期刊文献+

无线多跳网络中基于声誉机制的可靠组播协议

Reliable multicast protocol based on reputation mechanism in wireless multi-hop networks
下载PDF
导出
摘要 为了提高无线多跳网络中组播树的可靠性和提高组播效率,提出了一种基于声誉机制的组播协议.该协议在构建组播树时考虑了节点的声誉值,从而将自私性节点排除在组播树之外,使得构建的组播路径比较可靠.仿真实验表明该协议可以用较低的代价有效地提高组播效率. To improve the reliability of the multicast tree and the efficiency of multicast,a multicast protocol based on reputation mechanism was proposed.The protocol took into account reputation value of the nodes in constructing the multicast tree,thus excluding the selfish nodes from it,making the multicast path comparably reliable.Simulation results show that proposed protocol can significantly improving the efficiency of multicast at a lower cost.
作者 许力 蒋佳铭
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2011年第10期928-934,共7页 JUSTC
基金 国家自然科学基金(61072080) 福建省自然科学基金(2008J0014) 福建省高校产学合作科技重大项目(2011H6008)资助
关键词 无线多跳网络 组播 声誉机制 可靠路由 生成树 wireless multi-hop network multicast reputation mechanism reliable route spanning tree
  • 相关文献

参考文献11

  • 1Marti S, Giuli T J, Lai K, et al. Mitigating routing misbehavior in mobile Ad-Hoc networks [C]// Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. New York:ACM, 2000: 255-265.
  • 2Wang Y W, Singhal M. On improving the efficiency of truthful routing in MANETs with selfish nodes[J]. Pervasive and Mobile Computing, 2007, 3 ( 5 ): 537-559.
  • 3Eidenbenz S, Resta G, Santi P. The COMMIT protocol for truthful and cost0-efficient routing in Ad hoc networks with selfish nodes [J]. IEEE Transactions on Mobile Computing, 2008, 7 (1): 19-33.
  • 4Buchegger S, Mundinger J, Le Boudec J Y. Reputationsystems for self-organized networks [J ]. IEEE Technology and Society Magazine, 2008, 27 ( 1 ): 41-47.
  • 5Liu Yining, Li Keqiu, Jin Yingwei, et al. A novel reputation computation model based on subjective logic for mobile ad hoe networks [J]. Future Generation Computer Systems, 2011, 27 : 547-554.
  • 6张依惠,许力,沈金波.基于流言机制的Ad Hoc网络声誉传播与收敛[J].福建师范大学学报(自然科学版),2009,25(2):28-31. 被引量:1
  • 7Buehegger S, Le Boudec J Y. A reputation system for P2P and mobile Ad-hoc networks[C]//Proceedings of P2PEcon 2004.Cambridge.- Harvard University, 2004.
  • 8Xu li, Zhang Yihui. New reputation-based trust management strategy for clustered Ad Hoc networks [C] // Proceeding of the International Conference on Networks Security, Wireless Communications and Trusted Computing. Washington,DC: IEEE Computer Soc, 2009: 116-119.
  • 9Cayirci E, Nguyen S T, Rong C. Secure many to many routing for wireless sensor and actuator networks[C]// Proceedings of the 2nd International Conference on Security of Information and Networks. New York: ACM, 2009: 172-178.
  • 10Wu S, Candan K S. GMP: Distributed geographie multicast routing in wireless sensor networks [C]// Proceedings of the 26th IEEE International Conference on Distributed computing Systems. Washington, DC: IEEE Computer Society, 2006:49.

二级参考文献18

  • 1Ettus. M System Capacity, Latency, and Power Consumption in Multihop-Routed SS-CDMA Wireless Networks[C]//Radio and Wireless Conference. Colorado, 1998, 55-58.
  • 2Ahmed D T, Shirmohammadi S. Architectural Analysis of Multicast Routing Protocols for Wireless Ad Hoc Networks [C]// Proceedings of the Sixth International Conference on Networking (ICN'07), 2007.
  • 3Shibo Wu, Selcuk. K. Distributed Geographic Multicast Routing in Wireless Sensor Networks[C]// Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)0-7695-2540-7/06 C 2006 IEEE.
  • 4Wu C, Tay Y. Ad Hoc Multicast Routing Protocol Utilizing Increasing Id-Numbers(AMRIS) Functional Specification[M]. Internet drift, 1998.
  • 5Ji L, Scott M. A Lightweight Adaptive Multicast Algorithm [R]. GLOBECOM 1998, 1998: 10361042.
  • 6Xiong X, Nguyen U T, Nguyen H L. Preemptive Multieast Routing in Mobile Ad-Hoc Networks[C]//Proceedings of ICNICONSMCL' 06, 2006.
  • 7Hwang R, Richards D. The Steiner Tree Problem[J]. Annals of Discrete Mathematics, 53, 1992.
  • 8Ram Ramanathan, Jason Redi. A brief overview of Ad Hoc networks: challenges and directions [J]. IEEE Communications Magazine, 2002, 40 (5): 20-22.
  • 9Hubaux J, Buttyan L, Capkun S. The quest for security in mobile Ad Hoc networks [C] //MobiHoc 2001. New York: ACMPress, 2001: 146-155.
  • 10Wang F, Brian Vetter, Wu S. Secure routing protocols: theory and practice [J]. Technical Report, 1997, 5: 7.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部