Qi LI,Tao WAN,Cong GAO,Liang ZHANG. Game theory based trust management method for mobile ad hoc networks [J]. Journal on Communications, 2014, 35(11): 50-58. |
[4] | Rong-sen LI,Wen-hua DOU. SIM: a secure IP protocol for MANET [J]. Journal on Communications, 2013, 34(Z1): 116-125. |
[5] | . SIM: a secure IP protocol for MANET [J]. Journal on Communications, 2013, 34(Z1): 15-125. |
[6] | Li-cai LIU,Li-hua YIN,Yun-chuan GUO,Yan SUN. Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach [J]. Journal on Communications, 2013, 34(Z1): 58-66. |
[7] | . Analysis and improvement for authentication protocols ofmobile ad hoc network with CSP approach [J]. Journal on Communications, 2013, 34(Z1): 8-66. |
[8] | Yang YANG,Lan-lan RUI,Shao-yong GUO,Xue-song QIU,Feng QI. Timer based algorithm for minimum connected dominating set construction [J]. Journal on Communications, 2013, 34(2): 100-108. |
[9] | Zhi-jun XU,Qi HU,Yu-jun ZHANG,Xin-ming YE. Trust evaluation routing protocol to enforce cooperation in mobile ad hoc networks [J]. Journal on Communications, 2012, 33(7): 27-35. |
[10] | Qing-song DU,Jiang ZHU,Er-yang ZHANG. Optimized AODV routing protocol based on reverse route search in leisure time and route learning [J]. Journal on Communications, 2011, 32(8): 64-71. |
[11] | Hua-feng WU,Chao-jian SHI,Chuan-shan GAO. CAR:a P2P content addressable and auto-retrievable algorithm for M ANET [J]. Journal on Communications, 2011, 32(12): 18-28. |
[12] | De-gui XIAO,Li-xiang PENG. Simulation research of VANET routing protocols in real urban simulation scenarios [J]. Journal on Communications, 2010, 31(9A): 68-72. |
[13] | Hui YE,Zhi-gang CHEN,Ming ZHAO. ON-CRP:cache replacement policy for opportunistic networks [J]. Journal on Communications, 2010, 31(5): 98-107. |
[14] | Jie SUN,Wei GUO. Link duration probability based cross-layer routing protocol for epoch-based movement [J]. Journal on Communications, 2010, 31(10): 48-57. |
[15] | Chun-lai DU,Ming-zeng HU,Hong-li ZHANG,Dong-yan ZHANG. Self-healing group key distribution scheme with revocation based on dual directional hash chain [J]. Journal on Communications, 2009, 30(6): 33-37. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|