CN101060480A - HORSEI2-based mobile self-organized network safety QoS multicast route creating method - Google Patents
HORSEI2-based mobile self-organized network safety QoS multicast route creating method Download PDFInfo
- Publication number
- CN101060480A CN101060480A CNA2007100523697A CN200710052369A CN101060480A CN 101060480 A CN101060480 A CN 101060480A CN A2007100523697 A CNA2007100523697 A CN A2007100523697A CN 200710052369 A CN200710052369 A CN 200710052369A CN 101060480 A CN101060480 A CN 101060480A
- Authority
- CN
- China
- Prior art keywords
- multicast
- qos
- horsei2
- mobile
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The related HORSEI2 based building method for self-organizing network security QoS multicast route comprises: every transmitter and receiver can add the multicast security group only being checked by visits control mechanism to obtain the private and public key of HORSEI2; every node requiring for creating/receiving new security multicast dialogue data creates/adds safe QoS multicast tree, wherein the transmitter applies signature on the message generated by HORSEI2, and the receiver uses the public key for verification.
Description
Technical field
The invention belongs to the network security technology field, is the method for building up of a kind of mobile self-organized network safety QoS multicast route based on HORSEI2 of belonging to mobile ad hoc network.
Background technology
Mobile communications network can be divided into two big classes: the base station support is arranged and do not have the base station to support. and the former comprises existing GSM, CDMA, networks such as CDPD; The latter is exactly a mobile ad hoc network.Mobile ad hoc network is the provisional autonomous system of a multi-hop forming of one group of mobile node that has a wireless transmitter. in this environment, because the finiteness of node radio communication coverage area need be carried out packet forward by intermediate node and be arrived the stay of two nights.It can provide a kind of available communication supporting environment under the situation that does not have available network infrastructure.
Mobile ad hoc network is a kind of wireless mobile network who does not have center infrastructure to support, the node in the network constitutes by mobile host.Mobile ad hoc network is applied to military field at first, its research originates from Packet Radio Network data communication project under the battlefield surroundings, this project is subsidized by DARPA, again nineteen eighty-three and 1994 year carried out anti-the ruin research that can adapt to network SURAN (SurvivableAdaptive Network) and Globle Mobile Information Systems Glomo (Global InformationSystem) project thereafter.Because the continuous development of radio communication and terminal technology, mobile ad hoc network also is developed under commercial environment, as need carry out provisional communication in the area that does not have wired infrastructure the time, can realize by making up mobile ad hoc network easily.In mobile ad hoc network, when two mobile hosts were in communication coverage each other, they can direct communication.But,, then need to realize by the forwarding of the mobile host between them if the main frame of two apart from each others will communicate because the communication coverage of mobile host is limited.Therefore in mobile ad hoc network, main frame is still router simultaneously, undertaking and is finding route and the work that E-Packets, and route generally all is made up of multi-hop, and packet could arrive the destination by the forwarding of a plurality of main frames.So mobile ad hoc network is also referred to as multi-hop wireless network.
Mobile ad hoc network can be regarded as the intersection of mobile communication and computer network.In mobile ad hoc network, the grouping of network that uses a computer exchanging mechanism.The main frame of communication generally is mobile terminal devices such as portable computer, PDA(Personal Digital Assistant).Mobile ad hoc network is different from the mobile IP network in the present internet environment.In mobile IP network, mobile host can be by being fixed with mode access networks such as spider lines, Radio Link and dial line, and only have a kind of connected mode of Radio Link in mobile ad hoc network.In mobile IP network, mobile host could be communicated by letter by the support of adjacent wired facilities such as base station, is cable network between base station and base station (agency and agency), still uses traditional Routing Protocol of internet.And mobile ad hoc network does not have the support of these facilities.In addition, mobile host does not possess routing function in mobile IP network, just a common communication terminal.When moving to another district from a district, mobile host do not change network topology structure, and the mobile change that will cause topological structure of mobile host in the mobile ad hoc network.
Multicast be a kind of be one group of transmission that main frame is the datagram of destination node of sign with single destination address.The multicast service is very useful for the application of those one-to-many transmission.The multicast routing policy can be optimized the use of resource, particularly in the mobile ad hoc network of bandwidth and limited energy.But because the mobility of main frame and the interference of wireless signal, the multicast in the mobile ad hoc network is more more complex than the multicast in the cable network.
QoS (Quality of Service) route is to find and safeguard the path [48] of satisfying under the given resource QoS constraint.The QoS binding target generally has: time delay, delay variation, bandwidth, packet loss and network cost or the like.
In mobile ad hoc network, the topological structure dynamic change, wireless signal-path band width is narrower, and congestion phenomenon often appears in network, is unfavorable for the normal operation of some real-time web application.Routing Protocol based on QoS relatively is suitable for moving in mobile ad hoc network.Usually be used with certain resource reservation mechanism (for example RSV P agreement) based on the Routing Protocol of QoS under the cable environment, satisfied have a QoS demand of different information flows.But in the mobile ad hoc network environment, because its characteristic is difficult to realize this comparatively exquisite control strategy, the target that reach also is different.At first, the Routing Protocol based on QoS under the cable environment needs the communication network resource information, carries out the resource reservation operation, keeps the state information and the available network resources information of information flow.These expenses can occupy a large amount of channel width, CPU disposal ability and memory headroom in MANET.Secondly, moving arbitrarily of network node may make relevant Internet resources have greatly changed in the mobile ad hoc network, the resource reservation of preserving have off status invalid, thereby cause the route that forms with big protocol overhead invalid, and may trigger more routing update information.At last, target under the cable environment is to select corresponding route to have the transmission of the information flow of QoS demand with guarantee, and the target in the mobile ad hoc network is under the prerequisite that selected route exists, and the route of the transmission of the information flow that most possibly satisfies the specific QoS demand is provided.
QoS route in the mobile ad hoc network is with respect to the QoS route of cable network, because narrow bandwidth, disposal ability are weak, the energy is limited, wireless signal disturbs and the influence of factor such as node motion, the QoS route of mobile ad hoc network more needs to consider the fast algorithm of the little variation of expense.
Because the bandwidth of mobile ad hoc network is narrower, disposal ability a little less than, so more and more grow with each passing day based on the multimedia application of mobile ad hoc network demand for multicast and specified services quality, in the hope of efficiently utilizing limited bandwidth and satisfying quality of service requirement, therefore need set up QoS multicast route selects correct path.
What existing a lot of scholars had proposed to have very much achievement is applicable to mobile ad hoc network QoS multicast route protocol.The design of traditional multicast route protocol is constructed multicast tree based on the data-transmission mode of " doing one's best " based on connectedness.Such multicast tree is not satisfy demands of applications in shortage of resources and when quality of service requirement is arranged.Safety is relevant to be provided with and the QoS multicast route protocol at mobile ad hoc network that these have proposed does not all have, believe that impliedly all participate in nodes in communication, malicious node is forged, is distorted even disintegrates the exchange of packet or the behavior of the normal route of bypass has then greatly threatened this trusting relationship.Therefore structure is applicable to that the safety QoS multicast route of mobile ad hoc network is very necessary as can be known.
Summary of the invention
The objective of the invention is to adopt the HORSEI2 cipher mechanism is that the QoS multicast route of mobile ad hoc network is provided with authentication mechanism, thereby make during QoS multicast route is set up, route requests message and route back message using can not revised, pretend to be and deny by unwarranted node, reach the purpose of safe route and propose a kind of method for building up based on the mobile self-organized network safety QoS multicast route of HORSEI2 that accounts for the little safety of the few processing expenditure of bandwidth.
To achieve these goals, technical scheme of the present invention is: be made up of three phases: the one, add safety QoS multicast group; The 2nd, create the safety QoS multicast tree; The 3rd, add the safety QoS multicast tree,
(1) needs to have had in the network suitable distributed access control and cipher key authority, be responsible for the granting and the renewal of the HORSEI2 PKI of multicast security group membership's room entry/exit management and each group membership's node by these access control and key management mechanism, each node of wanting to send/receives the multicast conversation data is adding multicast security group in advance all;
(2) foundation of safety QoS multicast router tree is triggered by data transmitting node, everyly thinks with the predetermined quality of service requirement data to be sent to the node of multicast group safely, if send for the first time, all must create the safety QoS multicast router tree earlier;
(3) everyly want to add the QoS multicast conversation and all must add the safety QoS multicast tree with the node that the predetermined quality of service requirement receives data safely;
Non-tree root node and the internodal data path of tree root on this safety QoS multicast tree just are called safety QoS multicast route.
Be to use the very little class PKI mechanism of the processing expenditure of certifying signature-HORSEI2 cryptographic algorithm to realize among the present invention.Simulation result shows, the present invention can reduce processing expenditure of being brought and the network bandwidth consumption that the digital signature to the route message authenticates effectively, and the reliable assurance of efficient higher data integrality and source authenticity is provided for the QoS multicast route of safety.
Description of drawings
Fig. 1 creates safety QoS multicast tree flow chart for sending node of the present invention.
Fig. 2 adds safety QoS multicast tree flow chart for the present invention.
Embodiment
The invention will be further described below in conjunction with accompanying drawing.
1) related network model and QoS multicast routing issue is defined as follows among the present invention:
Define 1 one networks can be expressed as a weighted graph G=(V, E), wherein V represents set of node, E represents the communication link collection of connected node.| V| and | E| represents node number and the number of links in this network respectively.For being without loss of generality, only consider such class figure, promptly in such network, have only a link between a pair of node at most, the parameter in chain roadside can be used for describing the current state of this link.
P (s, the t) path of expression from source node s to end node t, T (s, M) expression multicast tree are established in definition 2.S ∈ V is the source node of a multicast tree, and { V-{s}} is the end node or the leaf segment point set of this multicast tree to M .
It is the arithmetic number collection that R is established in definition 3, R
*Be the nonnegative real number collection.For any link e ∈ E, some QoS characteristic value (metrics) of definable:
Delay function delay (e): E → R,
Cost function cost (e): E → R,
Bandwidth function bandwidth (e): E → R,
Delay jitter function d elay-jitter (e): E → R.
Define 4 for arbitrary node n ∈ V, also some QoS characteristic value (metrics) of definable:
Delay function delay (n): V → R,
Cost function cost (n): V → R,
Delay jitter function d elay-jitter (n): E → R
*,
Letter packet loss function packet_loss (n): V → R
*.
The definition 5 establish T (s, M) expression multicast tree, following relationship is then arranged:
bandwidth(p(s,t))=min{bandwidth(e),e∈p(s,t)}
Definition 6QoS multicast routing issue relates generally to following element:
Network G=(V, E);
Multicast source node s ∈ V;
Multicast end node collection M { V-{s}};
delay(·)∈R
*;
cost(·)∈R;
bandwidth(·)∈R;
packet_loss(·)∈R
*.
Definition 7QoS multicast routing issue is that (s, M), it satisfies following QoS constraint to multicast tree T of searching, and makes cost (T (s, M)) minimum.
(1) deferred constraint: delay (p (s, t))≤D;
(2) bandwidth constraint: bandwidth (p (s, t)) 〉=B;
(3) delay jitter constraint: delay_jitter (p (s, t))≤J;
(4) packet loss constraint: packet_loss (p (s, t))≤L.
Wherein D is deferred constraint, and J is the delay jitter constraint, and B is a bandwidth constraint, and L is the packet loss constraint.Wherein contact is comparatively tight between delay and the delay jitter, and the latter can be reflected the former stationarity to a certain extent.Delay and jitter is an additive property, and bandwidth is an extremum property, and loss rate is a product.
Because node and link have equivalence, so only consider the QoS constraint of link among the present invention.
2) add safety QoS multicast group
No matter be which node request adds the security multicast group in the net, sender and recipient must examine its membership qualification via access control mechanism (establishing in addition) in the net.
After passing, requesting node just can obtain the initial privacy key SK of the good HORSEI2 of the prior calculated off-line of cipher key authority
0Be stored to this node internal memory with the hash chain of HORSEI2 correspondence and with it, its PKI PK
0And hash intermediate link all is distributed to all secure group members.
The process that cipher key authority is carried out the generation of HORSEI2 key is as follows:
(1) argument of type integer l is set, k, t,
Satisfy klog
2T≤H (),
k<t,
l≤|H(·)|/2;
Wherein, H () is a unidirectional hash function of safety.
(2) produce the random number s of t l bit long again
1, s
2..., s
t, with them as seed (also being the private key pair set) s
(d, 1), s
(d, 2)..., s
(d, t)Construct length and be t the hash chain of d, as follows:
{s
(d,1)→s
(d-1,1)→s
(d-2,1)→...→s
(0,1)}
={h
0(s
(d,1))→h
1(s
(d,1))→h
2(s
(d,1))→...→h
d(s
(d,1))};
{s
(d,2)→s
(d-1,2)→s
(d-2,2)→...→s
(0,2)}
={h
0(s
(d,2))→h
1(s
(d,2))→h
2(s
(d,2))→...→h
d(s
(d,2))};
...
{s
(d,t)→s
(d-1,t)→s
(d-2,t)→...→s
(0,t)}
={h
0(s
(d,t))→h
1(s
(d,t))→h
2(s
(d,t))→...→h
d(s
(d,t))};
S wherein
(d-i, j)=H
i(s
(d, j)),
Be s
(i, j)=H
D-i(s
(d, j)), (0≤i≤d, 1≤j≤t)
(3) above each hash chain is divided into
Individual length is
Subchain, and in the middle of link place of per two subchains is provided with one hash link (Intermediate HashJoint), wherein the value of r centre hash link is in the j bar hash chain
Wherein be provided with
r=0,1,2,...,int(i/d’),...,(d’-1),
Work as r=0, then J
(0, j)=PK
(0, j).
Wherein, PK
(0, j)Be and s
(i, j)The PKI of corresponding j bar hash chain.
(4) store this t hash chain and middle hash link (abbreviating IHJ as) and be used as a series of transmit leg keys.Therefore the private key that produces is to SK
0Be respectively with middle hash link
SK
0=(s
1,s
2,...,s
t)
=(s
(d-1,1),s
(d-1,2),...s
(d-1,t));
IHJ=(J
(1,j),J
(2,j),...,J
(d’-1,j)),(1≤j≤t).
(5) PKI PK
0Set
PK=(v
1,v
2,...,v
t)
=(s
(0,1),s
(0,2),...s
(0,t))
=(H(s
(1,1)),H(s
(1,2)),...,H(s
(1,t)));
3) create the safety QoS multicast tree
Consider fail safe, suppose to have only the secure group member could add multicast tree, its flow process is as described below:
If group membership t
sThink to send safely information to the multicast group membership, can be at safety QoS multicast conversation of when beginning initialization, (s M), and makes up through authentic other members that are routed to session promptly to create the multicast tree T to the service quality sensitivity of a safety.For this reason, t
sBroadcast a statement of creating the QoS multicast tree and give its neighbours t
vAs follows:
Be provided with
(1)m
s,i=[CTreq,IDt
s,T(s,M),i,Bandwidth,B,Delay,D,Delay-jitter,J,...]; (3-1)
(2) make h=Hash (m
S, i); (3-2)
Wherein, i represents that this is t
sI the packets of information of sending, B, D and J are respectively QoS binding occurrence-bandwidth, delay and the delay jitters of requirement.
(3) h being divided into a series of each length is log
2The substring h of t position
1, h
2..., h
j..., h
k
(4) make i
j=h
1 h
2 ... h
j ... h
k,
With i
jAs subscript from SK
iIn select an element as signature, promptly
(5)t
s→*:{m
s,i‖σ
s,i}. (3-4)
Work as t
sAfter having broadcasted above-mentioned information, (s, M) this multicast tree was created, then t as if T
sNeighbours can send the information " Ctnak " that refusal creates and give t
s, then this form build the statement be cancelled.Otherwise if t
sNot receiving after through one specific period in echo message that any refusal creates is with regard to the explanation group does not have other people to create this security multicast group, and then this security multicast is formed and built up merit.Each group membership is to signature sigma
S, iVerify.If checking is passed through, then neighbours just with the sign T of this security multicast tree (s, M) and t
sSign IDt
sBe recorded in the internal memory together.T subsequently
sJust begin to broadcast " Group Hello " packets of information to all group memberships with group leader's identity.
4) add the safety QoS multicast tree
If a group membership also is recipient's t simultaneously
uWish to add the safety QoS multicast conversation, (s M) arrives the member t of other conversation group with the safe route of setting up through authentication just to want to add multicast tree T
v, then broadcast a request that adds the QoS multicast tree, its operation following (wherein having omitted processing) to the route jumping figure:
(1)t
u:m
u,i=[JTreq,IDt
u,T(s,M),,Bandwidth,B,Delay,D,Delay-jitter,J,...]
(2) other operate the same joint Chinese style (3-2) (3-3), then t
uSend broadcast packet to neighbours:
t
u→*:{m
u,i‖σ
u,i}.
2) when the relaying node and also be the t that tree goes up node
vReceive after this solicited message that it is as follows just packets of information to be carried out integrity checking:
(1)t
v:h’=H(m
u,i);
(2) division h ', obtaining k length is log
2The substring h of t position
1', h
2' ..., h
j' ..., h
k' conversion h
jBecome integer and count i
j(1≤j≤k);
With i
jBe subscript, if for each j, (1≤j≤k)
Have
(when the front has been received s
(i+1) j)
Or have
Set up.
Then checking is passed through, otherwise refuses this packets of information and signature thereof.
Wherein,
r=0,1,2,...,int(i/d’),...,(d’-1), (3-6)
Work as r=0, then J
(0, j)=PK
(0, j).
(3) follow t
vTo check t
uQos requirement security multicast tree can satisfy.This is checked with reference to document
[133]Relevant flow process, we have added authentication measures at this.
If (d (t
s,
*)+d (t
u, t
vThe ∧ of)≤D) (dj (t
s,
*)+dj (t
u, t
vThe ∧ of)≤J) (bw (tu tv) 〉=B) sets up,
Wherein, d (t
s,
*) and dj (t
s,
*) be respectively from source node t
sTo all along the delay of road downstream node and delay jitter and.And bw (tu, tv), d (t
u, t
v) and dj (t
u, t
v) be respectively t
uAnd t
vBetween two nodes along bandwidth, the delay and jitter on road.
T then
vSend an echo message JTack and give t
uAs follows:
t
v→t
u:{[JTack,IDt
v,T(s,M),]‖σ
v,i};
Otherwise, survey again:
If bw (t
u, t
v)<B
Then (s removes t on M) from T
u
Otherwise, if (d (t
s,
*)+d (t
u, t
vThe ∨ of)>D) (dj (t
s,
*)+dj (t
u, t
v)>J)
T then
vTransmit t
uRequest give its local neighbours and be t
uThe new path that following condition is satisfied in search and calculating.
Otherwise, if (d (t
s, t
u))=min[d (s,
*), D-d (t
v, t
u)]) ∧ (dj (s, t
v))=min[dj (s,
*), J-dj (t
v, t
u)]);
T so
vAccept the request of this adding QoS multicast tree, and this JTack message is transmitted to t
u.
Otherwise, t
vSend refusal message JTnak and give t
u:
t
v→t
u:{[JTnak,IDt
v,T(s,M),i]‖σ
v,i}.
(4) work as t
uCan check t after receiving
vSignature sigma
V, i, by leading to upstream node t under the postscript
vPort, the multicast route set up to finish.
Obviously, message " JTack " or " JTnak " are by the via node t that wants route to some extent
vSend and to reduce the network cost effectively.
The content that is not described in detail in this specification belongs to this area professional and technical personnel's known prior art.
Claims (2)
1, a kind of method for building up of the mobile self-organized network safety QoS multicast route based on HORSEI2, its method is:
Each multicast conversation sender and recipient must check that through access control mechanism the back adds the multicast security group earlier, and obtain HORSEI2 private key and PKI;
Each wants to send multi-case data under the condition that possesses the QoS guarantee, creates the node of a new security multicast session and then creates the safety QoS multicast tree;
Each wants to add the security multicast session under the condition that possesses the QoS guarantee, and the node that receives multi-case data then adds the safety QoS multicast tree.
2, the method for building up of the mobile self-organized network safety QoS multicast route based on HORSEI2 as claimed in claim 1, it is characterized in that: in all data transmission procedures, sending data person needs the message that desire sends is applied the signature that produces with the HORSEI2 cipher mechanism, and receiving data person needs the message that receives is verified with sender's PKI.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007100523697A CN101060480B (en) | 2007-06-04 | 2007-06-04 | HORSEI2-based mobile self-organized network safety QoS multicast route creating method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007100523697A CN101060480B (en) | 2007-06-04 | 2007-06-04 | HORSEI2-based mobile self-organized network safety QoS multicast route creating method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101060480A true CN101060480A (en) | 2007-10-24 |
CN101060480B CN101060480B (en) | 2012-07-25 |
Family
ID=38866379
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007100523697A Expired - Fee Related CN101060480B (en) | 2007-06-04 | 2007-06-04 | HORSEI2-based mobile self-organized network safety QoS multicast route creating method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101060480B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103299577A (en) * | 2011-01-06 | 2013-09-11 | 国际商业机器公司 | Compact attribute for cryptographically protected messages |
CN103607352A (en) * | 2013-11-22 | 2014-02-26 | 上海电机学院 | Multicast routing method based on network topology |
WO2018035703A1 (en) * | 2016-08-23 | 2018-03-01 | Qualcomm Incorporated | A hybrid approach to advanced quality of service (qos) |
CN109845185A (en) * | 2016-10-31 | 2019-06-04 | 华为技术有限公司 | A kind of data transmission method, terminal, node device and system |
CN111597545A (en) * | 2020-05-19 | 2020-08-28 | 北京海泰方圆科技股份有限公司 | Authorization management method and device |
-
2007
- 2007-06-04 CN CN2007100523697A patent/CN101060480B/en not_active Expired - Fee Related
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103299577A (en) * | 2011-01-06 | 2013-09-11 | 国际商业机器公司 | Compact attribute for cryptographically protected messages |
CN103299577B (en) * | 2011-01-06 | 2016-04-06 | 国际商业机器公司 | For the compact nature of cryptoguard message |
CN103607352A (en) * | 2013-11-22 | 2014-02-26 | 上海电机学院 | Multicast routing method based on network topology |
WO2018035703A1 (en) * | 2016-08-23 | 2018-03-01 | Qualcomm Incorporated | A hybrid approach to advanced quality of service (qos) |
CN109845185A (en) * | 2016-10-31 | 2019-06-04 | 华为技术有限公司 | A kind of data transmission method, terminal, node device and system |
CN109845185B (en) * | 2016-10-31 | 2020-11-10 | 华为技术有限公司 | Data transmission method, terminal, node equipment and system |
CN111597545A (en) * | 2020-05-19 | 2020-08-28 | 北京海泰方圆科技股份有限公司 | Authorization management method and device |
Also Published As
Publication number | Publication date |
---|---|
CN101060480B (en) | 2012-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100341351C (en) | Mobile mesh AD-HOC networking | |
Sudhakar Sengan | A trust and cooperative nodes with affects of malicious attacks and measure the performance degradation on geographic aided routing in mobile ad hoc network | |
CN1483266A (en) | Multicast route in AD-HOC network | |
Karthikeyan et al. | Performance comparison of broadcasting methods in mobile ad hoc network | |
CN101060480A (en) | HORSEI2-based mobile self-organized network safety QoS multicast route creating method | |
Alsukayti et al. | A lightweight scheme for mitigating RPL version number attacks in IoT networks | |
Gupta et al. | Dynamic routing algorithm in wireless mesh network | |
Hinge et al. | Opinion based trusted AODV routing protocol for MANET | |
Abusalah et al. | Tarp: trust-aware routing protocol | |
CN1585329A (en) | Phonetic telecommunication method for mobile self-organizing network | |
Guo et al. | Secure minimum-energy multicast tree based on trust mechanism for cognitive radio networks | |
Hernández Marcano et al. | Throughput, energy and overhead of multicast device‐to‐device communications with network‐coded cooperation | |
Yuste et al. | An adaptive gateway discovery for mobile ad hoc networks | |
Kafaie et al. | FlexONC: Joint cooperative forwarding and network coding with precise encoding conditions | |
Zhan et al. | Conflict-free scheduling for partially connected D2D networks with network coding | |
CN1761231A (en) | The construction method of the distributed dynamic cellular route of mobile self-grouping network | |
Ramana et al. | Trust based security routing in mobile adhoc networks | |
Haq et al. | Congestion avoidance adaptive routing protocol for manets using network coding | |
Oukhatar et al. | A performance evaluation of broadcasting algorithms in wireless nanosensor networks | |
Voskoboynik et al. | Network coding schemes for data exchange networks with arbitrary transmission delays | |
Jayaprada et al. | An Efficient Cross-Layered Approach Quality-Aware Energy-Efficient Routing Protocol for QoS in MANET | |
Kothandaraman et al. | Prevention of Vulnerabilities on Location-based Geocasting and Forwarding Routing Protocol in Mobile... | |
Xie et al. | Performance analysis of network coding with virtual overhearing in wireless networks | |
Sharma et al. | Trust-based multi-level secure routing for authentication and authorisation in WMN | |
Akyurek et al. | A low complexity distributed algorithm for computing minimum-depth multicast trees in wireless networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120725 Termination date: 20130604 |