期刊文献+

基于快速移动节点的Ad hoc网络可信度模型及可信路由协议 被引量:1

Research on fasting-moving node assisted trust model and routing protocol in mobile Ad hoc networks
下载PDF
导出
摘要 由于目前广泛应用的路由协议大都是假设网络中的节点是可以信任和相互协作的,对于安全的问题考虑不多,而网络中某些节点很容易被俘获而成为恶意节点,使得现有的路由协议变得十分脆弱,针对这一问题,提出了基于快速移动节点的可信度模型FATM,以及基于快速移动节点的可信路由协议FARP,通过网络中的快速移动节点辅助一般节点进行可信度的计算和更新,并在可信模型建立之后选择可信度较高的路由进行通信。最后采用OPNET对FATM模型进行了仿真,仿真结果表明基于快速移动节点的可信度模型的安全性更高,并且节省了一般节点的能量和空间开销,具有较好的网络适应性及可扩展性。 Current widely used routing protocols mostly assume the nodes in the network are cooperative and trustful, however, some nodes can easily be captured and become malicious node, making the routing protocols become weak, to design a secure routing protocol has become a serious problem. To solve this problem, This paper presents the reliability of FATM model based on fast moving nodes, and FARP based on trusted routing protocol, calculating and updating aided general node credibility by fast moving nodes in the network, and choosing high reliability communication routing after trusted model. Finally, OPNET is used in the simulation of the FATM model, the simulation results show that the security of the trust model based on fast moving nodes and trusted routing is higher, and saves energy and space than that on general nodes, and has better network adaptability and scalability.
作者 冉崇善 车育
出处 《西北大学学报(自然科学版)》 CAS CSCD 北大核心 2015年第2期213-217,共5页 Journal of Northwest University(Natural Science Edition)
基金 国家自然科学基金青年科学基金资助项目(61202019)
关键词 自组织网络 可信度模型 可信路由协议 快速移动节点 Ad hoc trust model trust protocol fast-moving nodes
  • 相关文献

参考文献11

  • 1BROWN K, VAIDYA H. Location-aided routing (LAR) in mobile Ad hoc networks [ C 1 //Dallas : Proceeding 4th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom' 98), 1998:66-75.
  • 2BUCHEGGER S, MOLVA R. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoe networks [ C ]//Los Angeles: 10th Eu- romicro Workshop on Parallel, Distributed and Net- work-based Processing, 2002.
  • 3PAPADIMITRATOS P, HAAS Z. Secure muting for mobile Ad hoc networks [ C ]//San Antonio : Proceed- ings of the SCS communication Networks and Distrib- uted Systems Modeling and Simulation Conference, 2002 : 27-31.
  • 4GROSSGLAUSER M, HALL D. Mobility increases the capacity of ad hoe wireless networks [ J ]. IEEE/ ACM Transactions on Networking, August 2002, 10 (4) :477-486.
  • 5LEINER M, ROBERT R, SASTRY R. Goals and challenges of the DARPA gloMo program[J]. IEEE Personal Communications, 1996,3(6) :34-43.
  • 6宋雪昌,陆建德.基于组群的P2P系统中的信誉机制[J].微机发展,2005,15(11):11-13. 被引量:2
  • 7SERGIO M, GIULI J. Mitigating routing misbehavior in mobile Ad hoc networks [ C ]//Boston: Proceed- ings of 6th International Conference on Mobile Com- puting and Networking ( MobiCom ), 2000 : 145- 149.
  • 8DAVID L. Transmission range control in multihop packet radio networks, communications [ J ]. IEEE Transactions on Communications, Jan 1986, 34( 1 ) : 38-44.
  • 9KEVIN L. E-learning markets and providers, some is- sues and prospects[ J]. Education Training,2001,43 (4) :233-239.
  • 10LEBRON H. Transmission range control in muhihop packet radio networks, communications [ J ]. IEEE Transactions on Communications, 1996, 34( 1 ) :38- 44.

二级参考文献5

  • 1FlennerR AbbottM 高岭译.JavaP2P Unleashed[M].北京:人民邮电出版社,2003..
  • 2Teufel S. Security Management in Computer Supported Collaborative Work[R]. Zurich: Institute of Informatics, University of Zurich, 1994.
  • 3Damiani. A Reputation - Based Approach for Choosing Reliable Resources in Peer- to- Peer Networks[A]. Proceedings of the 9th ACM conference on Computer and communications security[ C]. Washington: [ s. n. ], 2002.
  • 4Kamvar, Scholsser, Garcia-Molina. EigenRep: Reputation Management in P2P Networks[ EB/OL]. http:∥www2003.org/cdrom/papers/refereed/p446/p446 - kamvar/,2003.
  • 5Gupta R. A Survey of Security Issue and Protocols in Peerto- Peer Networks[D]. [s. l. ] :University of Gatech, 2003.

共引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部