期刊文献+

移动自组织网基于声誉值的分级转发机制

Classified Forwarding Mechanism Based On Reputation Mechanismsin Ad Hoc Networks
下载PDF
导出
摘要 到目前为止,已经有很多将优先级策略引入到移动自组织网中的机制的研究中,但是与声誉值没有联系。本文在前人研究的基础上,提出了基于声誉值的分级转发机制,通过向声誉值高的节点提供更好的服务,进一步促进节点的协作性。 So far some priority strategies have been introduced in the Ad hoc network, but no relationship with the reputation. In this thesis, Classified Forwarding ~echanism based on the reputation ratings has been proposed in order to further stimulate collaborative nodes that have the potentiality to participate in packet forwarding.
作者 周子楠
出处 《电子测试》 2013年第9期80-81,49,共3页 Electronic Test
关键词 移动自组织网 自私节点 分级转发机制 Ad hoc network selfish nodes classified forwarding mechanism
  • 相关文献

参考文献3

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2X. Yang, and N.H. Vaidya. Priority scheduling in wireless ad hoc networks. In Proc. Of theInternational Symposium on Mobile Ad Hoc Networking & Computing.
  • 3The Vint Project. The ns-2 network simulator, http://www, isi. edu/nanam/ns.

二级参考文献35

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 3Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.
  • 4Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283.
  • 5Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158.
  • 6Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003.
  • 7Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005.
  • 8P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002.
  • 9Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96.
  • 10L Buttyán,J -P Hubaux.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8(5):579-592.

共引文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部