期刊文献+

Ad hoc网络中基于多径路由协议的信誉机制 被引量:3

Reputation mechanism based on multi-path routing protocol in ad hoc networks
下载PDF
导出
摘要 基于多径路由协议,采用RS编码技术,设计了一种将数据信息编码后分片沿不同路径传输的方法,在目的节点对恶意篡改行为进行检测,确定恶意节点的具体位置或将恶意节点锁定在恶意节点组内。在此基础上提出了一个完整的抵制篡改数据攻击的信誉机制,充分利用了从数据传输和恶意节点检测过程中获得的信息,采用简单贝叶斯模型方法,对节点进行信誉评价,引入了恶意节点组的概念。数据在正常传输过程中无需重复加密和签名。实验表明,该信誉机制能够有机地与多径路由协议相结合,快速准确地孤立篡改数据的恶意节点。 Based on the multi-routing protocols and the reed-solomon error-correcting coding scheme, a data transmission method was presented, in which, round-encryption and round-signature were not needed. Data packets were all encoded by RS codes and cut into pieces before sending in different paths. After receive all the pieces of a data packet, the destination node could judge whether a malicious modification had been occurred, if so, the malicious node would be found out or be located in a malicious-node-group by a detecting process. Then by fully using the information gotten from detecting process, a reputation mechanism was proposed to resist the modification attacks. When implement it, the Bayesian approach was used to evaluate a node's reputation. The simulation results show that it can react to the attacks more quickly and accurately.
出处 《通信学报》 EI CSCD 北大核心 2008年第5期56-64,共9页 Journal on Communications
基金 国家自然科学基金资助项目(60403027)~~
关键词 AD HOC网络 信誉机制 内部攻击 恶意节点组 ad hoc networks reputation mechanism internal attacks malicious-node-group
  • 相关文献

参考文献18

  • 1HU Y, PERRIG A, JOHNSON D. Ariadne: a secure on dmand routing protocol for ad hoc networks[A]. Proc of ACM Mobicom[C]. Atlanta, GA, 2002.21-38.
  • 2HU Y, JOHNSON D, PERRIG A. SEAD: secure efficient distance vector routing for mobile ad hoc networks[A]. Proc of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002)[C]. 2002.175-192.
  • 3DAHILL B, LEVINE B N, ROYER E, et al. ARAN: A Secure Routing Protocol for Ad Hoc Networks[R]. Umass Tech, 2002.2-32.
  • 4SANZGIRI K, DAHILL B, LEVINE B N. A secure routing protocol for ad hoc networks[A]. The 10th IEEE Intl Conf on Network Protocols (ICNP02)[C]. 2002.78-87.
  • 5CHEUNG S, LEVITT K. Protecting routing infrastructures from denial of service using cooperative intrusion detection[A]. Workshop on New Security Paradigms[C]. 1997.94-106.
  • 6AWERBUCH B, HOLMER D, NITA-ROTARU C. An ondemand secure routing protocol resilient to byzantine failures[A]. ACM Workshop on Wireless Security (WiSe)[C]. 2002.21-30.
  • 7GOODRICH M T. Efficient and secure network routing algorithms[EB/OL], http://www.cs.jhu.edu/goodrich/cgc/pubs/routing.pdf, Provisional patent filing, 2001.
  • 8BUTrYAN L, HUBAUX J P. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks[R]. Technical Report DSC/2001/046, EPFLDIICA, 2001.597-592.
  • 9BUCHEGGER S, BOUDEC J L. Performance analysis of the CONFIDANT protocol: cooperation of nodes fairness in dynamic ad hoc networks[A]. Proc of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)[C]. Lausanne, 2002. 222-236.
  • 10BUCHEGGER S, BOUDEC J L. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks[A]. Proc of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing[C]. Canary Islands, Spain, 2002. 403-410.

同被引文献26

  • 1唐勇,周明天,张欣.无线传感器网络路由协议研究进展[J].软件学报,2006,17(3):410-421. 被引量:201
  • 2Lindsey S, Raghavendra C S. Pegasis. Power-efficient gathering in sensor information systems [ C ]//Proc of the IEEE Aerospace Conf, Montana:IEEE Aerospace and Electronic Systems Society, 2002:1125 -1130.
  • 3Shah R C,Rabaey J M. Energy aware routing for low energy Ad-Hoc sensor networks[ C]//Proc of the IEEE Wireless Communications and Networking Conference ,2002:17 -21.
  • 4Intanagonwiwat C, Govindan R, Estrind, et al. Directed diffusion for wireless sensor networking [ J ]. IEEE/ACM Trans on Networking,2003,11 ( 1 ) :2 -16.
  • 5Braginsky D, Estrin D. Rumor routing algorithm for sensor networks[C]//Proc of the 1st Workshop on Sensor Networks and Applications, Atlanta: ACM Press ,2002:22 -31.
  • 6Yu Y, Estrin D, Govindan R. Geographical and energy-aware routing: A recursive data dissemination protocol for wireless sensor networks[ R]. Los Angeles : UCLA Computer Science Department Technical Report,2001.
  • 7Kapp B, Kung H T. GPSR : Greedy perimeter stateless routing for wireless networks[ C ]//Proc of the 6th Annual Int'l Conf on Mobile Computing and Networking,Boston :ACM Press,2000:243 -254.
  • 8Heinzelman W R,Chandrakasan A,Balakrishnan H. Energy-efficient communication protocol for wireless micro sensor networks[ C]//Proc of the 33rd Annual Hawaii Int'l Conf on System Sciences. Maui : IEEE Computer Society,2000:3005 -3014.
  • 9Manjeshwar A, Agrawal D P. TEEN:A protocol for enhanced efficiency in wireless sensor networks [ C ]//Int'l Proc of the 15th Parallel and Distributed Processing Syrup, San Francisco: IEEE Computer Society ,2001:2009 -2015.
  • 10Cho J, Kwon K, Park Y. Q-rater: A collaborative reputation system based on source credibility theory [ J ]. Expert Systems with Application,2009,36 (2) :3751-3760.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部