CN107124735A - Opportunistic network low overhead method for routing based on delivery probability SV incidentally - Google Patents

Opportunistic network low overhead method for routing based on delivery probability SV incidentally Download PDF

Info

Publication number
CN107124735A
CN107124735A CN201710141879.5A CN201710141879A CN107124735A CN 107124735 A CN107124735 A CN 107124735A CN 201710141879 A CN201710141879 A CN 201710141879A CN 107124735 A CN107124735 A CN 107124735A
Authority
CN
China
Prior art keywords
node
message
incidentally
probability
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710141879.5A
Other languages
Chinese (zh)
Other versions
CN107124735B (en
Inventor
任智
王中永
李秀峰
曹红伟
游磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201710141879.5A priority Critical patent/CN107124735B/en
Publication of CN107124735A publication Critical patent/CN107124735A/en
Application granted granted Critical
Publication of CN107124735B publication Critical patent/CN107124735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/021Traffic management, e.g. flow control or congestion control in wireless networks with changing topologies, e.g. ad-hoc networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • H04W28/14Flow control between communication endpoints using intermediate storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention belongs to opportunistic network field, specifically related to a kind of opportunistic network low overhead method for routing based on delivery probability SV incidentally, this method is met perception by node, data interaction and the operation composition for delivering probabilistic information renewal three phases, comprising the delivery probability based on SV incidentally, simplify SV exchanges, 4 kinds of new mechanisms are managed based on message data interaction incidentally and adaptive cache, solve the communication overhead that the related method for routing based on agreed-upon price game delivers probability presence using special data structure storage and transmission in existing opportunistic network bigger than normal, in SV message exchange procedures quantitatively there is redundancy in control message, packet interaction there are problems that the request message that Correspondent Node may be deleted when redundant operation and packet are deleted cause meaningless expense and, so as to reduce the communication overhead of node in the case where not influenceing opportunistic network normally to route, be conducive to lifting network throughput, save the wireless bandwidth resource of node energy and network.

Description

Opportunistic network low overhead method for routing based on delivery probability SV incidentally
Technical field
The invention belongs to the field using opportunistic network (opportunistic networks) technology, more particularly in net Row energization and the occasion promoted are entered to the cooperation behavior of selfish node using the method for agreed-upon price game in network.
Background technology
Opportunistic network is that one kind need not have full link between a source node and a destination node, utilizes node motion band The chance of meeting realizes the time delay of communication and divides tolerable wireless self-organization network.In military, disaster relief and partially The fields such as remote field locations have a wide range of applications.At present, the research of opportunistic network is that have good collaborative based on node. However, due to the resource-constrained of opportunistic network interior joint, node is to save own resource to refuse to be other nodes forwarding message, This selfish behavior will certainly have a strong impact on opportunistic network normally route and data forwarding capability, so as to cause network performance to move back Change.Therefore the problem of Node selfishness problem in opportunistic network is one in the urgent need to address.
In recent years, progressively going deep into the opportunistic network routing method research work based on game theory, current a lot Game theory is incorporated into opportunistic network by person, and devises certain methods, wherein having Watchdog (ginsengs than more typical See document:Marti S,Giuli T J,Lai K,et al.Mitigating routing misbehavior in mobile ad hoc networks[C].International Conference on Mobile Computing and Networking,Boston,USA,2000:255-265), TFT is (referring to document:Neely M J,Golubchik L.Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraints[C],2011IEEE International Conference on Computer Communications, Shanghai, China, 2011:1458-1466)、IRONMAN(Incentives and Reputation for Opportunistic Networks using Social Networks, referring to document:Bigwood G,Henderson T.IRONMAN:Using social networks to add incentives and reputation to opportunistic networks[C].2011IEEE International Conference on Privacy, Security,Risk and Trust,and IEEE International Conference on Social Computing,2011:65-72)、CRGTD(Credit-based Repeaded Game Model applied in Transfer Decision, referring to document:The fiduciary repeated game models of the such as Zhang Cheng, Liu Huijun, Chen Ziyu are in node Polytechnics of application [J] PLA journal in forwarding, 2012,13 (2):152-158), Barter is (referring to document: Buttyan L,Dora L,Felegyhazi M,et al.Barter Trade Improves Message Delivery In Opportunistic Networks[J].Ad Hoc Networks,2010,8(1):1-14) with GSCP (referring to document:Fan W,Tingting C,Zhong S,et al.A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks[J].IEEE Transactions on Wireless Communications,2013,12(4):1573-1583) etc..
The main thought of Watchdog methods is that node is put the message for being sent to next-hop node in the buffer, then Using the characteristic of broadcast channel, intercept whether next-hop node forwarded the message.If next-hop is without more within the defined time It forwarded this message with changing, then illustrate that next-hop behavior is good;It is on the contrary then illustrate that next-hop occurs in that uncooperative behavior, sentenced It is set to selfish node.Watchdog is showed well, but due to the mobility of opportunistic network interior joint in common mobile ad hoc network, Such decision procedure does not account for failing because of situations such as packet collisions, next-hop node depart from caused monitor of communication range Situation and be easily caused erroneous judgement, and this method only utilizes the observed information of own node, lacks and is interacted with remaining node.
The main thought of TFT methods is that each node is all to start game with coordination strategy, each stage afterwards, node Correspondent Node will be imitated in behavior on last stage.Detection that method for routing based on TFT mechanism is used and reward node without The thought for being without permission is conducive to the front guiding to nodes ' behavior, but source node calculates forward-path in interruption/part connection Difficulty is likely to be encountered under topological condition, and destination node broadcast acknowledgements message then easily increases control overhead.And between node The transmission of identical services amount can only be realized, therefore this method is only applicable to the network of business equity completely.But in actual applications, Most of business is all non-symmetrical service so that this method is difficult to preferable network performance.
IRONMAN is a kind of Reputation methods based on node historical behavior, according to this method, each node maintenance The prestige value parameter of the selfish degree of one sign, two nodes can exchange the number of times that meets, the packet and friendship that exchange after meeting Change the information such as history, then, a node just can according to this information (such as whether have received oneself forwarding packet, Whether helping other node for data forwarding packet etc.) update the credit value of other side and other nodes so that judge they from Private.But because the time that any two node meets in opportunistic network has uncertainty, this allows for IRONMAN methods can Erroneous judgement can be produced because next-hop node not yet runs into destination node, needed while the accurate setting of credit value threshold value is also one The problem of solution.
CRGTD is a kind of fraud solution based on credit and repeated game, generally with infection routing mechanism knot Operation is combined, the exchange of information and message is controlled when node meets.CRGTD methods introduce credit cooperation machine System, single stage game behavior is changed into the repeated game process in the network operation time, and be provided with punitive measures and punish The cycle is penalized, the node for having fraud is punished within the punishment cycle, refusal forwards from or be sent to disappearing for this kind of node Breath.The method of CRGTD method detection node frauds is to preset the rule that node selects trading strategies, if node is pressed Rule selection trading strategies, then it is assumed that behavior is honest in transaction for it, otherwise just thinks there is fraud.CRGTD methods can Effectively to resist fraud of the node when reporting own situation, but due to game failure deficiency caused by single fraud Using decision node as non-honest node, thus it restrained in the judgement of non-honest node it is partially slow.
Barter is a kind of typical opportunistic network routing method based on theory of games, and this method is in the paired section met Exchange information in point, can preferably adaline can network distribution type topological structure, it is not necessary to the selfishness of node is carried out Monitoring, alleviates influence of the selfish node to network performance to a certain extent, but Barter methods follow equivalent and exchange principle, disappear The quantity that breath is exchanged is determined by the few side of commutative message number, equivalent exchange is carried out, if a node has message needs Forwarding, but the message that is needed without the node of Correspondent Node or without enough message for exchanging, then part messages can be caused to be difficult to Transmission causes network to have reached an impasse, the increase of Messages-Waiting time delay.
GSCP is a kind of node cooperation excitation method for routing based on agreed-upon price game (Bargaining Game), and GSCP recognizes It is different for the magnitude of value of message in network, message has bigger for the higher node of identical destination node collision probability Value, the message exchange procedure between node pair is modeled as game of once negotiating a price by GSCP, in the game, and both parties need Reach an agreement for the forwarding of message in price, and a message will could reach purpose section by repeatedly forwarding from source node Point, therefore it will undergo a series of agreed-upon price game during transmission so that message from the low node of the magnitude of value to The high node-node transmission of the magnitude of value, i.e. messaging success rate probability are increasing with the progress of transaction, eventually arrive at purpose Node, so as to promote network performance.But, game is possible to the node that it is defined in the case of multinode connection topology two-by-two Transaction apparatus meeting, and the network topology that centralized credit liquidation center connects in interruption/part are lost because game side is on the low side In can clear in time be also one the problem of should be noted.
In summary, in order to encourage node cooperation in the opportunistic network containing selfish node, people are to based on game theory Opportunistic network routing method, lasting research work is especially carried out using the motivational techniques of agreed-upon price game in recent years, and has taken Obtained certain achievement.But we have found after further investigation, the existing opportunistic network route side based on agreed-upon price game Also there is following four in method:
1. delivering probability matrix using special data structure storage and transmission, unnecessary communication overhead is brought.
2.SV exchanging mechanisms contain the control packet of redundancy, need to receive in the control message exchange process after node meets 2 SV message and 2 Request message are sent out, there is redundancy in the quantity of control message.
3. there is packet redundancy in message process of exchange using the method for routing of agreed-upon price game in existing opportunistic network to hand over Interoperability, bandwidth resources produce waste.
4. node is set up after connection, if inadequate buffer space need to perform cache management strategy to receive during new information, have The message in Correspondent Node request vector in caching may be deleted, i.e., the message that Correspondent Node will be asked is deleted, and causes nothing The expense and time delay of meaning.
The presence of above mentioned problem causes the communication overhead of opportunistic network bigger than normal, reduces network bandwidth resources utilization rate, is Improve the performances such as the handling capacity of opportunistic network, it is necessary to propose that new method for routing is solved to them.The present invention is by pin Practicable solution is proposed to these problems.
The content of the invention
In order to solve the problems, such as aforementioned four, the present invention proposes a kind of new, based on delivery probability SV incidentally low overhead road By new method, this method by node meet perception, data interaction and deliver probabilistic information update three phases operation constitute, wrap Containing " the delivery probability based on SV is incidentally ", " simplifying SV to exchange ", " based on the data interaction of message incidentally " and " adaptive cache pipe 4 kinds of new mechanisms of reason ", solve above-mentioned independent transmission and deliver larger probability matrix expense, SV exchanges quantity redundancy, packet friendship Mutual process redundancy and packet are deleted does not increase by four problems of expense at that time, so as to not influence what opportunistic network was normally route In the case of reduce the communication overhead of node, be conducive to lifting network throughput, save the wireless bandwidth of node energy and network Resource.
(1) general principle of new mechanism proposed by the present invention
Introduce in detail below " the delivery probability based on SV is incidentally " proposed by the present invention, " simplify SV exchange ", " be based on message Data interaction incidentally " and the general principle of " adaptive cache management " 4 kinds of new mechanisms.
1. the delivery probability based on SV is incidentally
In the existing opportunistic network routing method based on agreed-upon price game, node is mainly to throw using special data structure Pass probability matrix and deliver probabilistic information to store and transmit, when delivering probability matrix by data link layer encapsulation framing, no It is evitable to bring frame stem and tail expense, by the way that probabilistic information SV will be delivered incidentally, it is effectively reduced individually transmission and throws Pass the communication overhead that probability matrix is brought.
" the delivery probability based on SV is incidentally " basic ideas of new mechanism are:Opportunistic network route side based on agreed-upon price game In method, any structure body surface collected in vector chained list of node i shows the other purposes node j into network of node storage The eap-message digest M of packetn, we are reduced to by message source node Src, message destination node Dest_j, packet sequence number m_id Represent, the delivery probability two-dimensional matrix that it is stored is by the node identification Dest_j of any node j in network, the throwing of node i to j Pass probability PijRepresent.Delivering the design principles of probabilistic information SV incidentally is:When any node i in network is received and stored first To node j packet when, the structure containing 4 variables is used in vector S V is collected<Src, Dest_j, m_id, i to j throwing Pass probability Pij>Represent the eap-message digest and incidentally delivery probability of the node i to node j;When node i receives the purpose section again During point j packet, the structure containing 3 variables is used<Src, Dest_j, m_id>Represent the eap-message digest;When node i is not deposited When storing up the node of certain in network k packet, the structure containing 2 variables is used<Dest_k, i to k delivery probability Pik>To send Delivery probability with node i to node k, the SV of the node that meets for convenience identification interception appropriate length, 2 are increased in the stem of SV bags Individual length is length of the 16bit flag bit to distinguish above-mentioned three kinds of different structure bodies, and the expense 32bit of the flag bit is far small Probability matrix is delivered in independent transmission (such as to use by the expense 8Bytes of data link layer encapsulation framing time frame stem and afterbody Ppp protocol), so as to realize the piggyback that probability matrix is delivered in the case where reducing expense." the delivery probability based on SV is sent Shown in the operating process of band " new mechanism such as Figure of description 4 (1).
2. simplify SV exchanges
Traditional method for routing based on agreed-upon price game needs 2 SV message of transmitting-receiving and 2 in SV message exchange procedures , there is redundancy in Request message, in the quantity of control message to solve the problem, and we have proposed " simplifying SV to exchange " New mechanism, the new mechanism general principle is as follows:
After node A, B meet, if A nodes receive B node collect vector S V, no longer sent to other side and collect vector letter Breath, but by its with deposit certainly collect vector replicate respectively generation 1 copy, from the B received collect vector copy in remove Message that is that oneself is produced and having stored and delivery message of the likelihood ratio from height, the packet that can obtain this node A please Seek vector;Similarly, A nodes can obtain meeting node B data packet requests vector sends data so as to active to node B Packet, the present invention cancels the interaction of a SV message and a Request message, thus reduce node communication overhead and The consumption of energy and the network bandwidth.Shown in the operating process such as Figure of description 5 (1) of " simplifying SV exchanges " new mechanism.
3. the data interaction based on message incidentally
In traditional method for routing based on agreed-upon price game, the price that seller node is made according to tranaction costs function is i.e. Make be game both sides best price, buyer node still need reply acceptance of offer message inform that seller node oneself agrees to this There is redundant operation in transaction, data exchange process, waste network bandwidth resources.
The general principle of " based on the data interaction of message incidentally " new mechanism is:After node A, B meet, in the agreed-upon price of message In gambling process, if node A needs to merchandise during some message, can directly it be bid in request message, and because node A can be counted The data packet requests vector for obtaining Correspondent Node B is calculated, therefore the request message in vector can be asked to carry out actively according to the packet Charge, node B receives just to directly transmit node A request message and incidentally message " receiving charge " during above-mentioned bids and offers, Node A can send the message of its needs directly to B after receiving, the present invention can obviously reduce the data interaction between node, favorably In reducing expense, reduce message transmission time delay and save network bandwidth resources." based on the data interaction of message incidentally " new machine Shown in the operating process of system such as Figure of description 6 (1).
4. adaptive cache is managed
Assuming that according to LIFO mechanism during nodal cache insufficient space deletion message, i.e., what is deleted first is buffer queue afterbody Message.In traditional opportunistic network routing method, when the inadequate buffer space of via node need to perform packet deletion strategy When be possible to delete Correspondent Node request vector in message, it will cause to meet node repetitive requests and bring overhead, To solve the problem, we have proposed the new mechanism of " adaptive cache management ", the new mechanism general principle is as follows:
When new information is reached, if node still there are enough spatial caches, directly receive;Conversely, working as inadequate buffer space When needing packet loss, if queue tail message is not the request message of Correspondent Node, can directly it delete to receive new information, it is no Then, buffer queue trailer messages are not deleted, and above-mentioned buffer memory management method is continued executing with since next message of the message.
(2) beneficial effects of the present invention
Beneficial effects of the present invention are mainly:On the premise of not influenceing opportunistic network normally to route with incentives strategy, drop Low overhead, promotes the interaction of valid data, so as to lift the performances such as network throughput and data delay.It is mainly reflected in following four Individual aspect:
1. in traditional method for routing based on agreed-upon price game, node is thrown using special data structure storage and transmission Probability matrix is passed, causes the communication overhead of node bigger than normal.And proposed by the present invention be stored in delivery probabilistic information collects vector Mechanism does not need special data structure, and storage and the biography for delivering probabilistic information just can be realized in the case where reducing expense It is defeated.
2. traditional method for routing based on agreed-upon price game needs to receive and dispatch 2 SV message and 2 in SV message exchange procedures Individual Request message.And in the present invention, it is only necessary to 1 SV message is received, 1 Request message is sent out, identical just can be realized Request vector determines function.In the case where not influenceing message transmission, the quantity of control message is reduced, so as to reduce node Communication overhead and energy consumption.
3. in traditional method for routing based on agreed-upon price game, even if seller node is made according to tranaction costs function Price be game both sides best price, buyer node still need reply acceptance of offer message inform seller node oneself agree to There is redundancy and cause expense bigger than normal in this transaction, interaction.And in the present invention based on message piggy mechanism by between node Data exchange process is simplified, so as to reduce expense, reduces time delay.
4. in traditional opportunistic network routing method, when the inadequate buffer space of via node need to perform cache management strategy When be possible to delete the message in Correspondent Node request vector, and adaptive cache administrative mechanism proposed by the invention is in packet First determined whether during deletion the packet whether be Correspondent Node request packet, so as to be lifted in the case where not increasing overhead Handling capacity, reduces time delay.
Brief description of the drawings
Fig. 1 in the present invention based on the composition schematic diagram for delivering probability SV low overhead method for routing incidentally
Fig. 2 perceives schematic flow sheet for sending node in the present invention
Fig. 3 perceives schematic flow sheet for receiving node in the present invention
Fig. 4 is to be proposed by the present invention with the method schematic diagram for collecting vector and incidentally delivering probability
(1) deposit delivers the vector (2) of collecting after probability and does not store and deliver probability and collect vector
(3) probability matrix schematic diagram is delivered
SV exchange process and original SV exchange process contrast schematic diagrams that Fig. 5 defines for the present invention
(1) the original SV message exchange procedures of the SV message exchange procedures (2) of the invention defined
Fig. 6 is the data interaction schematic diagram in the present invention based on message incidentally
(1) the original packet switch process of the packet switch process (2) of the invention defined
Embodiment
In an opportunistic network comprising the node that multiple physical properties are identical, logic is equal, there is selfish section Point (node not being grouped for other node for data forwarding), node can be moved freely;Each node is both the source node of business, It is also the destination node of business, while also can be other node for data forwarding;When node meets can exchange data packets and The situation (such as Summary Vector, SV, collects vector table) for the packet for each carrying and being received as destination node, Be divided into operation node meet perception, data interaction and deliver probability updating three phases, as shown in figure 1, its specific embodiment party Formula is as follows:
The node of stage 1. meets perception
The stage includes three below step:
Step 1:Node periodic broadcast Hello message.
When node temporarily remains static, the cycle repeated broadcast Hello that can be fixed with certain transmit power disappears Cease, the related identification information such as the mark of Hello message packages containing node.
Step 2:Perception is met node.
When two nodes enter other side communication range after, can starter node discovery procedure, they independently Respective physical layer and Internet perceived by 2 kinds of modes, and judges to meet with Correspondent Node:1. physical layer receives other side's week The Hello message of phase property broadcast;2. the destination address that Internet receives Correspondent Node unicast is the packet of oneself.Meet simultaneously The two conditions just meet the encounter environment of node.
Step 3:Record the nodal information that meets
If present node determines to meet with other nodes, the mark for the nodal information that meets is stored in neighbor table, gone forward side by side The operation of row next stage.
Fig. 2 is the main flow schematic diagram that sending node is perceived, and Fig. 3 is the main flow schematic diagram that receiving node is perceived.
The data interaction of stage 2.
Fig. 6 (1) is data interaction schematic diagram based on message incidentally in the present invention, when node is after perception of meeting, meeting Into the process of the data interaction of next step, the stage includes following two steps:
Step 1:Node sends SV message.
First, after node receives the node that meets to the response of Hello message, one can be sent to the node that meets immediately and be sent Collect in vector message, explanation " the delivery probability piggy mechanism based on SV " with delivery probabilistic information is real in this step Existing, shown in the pack arrangement such as Fig. 4 (1) for collecting vector S V message, the delivery probabilistic information in SV message incidentally includes this node With the statistics of the node contact probability of other in network.When node meets, the history collision probability information that can be preserved with node P(a,b)oldBased on update delivery probabilistic information, the calculating for delivering probability calculates by formula 1,
P(a,b)=P(a,b)old+(1-P(a,b)old)*Pint (1)
Add and deliver after probabilistic information, there is the structure of three types in SV chained lists, structure variable number is respectively 2, 3、4.When any node i in network is received first and stores node j packet, used in vector S V is collected and contain 4 The structure of variable<Src, Dest_j, m_id, i to j delivery probability Pij>Represent the eap-message digest and incidentally node i to node J delivery probability;When node i receives destination node j packet again, the structure containing 3 variables is used<Src, Dest_j, m_id>Represent the eap-message digest;When node i does not store the node of certain in network k packet, using containing 2 variables Structure<Dest_k, i to k delivery probability Pik>Come incidentally that node i is to node k delivery probability, meet node for convenience The SV of identification interception appropriate length, flag bit of 2 length for 16bit is increased to distinguish above-mentioned three kinds not in the stem of SV bags With the length of structure.The structure number that structure number and variable number that variable number is 4 are 3 is represented respectively, with Just receiving node interception identification appropriate length collects vector.
At this stage, the process that SV is exchanged is simplified as such as Fig. 5 (1) Suo Shi, it is at this " to simplify SV exchanges " in explanation Realized in step, its concrete operations is that node receives other side and collected after vector, no longer sent to other side and collect Vector Message, and Be by its with deposit certainly collect vector replicate respectively generation 1 copy, from receive collect vector copy in remove oneself produce And the message that has stored and deliver the high message of likelihood ratio this node, can obtain the data packet requests vector of this node; Similarly, can obtain meeting the data packet requests vector of node.Obtain the data packet requests arrow of this node and the node that meets The operation of next stage is carried out after amount.
Step 2:Data transfer.
This step includes following 2 sub-steps:
1) sending node sends data
In node A, B in message agreed-upon price gambling process, it is assumed that when node A needs some message of transaction, can disappear in request Directly bid in breath, and Correspondent Node B data packet requests vector is obtained because node A can be calculated, therefore can be according to this point Request message in group request vector carries out active charge, and node B receives just to directly transmit node A's during above-mentioned bids and offers Request message and incidentally message " receiving charge ", node A can send the message of its needs directly to B after receiving." it is based in explanation The data interaction mechanism of message incidentally " is realized in this step, shown in its data interaction schematic diagram such as Fig. 6 (1).
2) receiving node performs cache management strategy
" adaptive cache administrative mechanism " is realized in this step in explanation, and its concrete operation step is:If newly disappearing When breath is reached, node still has enough spatial caches, then directly receives the message;Conversely, when inadequate buffer space needs packet loss When, if queue tail message is not the request message of Correspondent Node, it can directly delete to receive new information, otherwise, not delete Buffer queue trailer messages, continue executing with above-mentioned message deletion strategy since next message of the message.
Stage 3. delivers probability updating
The delivery probability updating operation in this stage is divided into two kinds of situations:
1) node a, after b meets, the history collision probability information P preserved with node(a,b)oldBased on calculate new contact Probability, and delivery probabilistic information is updated, shown in its calculation formula such as formula (2):
P(a,b)=P(a,b)old+(1-P(a,b)old)*Pint (2)
2) delivering probability has transitivity, if i.e. node a, b meet frequently, and node b, c meets frequently, then node a, c Between the P that can be calculated using formula (2) of contact probability(a,b)And P(b,c)Calculate indirectly, its calculation formula such as formula (3) Shown, wherein β represents weighing factor of the transitivity to delivery probability.
P(a,c)=P(a,c)old+(1-P(a,c)old)*P(a,b)*P(b,c)*β (3)。

Claims (5)

1. a kind of opportunistic network low overhead method for routing based on delivery probability SV incidentally, it is characterised in that:Met comprising node Perceive, data interaction and delivery probabilistic information update three main operational phases and " the delivery probability based on SV is incidentally ", " essence Simple SV exchanges ", " based on the data interaction of message incidentally " and " adaptive cache management " four kinds of new mechanisms.Met perception in node Stage finds the node that runs into of taken in conjunction, and the node that met in the data interaction stage is controlled interacting and holding for message and data Row cache management strategy, is delivering the information of probabilistic information more new stage node updates delivery probability matrix." the delivery based on SV Probability is incidentally " mechanism works are in the data interaction stage and deliver the probabilistic information more new stage, and " simplifying SV exchanges " mechanism works exist Data interaction stage and delivery probabilistic information more new stage, " based on the data interaction of message incidentally " mechanism works are in data interaction In the stage, " adaptive cache management " mechanism works are in the data interaction stage.
2. according to the method described in claim 1, it is characterized in that:" the delivery probability based on SV the is incidentally " new mechanism it is specific Operate and be:We are represented the source node of certain message, destination node j and packet sequence number, are worked as net respectively with Src, Dest_j, m_id When any node i in network is received and stored node j packet first, the knot containing 4 variables is used in vector S V is collected Structure body<Src, Dest_j, m_id, i to j delivery probability Pij>Represent the eap-message digest and incidentally delivery of the node i to node j Probability;When node i receives destination node j packet again, the structure containing 3 variables is used<Src, Dest_j, m_ id>Represent the eap-message digest;When node i does not store the node of certain in network k packet, the structure containing 2 variables is used< Dest_k, i to k delivery probability Pik>Come incidentally node i to node k delivery probability, the node that meets for convenience identification interception close The SV of suitable length, flag bit of 2 length for 16bit is increased to distinguish above-mentioned three kinds of different structure bodies in the stem of SV bags Length, the expense 32bit of the flag bit delivers probability matrix much smaller than individually transmission and passes through data link layer encapsulation framing time frame Stem and the expense of afterbody (such as the 8Bytes using ppp protocol), probability square is delivered in the case where reducing expense so as to realize The piggyback of battle array.
3. according to the method described in claim 1, it is characterized in that:The concrete operations of " simplify SV exchange " new mechanism are:Section After point meets, if one of node receives other side and collected after vector, no longer sent to other side and collect Vector Message, but by its With deposit certainly collect vector replicate respectively generation 1 copy, from receive collect vector copy in remove oneself generation and The message and the high message of this node of delivery likelihood ratio of storage, can obtain the data packet requests vector of this node;Similarly, originally Node can obtain meeting node data packet requests vector so as to actively send packet to the node that meets, so as to cancel one The interaction of individual SV message and a Request message, reduces expense.
4. according to the method described in claim 1, it is characterized in that:The tool of " based on the data interaction of the message incidentally " new mechanism Gymnastics conduct:Node A, B, can be in request messages if node A needs to merchandise during some message in the agreed-upon price gambling process of message In directly bid, and obtain Correspondent Node B data packet requests vector because node A can be calculated, therefore can be according to the packet The request message in vector is asked to carry out active charge, node B receives just to directly transmit asking for node A during above-mentioned bids and offers Message and incidentally message " receiving charge ", node A is asked to send the message of its needs after receiving directly to B.The new mechanism can subtract Data interaction between few node, advantageously reduces expense and saves network bandwidth resources.
5. according to the method described in claim 1, it is characterized in that:The concrete operations of " adaptive cache management " new mechanism For:Assuming that according to LIFO mechanism during nodal cache insufficient space deletion message, i.e., what is deleted first is disappearing for buffer queue afterbody Breath.If new information is reached, node still has enough spatial caches, then directly receives the message;Conversely, working as inadequate buffer space When needing packet loss, if queue tail message is not the request message of Correspondent Node, can directly it delete to receive new information, it is no Then, buffer queue trailer messages are not deleted, and above-mentioned buffer memory management method is continued executing with since next message of the message.
CN201710141879.5A 2017-03-10 2017-03-10 Opportunistic network low-overhead routing method based on delivery probability SV piggyback Active CN107124735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710141879.5A CN107124735B (en) 2017-03-10 2017-03-10 Opportunistic network low-overhead routing method based on delivery probability SV piggyback

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710141879.5A CN107124735B (en) 2017-03-10 2017-03-10 Opportunistic network low-overhead routing method based on delivery probability SV piggyback

Publications (2)

Publication Number Publication Date
CN107124735A true CN107124735A (en) 2017-09-01
CN107124735B CN107124735B (en) 2020-07-17

Family

ID=59717912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710141879.5A Active CN107124735B (en) 2017-03-10 2017-03-10 Opportunistic network low-overhead routing method based on delivery probability SV piggyback

Country Status (1)

Country Link
CN (1) CN107124735B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109618385A (en) * 2019-01-08 2019-04-12 重庆邮电大学 A kind of reliable efficient opportunistic network selfish node detection method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010047024A1 (en) * 2008-10-23 2010-04-29 日本電気株式会社 Network communication system, node device, routing method, and routing program
CN102791046A (en) * 2011-05-23 2012-11-21 同济大学 Exchange method and exchange node of metadata in opportunity network
US8462691B2 (en) * 2007-03-30 2013-06-11 British Telecommunications Plc Ad hoc communication system
CN103560966A (en) * 2013-11-13 2014-02-05 重庆邮电大学 Opportunistic network route mixing method based on network coding and copying

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8462691B2 (en) * 2007-03-30 2013-06-11 British Telecommunications Plc Ad hoc communication system
WO2010047024A1 (en) * 2008-10-23 2010-04-29 日本電気株式会社 Network communication system, node device, routing method, and routing program
CN102791046A (en) * 2011-05-23 2012-11-21 同济大学 Exchange method and exchange node of metadata in opportunity network
CN103560966A (en) * 2013-11-13 2014-02-05 重庆邮电大学 Opportunistic network route mixing method based on network coding and copying

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHI REN,WENPENG LIU,XUN ZHOU,JUN FANG,QIANBIN CHEN: "Summary-Vector-Based Effective and Fast Immunization for Epidemic-Based Routing in Opportunistic Networks", 《IEEE COMMUNICATIONS LETTERS》 *
吴大鹏,刘佳,王汝言: "带有投递概率感知的低开销机会网络路由机制", 《北京邮电大学学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109618385A (en) * 2019-01-08 2019-04-12 重庆邮电大学 A kind of reliable efficient opportunistic network selfish node detection method
CN109618385B (en) * 2019-01-08 2022-05-27 重庆邮电大学 Reliable and efficient detection method for selfish nodes of opportunistic network

Also Published As

Publication number Publication date
CN107124735B (en) 2020-07-17

Similar Documents

Publication Publication Date Title
CN103297343B (en) Routing method based on delay tolerant network
Verma et al. Integrated routing protocol for opportunistic networks
Chuah et al. Store-and-Forward Performance in a DTN
Kim et al. Efficient content delivery in mobile ad-hoc networks using CCN
CN104717238B (en) Distributed Services combined method based on ant group algorithm in mobile ad hoc network
CN106209627B (en) Vehicle-mounted distribute based on node-node transmission ability focuses Routing Protocol method
CN109874159A (en) Moving machine based on comentropy can network node social relationships measurement, cluster foundation and update and method for routing
CN103812947B (en) Data interaction system and method
Cai et al. A survey on routing algorithms for opportunistic mobile social networks
Zhao et al. Load-balancing strategy of multi-gateway for ad hoc Internet connectivity
Pan et al. Transmission of multimedia contents in opportunistic networks with social selfish nodes
Jiang et al. A survey on incentive mechanism of delay tolerant networks
Zhu et al. Rethinking routing information in mobile social networks: location-based or social-based?
CN107124735A (en) Opportunistic network low overhead method for routing based on delivery probability SV incidentally
Chuah et al. Integrated buffer and route management in a DTN with message ferry
Shi Semi-Probabilistic Routing in Intermittently Connected Mobile Ad Hoc Networks.
CN106453082A (en) Fair delay-tolerant network node cooperation stimulation method based on credit strategy
Goswami et al. Location based energy efficient scheme for maximizing routing capability of aodv protocol in manet
Kaushik et al. Modspirite: a credit based solution to enforce node cooperation in an ad-hoc network
Wang et al. Method to improve the performance of PROPHET routing protocol
Liu et al. The study of effectiveness for ad-hoc wireless network
CN103260181A (en) Service-oriented discovered mobile node group maintenance method
Mai et al. A T2T-based offloading method: Virtual bank with movement prediction
Yoo et al. Impact of a simple load balancing approach and an incentive-based scheme on MANET performance
Gupta et al. Detection and Prevention of Selfish Node in MANET using Innovative Brain Mapping Function: Theoretical Model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant