A classification approach to broadcasting in a mobile ad hoc network

被引:0
作者
Colagrosso, MD [1 ]
机构
[1] Colorado Sch Mines, Dept Math & Comp Sci, Golden, CO 80401 USA
来源
ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5 | 2005年
关键词
mobile ad hoc network; broadcast protocol; machine learning;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present a new broadcast protocol using Bayesian probabilistic classifiers, and we demonstrate its use in a mobile ad hoe network (MANET). Broadcasting functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by MANET applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, every protocol fails catastrophically in severe network environments. We exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN) builds a classifier and trains it on data collected from the network environment. Given an input vector describing a broadcast packet and current network conditions, the classifier returns an output label of "Rebroadcast" or "Drop:" Because each MN adapts to changing network conditions, the result is a more robust communication protocol and more efficient use of network resources. We show that our protocol, compared to those tested, is the most efficient under a range of network conditions.
引用
收藏
页码:1112 / 1117
页数:6
相关论文
共 50 条
[31]   A Secure Path Selection Scheme for Mobile Ad Hoc Network [J].
Sachin D. Ubarhande ;
Dharmpal D. Doye ;
Prakash S. Nalwade .
Wireless Personal Communications, 2017, 97 :2087-2096
[32]   Energy Control based Routing for Mobile Ad hoc Network [J].
Wang, Yu .
2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, :59-62
[33]   Research and implementation of mobile ad hoc network emulation system [J].
Liu, WG ;
Song, HT .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, :749-754
[34]   Detecting and preventing selfish behaviour in mobile ad hoc network [J].
Tao Lei ;
Shangguang Wang ;
Jinlin Li ;
Ilsun You ;
Fangchun Yang .
The Journal of Supercomputing, 2016, 72 :3156-3168
[35]   Transmission power control in the mobile ad hoc network systems [J].
Honda, Hirotada .
2006 SICE-ICASE INTERNATIONAL JOINT CONFERENCE, VOLS 1-13, 2006, :368-372
[36]   PKIM:: A public key infrastructure for Mobile ad hoc network [J].
Miao, FY ;
Xiong, Y ;
Yang, SB ;
Wang, XF .
CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (04) :594-598
[37]   A novel approach for intrusion detection in mobile ad hoc networks [J].
Chaudhari B.S. ;
Prasad R.S. .
Int. J. Networking Virtual Organ., 2019, 3 (363-378) :363-378
[38]   Achievable Throughput-Based Admission Control for Mobile Ad Hoc Network: Cross Layer Approach [J].
Sabri Saeed ;
Mahamod Ismail ;
Rosilah Hassan ;
Abdulmalek Al-Hemyari .
Wireless Personal Communications, 2015, 84 :2777-2796
[39]   Achievable Throughput-Based Admission Control for Mobile Ad Hoc Network: Cross Layer Approach [J].
Saeed, Sabri ;
Ismail, Mahamod ;
Hassan, Rosilah ;
Al-Hemyari, Abdulmalek .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (04) :2777-2796
[40]   A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network [J].
Ramesh Vatambeti .
Wireless Personal Communications, 2020, 113 :2141-2166