期刊文献+

基于狄利克雷分布的可信路由转发机制 被引量:2

Trusted Routing and Forwarding Mechanism Based on Dirichlet Distribution
原文传递
导出
摘要 机会移动社群网络易受到不良节点干扰而导致正常通信中断,现有研究方法普遍存在忽略不良行为差异性,为此,提出了基于狄利克雷分布的可信路由转发机制.利用消息传递过程判断节点的可信度,提出应对干扰的路由转发机制.实验结果表明,在受到不良节点干扰的条件下,该机制能够准确评估节点,同时在保持低传输成本的情况下,传输成功率比传统方法提高了5%~10%. The opportunistic mobile social network is vulnerable to the interruption of normal communication due to the interference of bad nodes.Existing research methods generally have the problem of neglecting the difference of bad behavior.The article proposes a trusted routing and forwarding mechanism based on Dirichlet distribution.Firstly,the message passing process is used to judge the credibility of the node,and then the routing and forwarding mechanism for dealing with interference is proposed.Experiment shows that the mechanism can accurately evaluate nodes under the condition of poor node interference,and the transmission success rate is 5%~10%higher than the traditional method while keeping the transmission cost low.
作者 杜聪 张喆 李温静 郭少勇 孟洛明 DU Cong;ZHANG Zhe;LI Wen-jing;GUO Shao-yong;MENG Luo-ming(State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China;State Grid Information and Telecommunication Group Company Limited,Beijing 102211,China)
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2020年第1期74-79,共6页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61702048) 国家电网有限公司总部科技项目“电力无线专网演进及4G、5G技术应用分析”(5700-201941235A-0-0-00).
关键词 狄利克雷分布 机会移动社群网络 可信路由 Dirichlet distribution opportunistic mobile social network trusted routing
  • 相关文献

参考文献2

二级参考文献34

  • 1陈曦,田有亮,李兴华,马建峰.Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks[J].China Communications,2011,8(4):132-140. 被引量:1
  • 2Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine, 2006, 44(11): 134-141.
  • 3Conti M, Giordano S, May M, et al. From oppor?tunistic networks to opportunistic computing. Communications Magazine, IEEE, 2010,48:126- 139.
  • 4Conti M, Kumar M. Opportunities in Opportu?nistic Computing. Computer, 2010, 43(1): 42-50.
  • 5Froding M, Johansson P, Larsson P. Wireless Ad hoc networking-the art of networking without a network[J]. Ericesson Review, 2000(4):248-262.
  • 6Fall K. A Delay-Tolerant network architecture for challenged Internets. Proceedings of the 2003 Conference on Applications, Technologies, Ar?chitectures, and Protocols for Computer Com?munications. New York: ACM Press, 2003:27- 34.
  • 7Zhang Z. Routing in intermittently connected mobile ad hoc networks and delay tolerant net?works: overview and challenges. IEEE Commu?nications Surveys & Tutorials, 2006, 8(1): 24-37.
  • 8Allen S.M, Conti M, Crowcroft J, et at. Social Networking for Pervasive Adaptation. Proceed?ings of the Second IEEE International Confer?ence on Self-Adaptive and Self-Organizing Sys?tems Workshops (SASOW). Piscataway NJ: IEEE Press, 2008:49-54.
  • 9Scott J, Hui P, Crowcroft J, et al. Haggle: A net?working architecture designed around mobile users. Proceedings of the Third Annual IFIP Conference on Wireless On-Demand Network Systems and Services (WONS), 2006.
  • 10Seth A, Keshav S. Practical security for discon?nected nodes. Proceedings of the First Work?shop on Secure Network Protocols. Piscataway NJ: IEEE Press, 2005, 31-36.

共引文献13

同被引文献29

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部