期刊文献+

Ad Hoc网络基于能源熵的多路径安全路由协议

Energy entropy-based secure multipath routing protocol in Ad Hoc networks
下载PDF
导出
摘要 由于节点是随机移动的,且其电池容量有限,在无线Ad Hoc网络(自组织网络)中减少能源消耗以延长网络生存期、保证节点的安全性是研究多路径路由中的主要问题。文章分析了AODV(基于距离矢量单路径按需路由)协议和AOMDV(基于距离矢量多路径按需路由)协议的一些基本特点,在考虑安全网格定位服务的基础上,结合能源熵,提出了一种新的安全多路径路由协议-EEBSMRP。仿真计算结果表明,EEBSMRP在发现最小的节点能源消耗路由、平衡各个节点能源利用率、延长整个网络生存期以及安全性方面有较大的改进。 In view of node random movement and limited battery energy, decreasing energy penalty to prolong the network life- time and ensure node security are the main issues in the research on multipath routing in Ad Hoc networks. This paper analyzes the basic features of AODV and AOMDV protocols and proposes a novel secure multipath routing protocol, i.e. Energy Entropy-Based Secure Multipath Routing Protocol (EEBSMRP) in connection with netgrid and energy-entropy. Simulation resuits show that EEBSMRP achieves much advance in finding the routing with the minimum node energy penalty, balancing the node energy utilization rate, prolonging the network life time and improving its security.
出处 《光通信研究》 北大核心 2013年第1期50-52,56,共4页 Study on Optical Communications
基金 湖北省科技厅自然科学基金重点资助课题(2010CDB05600) 湖北省教育厅重点科研项目(D20121903)
关键词 多路径路由 安全协议 能源熵 multipath routing security protocol energy entropy
  • 相关文献

参考文献6

  • 1孙宝林;桂超;张棋飞.移动 Ad Hoc 网络路由技术研究[M]武汉:湖北长江出版集团,2008.
  • 2Gui Chao. An Entropy-based Multipath Routing Algo-rithm in Mobile AdHoc Networks[J].Journal of Computational Information System,2009,(05):1505-1510.
  • 3Perkins C E,Belding-Royer,Chakeres E M. Ad hoc On-Demand Distance Vector Routing (AODV)[EB/OL].http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-13.txt,2004.
  • 4Kawahigashi H,Terashima Y,Miyauchi N. A Pro-posal for a New Measure Analogous to Entropy for Bandwidth Constrained,Control-Based Ad-Hoc Net-work Design[A].Washington,DC,USA:IEEE,2006.1-7.
  • 5孙宝林;桂超;张棋飞.Ad Hoc 网络多路径需求路由及路径熵选择算法[J]软件学报,2008(增刊):112-120.
  • 6陈晶,崔国华,杨木祥,粟栗.一种Ad Hoc网络中安全的网格路由协议[J].计算机学报,2006,29(9):1648-1656. 被引量:10

二级参考文献13

  • 1Mauve M. , Widmer J. , Hartenstein H.. A survey on position based routing in mobile Ad Hoe networks. IEEE Network,Maihofer, 2001, 15(6) : 30-39
  • 2Zapata M. , Asokan N.. Securing Ad Hoc routing protocols.In: Proceedings of the ACM Workshop on Wireless Security(WiSe), Atlanta, GA, 2002, 1-10
  • 3Hu Y.-C. , Perrig A. , Johnson D. B.. Ariadne: a secure on demand routing protocol for Ad Hoc networks. In: Proceedings of the ACM Mobicom, Atlanta, 2002, 12-23
  • 4Hu Y. , Johnson D. , Perrig A.. SEAD: Secure efficient distance vector routing for mobile Ad Hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems Applications (WMCSA 2002), Calicoon, 2002, 3-13
  • 5Hu Y. C. , Perrig A. , Johnson D.B.. Packet leashes: A defense against wormhole attacks in wireless network. In: Proceedings of the IEEE INFOCOM, San Francisco, CA, 2003,1976-1986
  • 6Perrig A. , Canetti R. , Tygar J. D. , Song D.. The TESLA broadcast authentication protocol. RSA Laboratories: Crypto-Bytes Technical Newsletter, 2002, 5(2): 2-13
  • 7Karp B. , Kung H. T.. GPSR.. Greedy perimeter stateless rouring for wireless network. In: Proceedings of the ACM Mobicom, Boston, MA, 2000, 243-254
  • 8Jiang ZL, Jiang SX. Formal language and automata theory.Beijing: Tsinghua University Press, 2003
  • 9Buchegger S. , Boudec J-Y. L.. Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, 2002, 226-236
  • 10Buchegger S. , Le Boudec J-Y.. A robust reputation system for mobile Ad-Hoc networks. EPFL Technical Report No. IC/2003/50, EPFL-DI-ICA, Lausunne, Switzerland, 2003

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部