期刊文献+

一种高生存性的车载自组网可信路由协议 被引量:2

A Robust Model for Trusted Routing in VANETs
原文传递
导出
摘要 针对目前车载自组网中路由安全问题,提出一种基于经验信任的可信路由模型.该模型从客观信任的角度引入经验信任的概念作为可信度量的标准,并给出了计算节点经验信任值和信誉度的推荐方法,根据节点的经验信任值设计一种新的动态包转发规则,从而实现车载自组网的可信路由.实验结果表明,该模型较贪婪周边无状态路由(greedy perimeter stateless routing,GPSR)协议具有较高的抵抗自私节点的能力. In order to address the routing security problem of VANETs,a novel trusted routing protocol is proposed based on experienced trustiness.From the view of objective trust,a model introduces the concept of experienced trustiness as trust metrics.Also some recommendatory methods to calculate the experienced trustiness and reputation are given.And a new forwarding rule is designed according to experienced trustiness.The simulations show that the proposed trust scheme has better ability than GPSR(greedy perimeter stateless routing) protocol on accommodating selfish nodes.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2010年第2期189-193,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(60973136) 科技部国际科技合作与交流专项项目(2008DFA12140) 吉林省科技发展计划项目(20070708) 欧盟合作项目(155776-EM-1-2009-1-IT-ERAMUNDUS-ECW-L12)
关键词 车载自组网 经验信任值 可信路由 贪婪周边无状态路由 vehicular ad-hoc networks experienced trustiness trusted routing greedy perimeter stateless routing(GPSR)
  • 相关文献

参考文献3

二级参考文献66

共引文献223

同被引文献37

  • 1吴启武,刘青子.基于贝叶斯理论的VANET安全路由信任模型[J].四川大学学报(工程科学版),2015,47(2):129-135. 被引量:12
  • 2张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:33-35.
  • 3Johansson T, Carr-Motyckova, L. Bandwidth constrained clustering in ad hoc networks [C] //Proceedings of the 3th Annual Mediterranean Ad Hoc Networking Workshop. Piscataway: IEEE, 2004: 379-385.
  • 4Chattejek M, Das S, Turgut D, WCA: A weighted clus- tering algorithm for mobile ad hoc networks [J]. Cluster Computing, 2002 (5) :193-204.
  • 5Chen T, Mehani O, Boreli R. Trusted routing for VANETs [C] //Proceedings of the 9th International Con- ference on Intelligent Transport Systems Tele- communications. Piscataway: IEEE Computer Society, 2009 : 647-552.
  • 6Virendra M, Jadliwala M, Chandrasekaran M, et al. Quantifying trust in mobile ad-hoc networks[C]// Pro- ceedings of International Conference on Integration ofKnowledge Intensive Multi-Agent Systems. Piscataway: IEEE Computer Society, 2005 : 65-70.
  • 7Buchegger S, Le Boudec J Y. Performance analysis of the CONFIDANT protocol[C]//Proceedings of the Interna- tional Symposium on Mobile Ad Hoc Networking and Computing. New York: Association for Computing Ma- chinery, 2002: 226-236.
  • 8Coi J, Jtmg S. Asecurity framework with strong non- repudiation and privacy in VANETs[C]//Proceedings of the 6th IEEE Consumer Communications and Network- ing Conference. Piscataway: IEEE, 2009: 835-839.
  • 9Mejri M N, Ben -Othman J, Hamdi M. Survey on VANET security challenges and possible cryp- tographic solutions [ J ]. Vehicular Communica- tions, 2014, 1(2):53 -66.
  • 10Zeadally S, Hunt R, Chen Y S, et al. Vehicular ad hoe networks ( VANETS ) : status, results,and challenges [ J ]. Telecommunication Sys- tems, 2012, 50(4):217-241.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部