Зміст
Добірка наукової літератури з теми "Réseaux ad hoc (informatique) – Protocoles de réseaux d'ordinateurs – Routage (informatique)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Réseaux ad hoc (informatique) – Protocoles de réseaux d'ordinateurs – Routage (informatique)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Дисертації з теми "Réseaux ad hoc (informatique) – Protocoles de réseaux d'ordinateurs – Routage (informatique)"
Xue, Xiaoyun. "Mécanismes de Sécurité pour des Protocoles de Routage des Réseaux ad hoc." Phd thesis, Paris, ENST, 2006. http://www.theses.fr/2006ENST0045.
Повний текст джерелаMobile Ad hoc Networks (MANETs) refer to mobile and wireless networks independent of any infrastructure. Some ad hoc scenarios are in a hostile environment. Moreover, due to numerous constraints such as the lack of infrastructure, the lack of a-priori trust relationship, resource-constrained nodes, mobility, etc. , the ad hoc routing is vulnerable to numerous attacks. In this dissertation, we first present a classification of ad hoc routing vulnerabilities using the attack tree analysis model. The main characteristic of this work is that we distinguish objectives and mechanisms of attacks. This distinction can help security defenders to easily notice which attacks should be prevented under which security objectives. We then focus on the propositions of new secure mechanisms for ad hoc routing protocols, and we also pay attention to limit the performance degradation caused by security mechanisms. First of all, we proposed a Secure Watchdog for Ad hoc Networks (SWAN) to ensure the authentication in supervision and to reduce the storage requirement of watchdog. Secondly, a Trust-based Routing Protocol (TRP) is proposed, which is a protocol based on source routing and a trust model. Thirdly, two security mechanisms for Optimized Link State Routing protocol (OLSR), respectively Hash Proved Link State (HPLS) and TC Securing (TCSec), are proposed to reinforce the security and to reduce the cryptography overhead required by an existing solution. Simulations show that our mechanisms are both robust and lightweight. The dissertation is ended with some guidelines for the design of a new ad hoc routing protocol secured from scratch
Le, Phu Hung. "Multipath routing protocol for ad hoc networks." Paris 6, 2012. http://www.theses.fr/2012PA066410.
Повний текст джерелаMobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes that move freely and self-configure without a preexisting communication infrastructure. In MANETs, under the arbitrary movement of nodes and highly dynamic topology conditions, the routing protocols for fixed networks do not perform well. To adapt to the rapid change of topology, many routing protocols have been proposed. However, most of them chose the minimum hop-count routes. This choice can lead to significant reduction of the network performance because communication quality via the chosen links is not good. Thus, the evaluation of link quality is indispensable and interference is a key factor to be considered. In the literature, most of the existing interference-aware protocols are single path and the consideration for interference range is limited. Several proposed interference-aware multi-path protocols for MANETs are either not highly efficient or have the computational complexity of NP-hard. To tackle the above problems, we first determine an interference region of each link including all nodes that can interfere with this link. Then, we propose a formula to evaluate the interference level of each link. Based on the formula of the link interference, we develop a series of interference-aware multi-path routing protocols for mobile ad hoc networks. These interference-aware multi-path routing protocols minimize the impact of interference on the paths from the source to the destination to increase the network performance. The computational complexity of the protocols is polynomial and each of them is most suitable for a type of network size. To demonstrate the efficiency of the interference-aware multi-path routing protocols, we compare them to prominent protocols in different network sizes and a high mobility environment when the RTS/CTS (Request-To-Send/Clear-To-Send) mechanism is alternatively turned on and turned off. The simulation results show that our protocols significantly improve packet delivery fraction, and reduce end-to-end delay, routing overhead, and normalized routing load. The RTS/CTS mechanism is to restrict the collision caused by the hidden terminals. However, we indicate that the RTS/CTS mechanism is not suitable for mobile ad hoc network based on the simulation results
Yi, Jiazi. "Protocole de routage à chemins multiples pour des réseaux ad hoc." Nantes, 2010. https://archive.bu.univ-nantes.fr/pollux/show/show?id=9185769b-0a52-4b31-b2e6-8ac0f7892430.
Повний текст джерелаAd hoc networks consist of a collection of wireless mobile nodes which dynamically exchange data without reliance on any fixed based station or a wired backbone network. They are by definition self-organized. The frequent topological changes make multi-hops routing a crucial issue for these networks. In this PhD thesis, we propose a multipath routing protocol named Multipath Optimized Link State Routing (MP-OLSR). It is a multipath extension of OLSR, and can be regarded as a hybrid routing scheme because it combines the proactive nature of topology sensing and reactive nature of multipath computation. The auxiliary functions as route recovery and loop detection are introduced to improve the performance of the network. The usage of queue length metric for link quality criteria is studied and the compatibility between single path and multipath routing is discussed to facilitate the deployment of the protocol. The simulations based on NS2 and Qualnet are performed in different scenarios. A testbed is also set up in the campus of Polytech’Nantes. The results from the simulator and testbed reveal that MP-OLSR is particularly suitable for mobile, large and dense networks with heavy network load thanks to its ability to distribute the traffic into different paths and effective auxiliary functions. The H. 264/SVC video service is applied to ad hoc networks with MP-OLSR. By exploiting the scalable characteristic of H. 264/SVC, we propose to use Priority Forward Error Correction coding based on Finite Radon Transform (FRT) to improve the received video quality. An evaluation framework called SVCEval is built to simulate the SVC video transmission over different kinds of networks in Qualnet. This second study highlights the interest of multiple path routing to improve quality of experience over self-organized networks
Burgod, Céline. "Contribution à la sécurisation du routage dans les réseaux ad hoc." Limoges, 2009. https://aurore.unilim.fr/theses/nxfile/default/e252c1c0-3541-48df-85fd-a4e7e7d12206/blobholder:0/2009LIMO4046.pdf.
Повний текст джерелаIn the scope of this thesis, we have focused on the security of the routing functions. Our approach consists on one hand in preventing attacks against the control messages, and on the other hand in providing a reliable support for the detection of malicious behaviors. To mitigate the limits of the existing approaches, we study the use of a tamper resistant hardware. We describe a control scheme, located between the data link layer and the network layer, allowing to accurately detect and locate corrupted entities with regards to the elementary operations required by any routing protocols. In the second part of this work, we propose a systematic security analysis for the OLSR (Optimized Link State Routing) routing protocol. Within our framework, we describe : (1) the various elements which define the OLSR protocol, (2) the possible attacks in the form of elementary illegal actions, then (3) the causal relationships between various illegal actions and the extent of disruptions. This representation allows to build a substantial reference base from which it is possible to compare several reinforced versions of OLSR
Adnane, Hassiba-Asmaa. "La confiance dans le routage ad hoc : étude du protocole OLSR." Rennes 1, 2008. https://tel.archives-ouvertes.fr/tel-00354194.
Повний текст джерелаThe implicit trust is always present in the operating protocols, in particular, between the entities involved in routing operations. In our work, we are interested by trust management as security solution for OLSR protocol. This approach fits particularly with characteristic of ad-hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities. First, we analyse the fonctionning of OLSR protocol under the terms of trust. Then, we propose a trust-based reasoning which allow to each node to evaluate the behavior of the other nodes, to detect misbehavior nodes, and then to be able to trust or not the other nodes. Finally, we propose a solutions of prevention and contermeasures to resolve the situations of inconsistency, and counter the malicious nodes. These solutions require only minor modifications on the OLSR and can be extended depending on the attack type and users needs
Bomgni, Alain Bertrand. "Qualité de services dans les protocoles de multicast géographique et de routage par permutation dans les réseaux de capteurs sans fil." Amiens, 2013. http://www.theses.fr/2013AMIE0100.
Повний текст джерелаA wireless sensors network (WSN for short) can be represented as a graph, tree, or other structures. The structure is more or less important depending on the problem that we will deal with and the respect of constraints on WSNs. In fact, in WSNs, security and economy of energy are two important and necessary aspects to consider. Particularly, security helps to ensure that such a network is not subject to attacks that involve reading, modification or destruction of information while economy of energy prolong the network life as the energy supply for sensor nodes is usually extremely limited, non-rechargeable and non-replaceable. In this work, we are interested in two problems : the permutation routing problem on multi-hop WSN and the problem of geocasting. A large variety of permutation routing protocols in a single-hop Network are known in the literature. Since they are single hop, there is always a wireless link connecting two nodes. One way to solve this problem in a multiple hop environment is to partition nodes into clusters, where a node in each cluster called clusterhead is responsible for the routing service. We first propose a hybrid clustering mechanism to perform permutation routing in multi-hop ad hoc Networks. Simulation results show that our algorithm performs better than the naive multiple gossiping. Next, we derive a new protocol that performs with less number of broadcast rounds compared to the one above. Finally, we present a protocol for permutation routing, which is secure, fault tolerant and energy-efficient. The proposed protocol is based on two main principles. First, the use of a heterogeneous hierarchical clustered structure to assign the most important roles to the sensors having the most energy, in order to ensure the protection and routing of data items. Second, the use of multiple processes based on this structure to ensure, regardless of network and sensors status, no data is lost and that a data item from a point A to a point B always arrives safety. In the other hand, Geocasting or Multi-Geocasting in wireless sensor network is the delivery of packets from a source (or sink) to all the nodes located in one or several geographic areas. The objectives of a geocasting (multi-geocasting) protocol are the guarantee of message delivery and low transmission cost. The existing protocols which guarantee delivery run on network in which each node has an ID beforhand. They either are valid only in dense networks or must derive a planar graph from the network topology. Hence the nodes may be adaptated in order to carry out huge operations to make the network planar. In our first solution which does not need node to have such capacity, we consider anonymous networks and derive geocast and multi-geocast algorithms that guarantee delivery and that need less gaps or obstacles and dense networks. In our second solution, we add energy-efficient issues. Effectively, we propose an energy-efficient geocast algorithm for wireless sensor networks with guaranteed delivery of packets from the sink to all nodes located in several geocast regions
Espès, David. "Protocoles de routage réactifs pour l'optimisation de bande passante et la garantie de délai dans les réseaux ad hoc mobiles." Toulouse 3, 2008. http://thesesups.ups-tlse.fr/423/.
Повний текст джерелаMobile ad-hoc networks (MANETs) are a specific king of wireless networks that can be quickly deployed without pre-existing infrastructures. They are used in different contexts such as collaborative, medical, military or embedded applications. However, MANETs rise new challenges when they are used to support multimedia or real time applications (e. G. , videoconference, VoIP, Video on Demand, etc) that require constraints on Quality of Service like the delay or the bandwidth. Indeed, these networks undergo drawbacks due to both the characteristics of the transmission medium (transmission medium sharing, low bandwidth, etc) and the routing protocols (information diffusion, path calculation, etc). The goal of our work is to optimize the bandwidth throughput in order to support multimedia and real time applications. Because MANETs are multihops, the impact of the routing protocols is crucial. Three axes have been investigated to increase the bandwidth in MANETs: reduction of the collisions, reduction of the routing information and guarantee of the bandwidth and the delay
Sondi, Obwang Patrick. "Le Routage à Qualité de Service dans les Réseaux Mobiles Ad Hoc." Phd thesis, Université de Valenciennes et du Hainaut-Cambresis, 2010. http://tel.archives-ouvertes.fr/tel-00551243.
Повний текст джерелаJerbi, Moez. "Protocoles pour les communications dans les réseaux de véhicules en environnement urbain : routage et geocast basés sur les intersections." Thesis, Evry-Val d'Essonne, 2008. http://www.theses.fr/2008EVRY0016/document.
Повний текст джерелаInter-Vehicle Communication (IVC) is attracting considerable attention from the research community and the automotive industry, where it is beneficial in providing Intelligent Transportation System (ITS) as well as assistant services for drivers and passengers. In this context, Vehicular Networks are emerging as a novel category of wireless networks, spontaneously formed between moving vehicles equipped with wireless interfaces that could have similar or different radio interface technologies, employing short-range to medium-range communication systems. The distinguished characteristics of vehicular networks such as high mobility, potentially large scale, and network partitioning introduce several challenges, which can greatly impact the future deployment of these networks. In this thesis, we focus on inter-vehicle communication in urban environments. Our main goal is to propose new routing and dissemination algorithms, which efficiently adapts to the vehicular networks characteristics and applications. Temporary disconnection in vehicular network is unavoidable. It is thereby of imminent practical interest to consider the vehicular traffic density. Therefore, at first, we propose a completely distributed and infrastructure–free mechanism for city road density estimation. Then, and based on such traffic information system, we propose a novel intersection-based geographical routing protocol, capable to find robust and optimal routes within urban environments. Finally, in order to help the efficient support of dissemination-based applications, a self-organizing mechanism to emulate a geo-localized virtual infrastructure is proposed, which can be deployed in intersections with an acceptable level of vehicular density. The advocated techniques are evaluated by a combination of network simulation and a microscopic vehicular traffic model
Faheem, Yasir. "Routage avec économie d'énergie dans les réseaux de capteurs sans fils." Paris 13, 2012. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_faheem.pdf.
Повний текст джерелаLimited battery power is one of the major stringent factors in deploying Wireless Sensor Networks (WSNs), in spite of their numerous applications both on small scale as inWireless Body Area Networks (WBANs) and on large scale as in agricultural and habitat monitoring. Especially, stationary sink based data gathering protocols for large scaleWSNs have limited network lifetime, because relay nodes around the sink quickly deplete their battery power due to high traffic loads, making the rest of the network unreachable to the sink. On the other hand, sink mobility improves network lifetime by distributing relay nodes’ energy consumption. However, mobile sink now has to periodically update the network about its changing position. This control traffic is non-negligible for low power, limited capacity sensors as it induces energy consumption problem. In this thesis, we are considering energy efficient routing protocols in the context of WBANs and large scale WSNs. Moreover, we also address multi-channel assignment algorithm with the aim of minimizing power consumption and increasing network throughput. In the first part of this thesis, a deep analysis of the energy consumption of one hop vs multi-hop communications in WBANs is performed. In fact, recent advances in technology has led to the development of small, intelligent, wearable sensors which are capable of remotely performing critical health monitoring tasks, and then transmitting patient’s data back to health care centers over wireless medium. But to the day, energy also remains to be a big constraint in enhancing WBAN lifetime [Net12]. Some recent literature on WBANs proposes deliberate use of multi-hops to transfer data from a sensor to the gateway via relay health sensors as more energy efficient than single hop communication. There are studies which argue contrarily. In this context, we have analyzed the single vs multi-hop energy consumption effect for real very short range sensor devices. In the second part of this thesis, two distributed energy-efficient sink location update algorithms are proposed for large scale mobile sink WSNs. First algorithm, named SN- MPR, uses a combination of multi-point relay broadcast and a local path repair mechanism by means of which sink’s location update packets are forwarded only to nodes which are affected by sink mobility; the rest of the network does not receive these update messages. Next, a duty-cycle aware multi-point relay based algorithm which is a modified version of the SN-MPR algorithm is proposed. It allows non-relay nodes to switch-off their radios when communication is not desired. Simulation results show that the two aforementioned algorithms minimize network’s power consumption without compromising data delivery efficiency. The final part of this thesis deals with traffic-aware channel assignment problem in IEEE 802. 15. 4 standard-based heterogeneous WSNs which have rather high traffic rate requirements than low-rate scalar WSN applications. In fact, traditional single channel communication suffers from interferences caused by concurrent transmissions in the same neighborhood. These parallel transmissions waste battery power as multiple retransmis- sions are required before a packet can be successfully delivered at the destination due to frequent collisions. Moreover, already limited network throughput of the single channel communication protocols is further degraded at higher traffic rates due to increased colli-sions and congestion. On the other hand, concurrent transmissions over multiple channels not only reduce power consumption as packet collisions are minimized or eliminated depend- ing upon the efficiency of the concerned channel assignment algorithm, but also offer better network throughput and data delivery delays. Modern WSN platforms like crossbow’s Mi-caZ nodes [Mot12] are equipped with single, half-duplex IEEE 802. 15. 4 standard-based radio which can operate over sixteen multiple channels. In order to make effective use of multiple channels, a number of channel assignment algorithms have been proposed recently for WSNs. However, they are suitable for rather low-rate homogeneous WSNs, and they consider fixed physical channel widths. These multi-channel assignments increase network throughput, but they may not be able to ensure QoS requirements of high bandwidth de- manding multimedia traffic, as in the case of heterogeneous WSNs. In order to address the energy issue and at the same time increase network capacity, we propose a distributive Traffic-Aware Bandwidth-Adaptive (TABA) channel selection algorithm which enables the nodes to not only choose interference free channels in the neighborhood, but also to adapt channel-width to increase/decrease throughput according to varying traffic conditions
Книги з теми "Réseaux ad hoc (informatique) – Protocoles de réseaux d'ordinateurs – Routage (informatique)"
Israel) IEEE INFOCOM (19th : 2000 : Tel Aviv. 2000 IEEE Infocom. IEEE Computer Society Press, 2000.
Знайти повний текст джерела