期刊文献+

一种基于半马尔可夫过程的匿名节点状态转移模型

An Anonymous Node State Transition Model Based on Semi-Markov Process
下载PDF
导出
摘要 为揭示MANET(Mobile Ad-hoc NETworks)匿名路由协议中节点不端行为及其抵御机制对节点协作性的影响,本文根据匿名节点状态转移的特点,提出了一种基于半马尔可夫过程的匿名节点状态转移模型.在该模型下,针对MANET匿名路由协议中节点能量消耗大和隐私保护要求高的特点,对节点状态极限概率进行了理论估计,给出了节点状态转移概率矩阵和转移期望时间矩阵的理论模型.最后,用实验分析了不同模型参数对节点状态极限概率的影响,验证了本文模型的有效性. To reveal the effect of node misbehaviors and defense mechanisms against them on the node cooperation in anonymous routing protocol for MANET(Mobile Ad-hoc NETworks),an anonymous node state transition model based on semi-Markov process is proposed on the features of anonymous node state transition.Under this model,according to the characteristics of large energy consumption and high demand for privacy protection of anonymous node,we give a theoretical estimation of the limiting probability of node states,and present a model of the node state transition probability matrix and transition time expectation matrix.An experimental analysis to the effect of different model parameters on the limiting probability of node states verifies the model's validity at last.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第5期1082-1086,共5页 Acta Electronica Sinica
关键词 移动自组织网 匿名路由协议 不端行为 建模 半马尔可夫过程 mobile ad-hoc networks(MANET) anonymous routing protocol misbehavior modeling semi-Markov process
  • 相关文献

参考文献10

  • 1J Kong,X Hong, et al. An Identity-free and On-demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Net- works [ J]. IEEE Transactions on Mobile Computing, 2007, 6 (8) :888 - 902.
  • 2E Schoch, F Kargl, et al. Impact of Pseudonym Changes on Geographic Routing in VANETs [ A] .In Proceedings of the Euro- pean Workshop on Security and Privacy in Ad hoc and Sensor Networks ( ESAS 2006) [C]. Hamburg: Springer-Verlag, 2006.43 - 57.
  • 3F Xing, W Wang. Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes [ A ]. In Proceedings of IEEE ICC 2006 [ C ]. New York:IEEE Press 2006, 1879 - 1884.
  • 4章洋,范植华,何晓新,徐帆江,王宇心.移动自组网络中多径路由的匿名安全[J].电子学报,2005,33(11):2022-2030. 被引量:14
  • 5Y Qin, D Huang, et al. OLAR: On-demand Lightweight Anonymous Routing in MANETs [A]. In Proceedings of the 4th International Conference on Mobile Computing and Ubiquitous Networking [ C]. Tokyo: IPSJ, 2008.72 - 79.
  • 6易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 7S M Ross. Stochastic Processes [ M ]. New York: John Wiley and Sons, 1983.
  • 8C Hartung, J Balasalle, et al. Node Compromise in Sensor Networks: the Need for Secure Systems, TR CU-CS-990-05 [ R ]. Boulder: University of Colorado at Boulder, 2005.
  • 9A Wander,N Gura,et al.Energy Analysis of Public-key Cryptography for Wireless Sensor Networks [ A ]. In Proceedings of third IEEE International Conference on Pervasive Computing and Communications [ C ]. New York: IEEE Press,2005. 324 - 328.
  • 10L Feeney,M Nilsson. Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment [ A]. In Proceedings of the 20th IEEE Conference on Computer Communications ( INFOCOM 2001 ) [ C ]. New York: IEEE Press, 2001. 1548 - 1557.

二级参考文献48

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 3Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.
  • 4Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283.
  • 5Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158.
  • 6Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003.
  • 7Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005.
  • 8P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002.
  • 9Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96.
  • 10L Buttyán,J -P Hubaux.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8(5):579-592.

共引文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部