CN111970373A - Message confirmation method based on similarity - Google Patents

Message confirmation method based on similarity Download PDF

Info

Publication number
CN111970373A
CN111970373A CN202010876305.4A CN202010876305A CN111970373A CN 111970373 A CN111970373 A CN 111970373A CN 202010876305 A CN202010876305 A CN 202010876305A CN 111970373 A CN111970373 A CN 111970373A
Authority
CN
China
Prior art keywords
node
similarity
message
nodes
circle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010876305.4A
Other languages
Chinese (zh)
Other versions
CN111970373B (en
Inventor
崔建群
王宁宁
常亚楠
黄枫
吴淑庆
黄东升
余东海
孙佳悦
邬尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central China Normal University
Original Assignee
Central China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central China Normal University filed Critical Central China Normal University
Priority to CN202010876305.4A priority Critical patent/CN111970373B/en
Publication of CN111970373A publication Critical patent/CN111970373A/en
Application granted granted Critical
Publication of CN111970373B publication Critical patent/CN111970373B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5682Policies or rules for updating, deleting or replacing the stored data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/1607Details of the supervisory signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/30Flow control; Congestion control in combination with information about buffer occupancy at either end or at transit nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/32Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a message confirmation method based on similarity, which comprises the following steps: s1, defining similarity of nodes, and calculating similarity with the node viNode v and node in meeting node setiThe node whose similarity exceeds a given threshold is divided into nodes viThe inter-circle of (2); s2, node v carrying message miAnd node vjWhen meeting, updating the communication circle of the node, and calculating the node viSimilarity with the encountered node, if the similarity is greater than a given threshold, adding the encountered node to the node viIf node v in the inter-circle of (1)jAt node viWithin the communication circle, the message m is forwarded to the node vj(ii) a If node vjIs not at node viRefusing to forward the message m to the node vj. The invention controls the quantity and the transmission range of the confirmation messages according to the size of the communication circle, avoids generating excessive confirmation messages to waste resources, and removes redundant message copies in the network in time under the condition of not generating excessive additional expenses, thereby improving the success rate of message delivery.

Description

Message confirmation method based on similarity
Technical Field
The invention relates to the field of opportunistic networks, in particular to a message confirmation method based on similarity.
Background
The opportunity network does not require full communication of the network, and can better meet the actual demand of the ad hoc network. The opportunistic network is mostly used in a challenging environment, and is different from a traditional wireless network which needs facilities such as a base station and the like for assistance, for example, in a mountainous area, due to environmental limitation, infrastructure is not set up, and network collection information can be set up by using equipment such as a mobile phone and the like. In an opportunistic network, due to the reasons of movement of network nodes, wireless communication interference, limitation of resources (such as cache, battery energy and the like) of the nodes, and the like, network topology is variable, data rates are asymmetric, and the network is frequently divided, so that common end-to-end communication cannot be completed or communication performance cannot meet application requirements easily.
In an opportunistic network environment, after a message successfully reaches a destination node, some relay nodes which participate in forwarding in the middle may not know that the message has been successfully sent, and still perform store-and-forward operation on the message. If these relay nodes are not notified in time, network resources may be wasted. For any node, after receiving the message, the node judges whether the message reaches the destination node, if so, the node indicates that the message is successfully sent, and then the node generates an ACK message of the message. In the process of forwarding messages in the opportunistic network, the messages need to reach a destination node through multiple hops, and pass through multiple relay nodes during the period, after the messages successfully reach the destination node, a plurality of redundant copies of the messages still can be stored in the network, the redundant copies occupy a cache space, and when the cache is insufficient, node packet loss is caused, so that the routing performance is influenced. The acknowledgement mechanism of TCP is used in the traditional network to realize the reliable transmission of data messages, while the ACK message is used in the opportunistic network to quickly delete the redundant message copies in the network, so as to prevent the redundant message copies from continuously executing the forwarding process, waste network resources and achieve the purpose of improving the utilization rate of the network resources.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a message confirmation method based on similarity to overcome the defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows:
the invention provides a message confirmation method based on similarity, in an opportunity network, the distribution of confirmation messages among nodes is controlled by the message confirmation method based on the similarity, the similarity is defined by common neighbor node information among the nodes and connection strength information of encountering nodes, an intersegmental circle of the nodes is divided according to the similarity, and the quantity and the propagation range of the confirmation messages are controlled according to the size of the intersegmental circle, the method comprises the following steps:
s1, defining similarity of nodes, and calculating similarity with the node viNode v and node in meeting node setiThe node whose similarity exceeds a given threshold is divided into nodes viThe inter-circle of (2);
s2, node v carrying message miAnd node vjWhen meeting, updating the communication circle of the node, and calculating the node viSimilarity with the encountering node, if the similarity with the encountering node is greater than a given threshold, adding the encountering node into the node viIn the inter-circle of (1); and according to whether the encountering node is at the node viDifferent acknowledgement message forwarding strategies are adopted within the inter-circleA little: if node vjAt node viWithin the communication circle, the message m is forwarded to the node vj(ii) a If node vjIs not at node viRefusing to forward the message m to the node vj
Further, the method for calculating the similarity in the method of the present invention comprises:
similarity SD (v)i,vj) Representing a node viNode vjThe calculation formula of the comprehensive value of the overlapping degree of the neighbor weight sum and the activity range of the node which are commonly owned by two nodes in the encountered nodes is as follows:
Figure BDA0002652728970000021
wherein k isvzFor node pair vi,vjDegree of common neighbor node, lnkvzIs e as the base kvzIs the node pair vi,vjIntersection area of communication ranges, (v)i) Representing a node viSet of nodes that have met, (v)j) Representing a node vjSet of nodes that have been encountered in history, vz∈(vi)∩(vj) Representing a node vzIs node viAnd node vjThe neighboring nodes that have met together.
Further, in step S2, the method for updating the inter-circle of the node based on the similarity includes:
node viThe circle of communication CSvi represents the node v in the networkiEncountered node viExceeds a given threshold CSthresholdThe construction process of the node set of (2) is as follows:
node viAnd node vjWhen meeting, judging the node v firstjWhether or not at node viSet of encountering nodesiIf not, the node v is connectedjAdding to a set of encountering nodesiPerforming the following steps; if yes, directly calculating the similarity;
then judging the node vjWhether or not it is already at node viIf the node v is not in the intersegmental circle CSvi, the node v is calculatediAnd node vjDegree of similarity between SD (v)i,vj) Then, the SD (v) is judgedi,vj) Whether greater than a given threshold CSthresholdIf yes, then connect node vjAdding to node viThe intersegmental circle CSvi of (1).
Further, in the step S2, the threshold is used to control the size of the inter-circle, and if the value of the threshold is larger, the divided inter-circle is smaller, the chance of message diffusion is smaller, and the number of deleted message copies is smaller, so that the cache pressure cannot be effectively relieved; if the value of the threshold value is larger, the divided inter-circle is larger, the transmission of the confirmation message is more, the cache is occupied, and the cache occupation ratio is larger.
Further, in step S2 of the present invention, the confirmation message forwarding policy is:
for nodes in the same interstation circle, directly sending a confirmation message m to the encountering node in an active mode, informing the encountering node to delete redundant messages in time and releasing a cache space; and for nodes in different communication circles, refusing to send the message m when receiving the request of the meeting node for sending the message m.
Further, the method for setting the given threshold in the method of the present invention specifically includes: dividing nodes with similarity exceeding given threshold into nodes viThe size of the threshold is determined by experiments; when the threshold value is reached<1.2, the confirmation message is spread too much, and the cache is occupied; when the threshold value is reached>1.2, the number of deleted message copies is too small, and the cache pressure cannot be relieved.
The invention has the following beneficial effects: the message confirmation method based on the similarity divides the communication circle of the nodes in the network by defining the similarity of the nodes, so that the nodes with high similarity are in the same communication circle. When two nodes meet, judging whether the meeting node is in the intersegmental circle of the node, if so, forwarding the confirmation message to the meeting node; if the meeting node is not in the intersegmental circle of the node, the meeting node refuses to receive the message when receiving the request of sending the message m from the meeting node. The number and the propagation range of the confirmation messages are controlled according to the size of the communication circle, the resource waste caused by excessive confirmation messages is avoided, redundant message copies in a network can be cleared in time under the condition of not generating excessive additional expenses, and the message delivery success rate is improved.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is an algorithm flow diagram of a message validation method based on similarity according to an embodiment of the present invention;
FIG. 2 is a process diagram of an algorithm for constructing an interface circle of a node according to an embodiment of the present invention;
fig. 3 is a process diagram of a message confirmation method forwarding policy based on similarity according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, in an opportunistic network, the message confirmation method based on the similarity according to the embodiment of the present invention controls distribution of confirmation messages between nodes by using the message confirmation method based on the similarity, defines the similarity by using common neighbor node information between nodes and meeting node connection strength information, divides an intersegmental circle of the nodes according to the similarity, and controls the number and propagation range of confirmation messages according to the size of the intersegmental circle, and includes the following steps:
s1, defining similarity of nodes, and calculating similarity with the node viNode v and node in meeting node setiThe node whose similarity exceeds a given threshold is divided into nodes viThe inter-circle of (2);
the similarity in step S1 is used to estimate the closeness of the social relationship between the nodes, and if the historical meeting node sets of the two nodes are almost overlapped and the connection strength of the two nodes is high, it means that the activity ranges of the two nodes are similar, and the two nodes should be divided into the same social circle.
S2, node v when carrying ACK (m) of confirmation messageiAnd node vjWhen meeting, the communication circle of the node is updated, and the updating process is shown in fig. 2, and the specific process is as follows:
node viThe circle of communication CSvi represents the node v in the networkiEncountered node viExceeds a given threshold CSthresholdThe construction process of the node set of (2) is as follows:
node viAnd node vjWhen meeting, judging the node v firstjWhether or not at node viSet of encountering nodesiIf not, the node v is connectedjAdding to a set of encountering nodesiPerforming the following steps; if yes, directly calculating the similarity;
then judging the node vjWhether or not it is already at node viIf the node v is not in the intersegmental circle CSvi, the node v is calculatediAnd node vjDegree of similarity between SD (v)i,vj) Then, the SD (v) is judgedi,vj) Whether greater than a given threshold CSthresholdIf yes, then connect node vjAdding to node viThe intersegmental circle CSvi of (1).
Compute node viSimilarity with meeting node SD (v)i,vj) The method comprises the following steps:
determining whether to add the encountering node into the node v according to whether the similarity of the encountering nodes is greater than a given threshold valueiAnd according to whether the encountering node is in the node viDifferent acknowledgement message forwarding strategies are adopted within the intersegmental circle: if node vjAt node viWithin the communication circle, the message m is forwarded to the node vj(ii) a If node vjIs not at node viRefusing to forward the message m to the node vj
The similarity is calculated by the following formula:
similarity SD (v)i,vj) Representing a node viNode vjThe calculation formula of the comprehensive value of the overlapping degree of the neighbor weight sum and the activity range of the node which are commonly owned by two nodes in the encountered nodes is as follows:
Figure BDA0002652728970000051
wherein k isvzFor node pair vi,vjDegree of common neighbor node, lnkvzIs e as the base kvzIs the node pair vi,vjIntersection area of communication ranges, (v)i) Representing a node viSet of nodes that have met, (v)j) Representing a node vjSet of nodes that have been encountered in history, vz∈(vi)∩(vj) Representing a node vzIs node viAnd node vjThe neighboring nodes that have met together.
The threshold value in the step S2 is used to control the size of the communication circle, and if the value of the threshold value is larger, the divided communication circle is smaller, the chance of message diffusion is smaller, and the deleted message copy is smaller, so that the cache pressure cannot be effectively relieved; if the value of the threshold value is larger, the divided inter-circle is larger, the transmission of the confirmation message is more, the cache is occupied, and the cache occupation ratio is larger.
In step S2, the message forwarding policy is determined as follows:
for nodes in the same interstation circle, directly sending a confirmation message m to the encountering node in an active mode, informing the encountering node to delete redundant messages in time and releasing a cache space; and for nodes in different communication circles, refusing to send the message m when receiving the request of the meeting node for sending the message m.
In summary, the invention discloses a message confirmation method based on similarity, which defines the node similarity by researching the meeting history information and the connection strength among nodes. And dividing the communication circle of the nodes in the network through the similarity, so that the nodes with high similarity are in the same communication circle. When two nodes meet, judging whether the meeting node is in the intersegmental circle of the node, if so, forwarding the confirmation message to the meeting node; if the meeting node is not in the intersegmental circle of the node, the meeting node refuses to receive the message when receiving the request of sending the message m from the meeting node. Compared with the traditional active confirmation mechanism and the passive confirmation mechanism, the overall performance of the algorithm in terms of delivery success rate, network overhead and average time delay is optimal.
Under the scenes that the number of nodes is 180, the message survival time is 300s, and the cache sizes are respectively set to be 1M, 2M, 3M, 4M, 5M, 6M, 7M, 8M, 9M and 10M, compared with the traditional Active deletion mode and Passive deletion mode, the method provided by the invention has the advantages that the delivery rate is averagely improved by 3.97% compared with an Active algorithm and is averagely improved by 20.94% compared with a Pasive algorithm. Compared with the Active algorithm, the network overhead is averagely reduced by 26.96%, and compared with the Passive algorithm, the network overhead is averagely reduced by 65.4%. The average delay is 8.94% higher than that of the Active algorithm, and is reduced by 11.67% on average compared with that of the Passive algorithm. Therefore, the method of the invention has the best overall performance on delivery rate, average time delay and network overhead.
It will be understood that modifications and variations can be made by persons skilled in the art in light of the above teachings and all such modifications and variations are intended to be included within the scope of the invention as defined in the appended claims.

Claims (6)

1. A message confirmation method based on similarity is characterized in that in an opportunity network, distribution of confirmation messages among nodes is controlled through the message confirmation method based on the similarity, the similarity is defined through common neighbor node information among the nodes and connection strength information of encountering nodes, an intersegmental circle of the nodes is divided according to the similarity, and the number and the propagation range of the confirmation messages are controlled according to the size of the intersegmental circle, and the method comprises the following steps:
s1, defining similarity of nodes, and calculating similarity with the node viNode v and node in meeting node setiThe similarity of (2) is divided into nodes with the similarity exceeding a given threshold valueviThe inter-circle of (2);
s2, node v carrying message miAnd node vjWhen meeting, updating the communication circle of the node, and calculating the node viSimilarity with the encountering node, if the similarity with the encountering node is greater than a given threshold, adding the encountering node into the node viIn the inter-circle of (1); and according to whether the encountering node is at the node viDifferent acknowledgement message forwarding strategies are adopted within the intersegmental circle: if node vjAt node viWithin the communication circle, the message m is forwarded to the node vj(ii) a If node vjIs not at node viRefusing to forward the message m to the node vj
2. The message confirmation method based on the similarity according to claim 1, wherein the similarity calculation method in the method is as follows:
similarity SD (v)i,vj) Representing a node viNode vjThe calculation formula of the comprehensive value of the overlapping degree of the neighbor weight sum and the activity range of the node which are commonly owned by two nodes in the encountered nodes is as follows:
Figure FDA0002652728960000011
wherein k isvzFor node pair vi,vjDegree of common neighbor node, lnkvzIs e as the base kvzIs the node pair vi,vjIntersection area of communication ranges, (v)i) Representing a node viSet of nodes that have met, (v)j) Representing a node vjSet of nodes that have been encountered in history, vz∈(vi)∩(vj) Representing a node vzIs node viAnd node vjThe neighboring nodes that have met together.
3. The method for confirming message based on similarity according to claim 1, wherein the method for updating the communication circle of the node based on similarity in step S2 is as follows:
node viThe circle of communication CSvi represents the node v in the networkiEncountered node viExceeds a given threshold CSthresholdThe construction process of the node set of (2) is as follows:
node viAnd node vjWhen meeting, judging the node v firstjWhether or not at node viSet of encountering nodesiIf not, the node v is connectedjAdding to a set of encountering nodesiPerforming the following steps; if yes, directly calculating the similarity;
then judging the node vjWhether or not it is already at node viIf the node v is not in the intersegmental circle CSvi, the node v is calculatediAnd node vjDegree of similarity between SD (v)i,vj) Then, the SD (v) is judgedi,vj) Whether greater than a given threshold CSthresholdIf yes, then connect node vjAdding to node viThe intersegmental circle CSvi of (1).
4. The message confirmation method based on the similarity according to claim 1, wherein the threshold in step S2 is used to control the size of the communication circle, and if the value of the threshold is larger, the divided communication circle is smaller, the confirmation message has a smaller chance of being diffused, and the deleted message copy is smaller, which cannot effectively relieve the cache pressure; if the value of the threshold value is larger, the divided inter-circle is larger, the transmission of the confirmation message is more, the cache is occupied, and the cache occupation ratio is larger.
5. The method for message acknowledgement based on similarity according to claim 1, wherein the message forwarding policy of step S2 is:
for nodes in the same interstation circle, directly sending a confirmation message m to the encountering node in an active mode, informing the encountering node to delete redundant messages in time and releasing a cache space; and for nodes in different communication circles, refusing to send the message m when receiving the request of the meeting node for sending the message m.
6. The message confirmation method based on the similarity as claimed in claim 1, wherein the method for setting the given threshold specifically comprises: dividing nodes with similarity exceeding given threshold into nodes viThe size of the threshold is determined by experiments; when the threshold value is reached<1.2, the confirmation message is spread too much, and the cache is occupied; when the threshold value is reached>1.2, the number of deleted message copies is too small, and the cache pressure cannot be relieved.
CN202010876305.4A 2020-08-27 2020-08-27 Message confirmation method based on similarity Active CN111970373B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010876305.4A CN111970373B (en) 2020-08-27 2020-08-27 Message confirmation method based on similarity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010876305.4A CN111970373B (en) 2020-08-27 2020-08-27 Message confirmation method based on similarity

Publications (2)

Publication Number Publication Date
CN111970373A true CN111970373A (en) 2020-11-20
CN111970373B CN111970373B (en) 2022-06-10

Family

ID=73399352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010876305.4A Active CN111970373B (en) 2020-08-27 2020-08-27 Message confirmation method based on similarity

Country Status (1)

Country Link
CN (1) CN111970373B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738862A (en) * 2020-12-28 2021-04-30 河南师范大学 Data forwarding method in opportunity network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222438A (en) * 2008-01-28 2008-07-16 北京航空航天大学 Data transmission method in opportunity network
CN101771964A (en) * 2010-01-06 2010-07-07 北京航空航天大学 Information correlation based opportunistic network data distributing method
US20130137469A1 (en) * 2011-11-30 2013-05-30 Intel Mobile Communications GmbH Method for transmitting an opportunistic network related message
CN105791120A (en) * 2016-05-03 2016-07-20 哈尔滨工业大学深圳研究生院 Efficient routing algorithm in opportunistic network
CN106102116A (en) * 2016-05-30 2016-11-09 重庆邮电大学 Self adaptation retransmission method based on node-node transmission performance in opportunistic network
CN110809302A (en) * 2019-11-11 2020-02-18 华中师范大学 Self-adaptive multi-injection waiting routing method based on social circle

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222438A (en) * 2008-01-28 2008-07-16 北京航空航天大学 Data transmission method in opportunity network
CN101771964A (en) * 2010-01-06 2010-07-07 北京航空航天大学 Information correlation based opportunistic network data distributing method
US20130137469A1 (en) * 2011-11-30 2013-05-30 Intel Mobile Communications GmbH Method for transmitting an opportunistic network related message
CN105791120A (en) * 2016-05-03 2016-07-20 哈尔滨工业大学深圳研究生院 Efficient routing algorithm in opportunistic network
CN106102116A (en) * 2016-05-30 2016-11-09 重庆邮电大学 Self adaptation retransmission method based on node-node transmission performance in opportunistic network
CN110809302A (en) * 2019-11-11 2020-02-18 华中师范大学 Self-adaptive multi-injection waiting routing method based on social circle

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JIANQUN CUI等: "An Adaptive Spray and Wait Routing Algorithm Based on Quality of Node in Delay Tolerant Network", 《IEEE ACCESS》 *
曹书琴: "DTN中基于社交圈的自适应多次喷射等待路由算法研宄", 《中国优秀硕士学位论文电子期刊》 *
范为仁: "移动机会网络中的路由算法与拥塞控制策略研究", 《中国优秀硕士学位论文电子期刊》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738862A (en) * 2020-12-28 2021-04-30 河南师范大学 Data forwarding method in opportunity network
CN112738862B (en) * 2020-12-28 2022-09-23 河南师范大学 Data forwarding method in opportunity network

Also Published As

Publication number Publication date
CN111970373B (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN101222438B (en) Data transmission method in opportunity network
CN111970200B (en) Probability routing method based on utility value
WO2019169874A1 (en) Wireless mesh network opportunistic routing algorithm based on quality of service assurance
KR100586233B1 (en) An optimal direction-based flooding method for mobile ad-hoc networks
CN106412820B (en) Method and device for determining cluster head of mobile ad hoc network
CN110809302B (en) Self-adaptive multi-injection waiting routing method based on social circle
CN107249202B (en) Distributed wireless backhaul routing algorithm
CN105792309A (en) Energy conservation oriented game theory QoS based routing method for sensing UAV cluster communications
CN106686679B (en) Energy-efficiency-based multi-hop D2D routing hop number limiting method in content-centric network
EP4035447A1 (en) Method and system for enhanced steering and traffic load balancing in wireless mesh networks
CN111970373B (en) Message confirmation method based on similarity
CN105407048A (en) Delay tolerant network node cache management method facing epidemic and probabilistic hybrid routing
CN110248392B (en) Opportunity forwarding method based on node efficiency in Internet of vehicles
CN105049347A (en) Routing method of DTN (Delay Tolerant Network) based on social network task distribution model
CN113660710B (en) Mobile self-organizing network routing method based on reinforcement learning
CN104469874A (en) Message forwarding method of opportunistic network based on probability centrality
Valera et al. CHAMP: a highly-resilient and energy-efficient routing protocol for mobile ad hoc networks
CN103312619B (en) A kind of deletion simultaneously and the jamming control method of Transfer Message
Pushpalatha et al. Efficient Multicast Algorithm for Dynamic Intra Cluster Device-to-Device communication for small world model paper
CN111405489A (en) Multicast tree construction method applied to wireless network
JP2004007457A (en) Communication system, communication controller and communication control method, communication equipment and communication method, and computer program
CN110139304B (en) MPR set selection method based on isolation degree and non-MPR nodes
Gupta et al. Cored-based tree with forwarding regions (cbt-fr); a protocol for reliable multicasting in mobile ad hoc networks
Özkasap et al. Epidemic-based approaches for reliable multicast in mobile ad hoc networks
CN108848534B (en) Routing method for adaptively reducing node load in mobile ad hoc network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20201120

Assignee: Hubei Yanchu Heyi Network Technology Co.,Ltd.

Assignor: CENTRAL CHINA NORMAL University

Contract record no.: X2023980042875

Denomination of invention: A Message Confirmation Method Based on Similarity

Granted publication date: 20220610

License type: Common License

Record date: 20231007

EE01 Entry into force of recordation of patent licensing contract