基于节点运动的机会网络路由算法
作者:
作者简介:

张棋飞(1977-),男,博士,副教授,CCF专业会员,主要研究领域为无线自组织网络,无线传感器网络,机会网络.
孙宝林(1963-),男,博士,教授,CCF高级会员,主要研究领域为网络技术,云计算,移动网络技术.
桂超(1964-),男,教授,主要研究领域为网络技术,云计算,移动网络技术.
宋莺(1975-),女,博士,副教授,CCF专业会员,主要研究领域为空间信息应用技术,无线通信技术,网络编码技术.

通讯作者:

孙宝林,E-mail:blsun@163.com

中图分类号:

TP393

基金项目:

国家自然科学基金(61572012);湖北省自然科学基金(2017CFB677,2018CFB661,2018CFB721);湖北省教育厅重点项目(14D052)


Routing Algorithm in Opportunistic Networks Based on Node Mobility
Author:
Fund Project:

National Natural Science Foundation of China (61572012); Natural Science Foundation of Hubei Province (2017CFB677, 2018CFB661, 2018CFB721); Key Project of Education Bureau, Hubei Province (14D052)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [34]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    机会网络利用节点移动带来的接触机会传输数据,数据在节点运动过程中捎带转发,保证了节点独立性,但会给数据传输带来影响.以节点的运动特性为切入点,设计了基于运动的机会网络路由算法.综合考虑数据传输、数据内容以及应用需求等因素,设计了数据转发优先级评价模型,结合节点活动区间划分方案制定数据传输规则;设计了差异化副本传输策略,在数据传输效率和系统开销之间取得折衷;考虑了节点活动范围、中心度及能量水平,构建了运动自由度函数评估节点运动水平.在此基础上设计了效用函数,选择中继节点转发数据.仿真结果表明,该算法能够在满足传输要求的同时限制网络开销,提高分组投递率,降低传输时延.

    Abstract:

    Opportunistic networks utilize the contact opportunities created by node movement to forward data between node pairs. Data is piggybacked during its carrier's movement, which guarantees node independence while imposes an impact on data transmission performance. This study designs a routing algorithm for opportunistic networks based on node movement characters. Considering the factors of data transmission, data content and application demands, a data forwarding priority evaluation model is developed and adopted to determine the data transmission rules combined with the division of node activity range. The transfer strategy of differential message replicas is proposed to achieve a tradeoff between transmission efficiency and system overhead. A node free motion degree function is constructed according to activity range distribution, centrality degree, and energy level to evaluate the node motion level. And then a utility function is deduced for relaying node selection. The simulation results demonstrate that the proposed algorithm achieves higher packet delivery ratio and less delivery latency while satisfying application demands and restraining network overhead.

    参考文献
    [1] Xiong YP, Sun LM, Niu JW, Liu Y. Opportunistic networks. Ruan Jian Xue Bao/Journal of Software, 2009,20(1):124-137(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3467.htm[doi:10.3724/SP.J.1001.2009.03467]
    [2] Ma HD, Yuan PY, Zhao D. Research progress on routing problem in mobile opportunistic networks. Ruan Jian Xue Bao/Journal of Software, 2015,26(3):600-616(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4741.htm[doi:10.13328/j. cnki.jos.004741]
    [3] Boukerche A, Darehshoorzadeh A. Opportunistic routing in wireless networks:Models, algorithms, and classifications. ACM Computing Surveys, 2014,47(2):1-36.[doi:http://dx.doi.org/10.1145/2635675]
    [4] Mota VFS, Cunha FD, Macedo DF, Nogueira JMS, Loureiro AAF. Protocols, mobility models and tools in opportunistic networks:A survey. Computer Communications, 2014,48:5-19.[doi:http://dx.doi.org/10.1016/j.comcom.2014.03.019]
    [5] Abdelkader T, Naik K, Nayak A, Goel N, Srivastava V. A performance comparison of delay-tolerant network routing protocols. IEEE Network, 2016,30(2):46-53.[doi:10.1109/MNET.2016.7437024]
    [6] Conti M, Giordano S. Mobile ad hoc networking:milestones, challenges, and new research directions. IEEE Communications Magazine, 2014,52(1):85-96.[doi:10.1109/MCOM.2014.6710069]
    [7] Woungang I, Dhurandher SK, Anpalagan A, Vasilakos AV. Routing in Opportunistic Networks. New York:Springer-Verlag, 2013.[doi:10.1007/978-1-4614-3514-3]
    [8] Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy efficient computing for wildlife tracking:Design tradeoffs and early experiences with ZebraNet. In:Proc. of the Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. 2002.[doi:10.13140/RG.2.1.2314.6326]
    [9] Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002, 10(4):477-486.[doi:10.1109/tnet.2002.801403]
    [10] Spyropoulos T, Psounis K, Raghavendra CS. Efficient routing in intermittently connected mobile networks:The multiple-copy case. IEEE/ACM Trans. on Networking, 2008,16(1):77-90.[doi:10.1109/tnet.2007.897964]
    [11] Shah RC, Roy S, Jain S, Brunette W. Data MULEs:Modeling a three-tier architecture for sparse sensor networks. In:Proc. of the 1st IEEE Int'l Workshop on Sensor Network Protocols and Applications. 2003.[doi:10.1109/SNPA.2003.1203354]
    [12] Zhao WR, Ammar M, Zegura E. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In:Proc. of the ACM Mobihoc. 2004.[doi:10.1145/989459.989483]
    [13] Zhao WR, Ammar M, Zegura E. Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In:Proc. of the 24th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). 2005.[doi:10.1109/INFCOM. 2005.1498365]
    [14] Niu JW, Dai B, Sun LM, Lin JL, Xiong YP. PQBCF:A P2P query algorithm based on betweenness centrality forwarding in opportunistic networks. Acta Electronica Sinica, 2013,41(9):1815-1820(in Chinese with English abstract).[doi:10.3969/j.issn. 0372-2112.2013.09.023]
    [15] Zhao D, Ma HD, Yuan PY, Liu L. Differentiated probabilistic forwarding for extending the lifetime of opportunistic networks. In:Proc. of the IEEE Wireless Communications and Networking Conf. (WCNC). 2012.[doi:10.1109/WCNC.2012.6214318]
    [16] Chen K, Shen HY. SMART:Lightweight distributed social map based routing in delay tolerant networks. In:Proc. of the 20th IEEE Int'l Conf. on Network Protocols (ICNP). 2012.[doi:10.1109/ICNP.2012.6459982]
    [17] Mtibaa A, May M, Diot C, Ammar M. PeopleRank:Social opportunistic forwarding. In:Proc. of the IEEE INFOCOM. 2010.[doi:10.1109/INFCOM.2010.5462261]
    [18] Hui P, Crowcroft J, Yoneki E. BUBBLE rap:Social-based forwarding in delay-tolerant networks. IEEE Trans. on Mobile Computing, 2011,10(11):1576-1589.[doi:10.1109/TMC.2010.246]
    [19] Xu F, Zhang HY, Wang J, Xu N, Wang ZY, Deng M. Social context-aware routing algorithms in opportunistic networks. Acta Electronica Sinica, 2015,43(5):833-840(in Chinese with English abstract).[doi:10.3969/j.issn.0372-2112.2015.05.001]
    [20] Ying B, Xu K, Nayak A. Fair and social-aware message forwarding method in opportunistic social networks. IEEE Communications Letters, 2019,23(4):720-723.[doi:10.1109/LCOMM.2019.2900892]
    [21] Wu L, Wu DA, Liu M, Wang XM, Gong HG. Periodic intermittently connected-based data delivery in opportunistic networks. Ruan Jian Xue Bao/Journal of Software, 2013,24(3):507-525(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4227.htm[doi:10.3724/SP.J.1001.2013.04227]
    [22] Lindgren A, Doria A, Schelen O. Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 2003,7(3):19-20.
    [23] Li F, Si YL, Chen Z, Lu N, Shen LM. Trust-based security routing decision method for opportunistic networks. Ruan Jian Xue Bao/Journal of Software, 2018,29(9):2829-2843(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5273.htm[doi:10.13328/j.cnki.jos.005273]
    [24] Abdelkader T, Naik K, Nayak A. Choosing the objective of optimal routing protocols in delay tolerant networks. In:Proc. of the Int'l Computer Engineering Conf. (ICENCO). 2010.[doi:10.1109/ICENCO.2010.5720418]
    [25] Huang P, Xiao L, Soltani S, Mutka MW, Xi N. The evolution of MAC protocols in wireless sensor networks:A survey. IEEE Communications Survey & Tutorials, 2013,15(1):101-120.[doi:10.1109/SURV.2012.040412.00105]
    [26] Basagni S, Conti M, Giordano S, Stojmenovic I. Mobile Ad Hoc Networking:The Cutting Edge Directions. 2nd ed., New York:John Wiley & Sons, Inc., 2013.
    [27] Keränen A, Ott J, Kärkkäinen T. The ONE simulator for DTN protocol evaluation. In:Proc. of the 2nd Int'l Conf. on Simulation Tools and Techniques for Communications, Networks and Systems (SimuTools). 2009.[doi:10.4108/ICST.SIMUTOOLS2009. 5674]
    附中文参考文献:
    [1] 熊永平,孙利民,牛建伟,刘燕.机会网络.软件学报,2009,20(1):124-137. http://www.jos.org.cn/1000-9825/3467.htm[doi:10.3724/SP.J.1001.2009.03467]
    [2] 马华东,袁培燕,赵东.移动机会网络路由问题研究进展.软件学报,2015,26(3):600-616. http://www.jos.org.cn/1000-9825/4741.htm[doi:10.13328/j.cnki.jos.004741]
    [14] 牛建伟,戴彬,孙利民,林佳骝,熊永平.PQBCF:一种基于中间中心度的机会网络P2P查询算法.电子学报,2013,41(9):1815-1820.
    [19] 徐方,张沪寅,王晶,徐宁,汪志勇,邓敏.基于社会上下文认知的机会路由算法.电子学报,2015,43(5):833-840.
    [21] 吴磊,武德安,刘明,王晓敏,龚海刚.机会网络中面向周期性间歇连通的数据传输.软件学报,2013,24(3):507-525. http://www.jos.org.cn/1000-9825/4227.htm[doi:10.3724/SP.J.1001.2013.04227]
    [23] 李峰,司亚利,陈真,鲁宁,申利民.基于信任机制的机会网络安全路由决策方法.软件学报,2018,29(9):2829-2843. http://www.jos.org.cn/1000-9825/5273.htm[doi:10.13328/j.cnki.jos.005273]
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

张棋飞,桂超,宋莺,孙宝林,戴志锋.基于节点运动的机会网络路由算法.软件学报,2021,32(8):2597-2612

复制
相关视频

分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2018-05-07
  • 最后修改日期:2019-08-11
  • 在线发布日期: 2020-04-21
  • 出版日期: 2021-08-06
文章二维码
您是第19938597位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号