A classification approach to broadcasting in a mobile ad hoc network

被引:0
作者
Colagrosso, MD [1 ]
机构
[1] Colorado Sch Mines, Dept Math & Comp Sci, Golden, CO 80401 USA
来源
ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5 | 2005年
关键词
mobile ad hoc network; broadcast protocol; machine learning;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present a new broadcast protocol using Bayesian probabilistic classifiers, and we demonstrate its use in a mobile ad hoe network (MANET). Broadcasting functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by MANET applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, every protocol fails catastrophically in severe network environments. We exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN) builds a classifier and trains it on data collected from the network environment. Given an input vector describing a broadcast packet and current network conditions, the classifier returns an output label of "Rebroadcast" or "Drop:" Because each MN adapts to changing network conditions, the result is a more robust communication protocol and more efficient use of network resources. We show that our protocol, compared to those tested, is the most efficient under a range of network conditions.
引用
收藏
页码:1112 / 1117
页数:6
相关论文
共 50 条
[41]   A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network [J].
Vatambeti, Ramesh .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) :2141-2166
[42]   A Novel Clustering Algorithm based on GPS of the Mobile Ad Hoc Network [J].
Liu Jiancai ;
Hai Xiao .
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, :2973-2976
[43]   A network-layer security solution for mobile Ad hoc networks [J].
Pan, Jun ;
Li, Jianhua .
WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, :311-314
[44]   Hardware in Loop Simulation for Emergency Communication Mobile Ad Hoc Network [J].
杨杰 ;
安建平 ;
刘珩 .
Journal of Beijing Institute of Technology, 2007, (04) :476-480
[45]   Wi-Fi Direct Based Mobile Ad hoc Network [J].
Lee, Jae Hyeck ;
Park, Myong-Soon ;
Shah, Sayed Chhattan .
2017 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS2017), 2017, :116-120
[46]   The Research on the Factors Affecting Network Bandwidth in Mobile Ad Hoc Networks [J].
Wu Da-peng ;
Wang Ru-yan ;
Huang Sheng .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[47]   A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority [J].
Seyed Amin Hosseini Seno ;
Rahmat Budiarto ;
Tat-Chee Wan .
Arabian Journal for Science and Engineering, 2011, 36 :245-257
[48]   Analysis and countermeasure of selfish node problem in mobile ad hoc network [J].
Xu, Li ;
Lin, Zhiwei ;
Ye, Ayong .
2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, :1027-1030
[49]   Cluster Heads Considering Relay Node in Mobile Ad Hoc Network [J].
Sumalatha, M. R. ;
Diwan, B. .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES INDIA SECTION A-PHYSICAL SCIENCES, 2015, 85 (02) :227-234
[50]   Cluster Heads Considering Relay Node in Mobile Ad Hoc Network [J].
M. R. Sumalatha ;
B. Diwan .
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 2015, 85 :227-234