期刊文献+

基于可靠骨干网的Ad Hoc网络安全路由协议 被引量:1

Secure Routing Protocol Based on Reliable Backbone in Ad Hoc Networks
下载PDF
导出
摘要 针对Ad Hoc组网的安全路由协议设计问题,提出一种基于可靠骨干网的Ad Hoc网络安全路由协议。引入信任评估机制对网络节点进行评估,依据评估结果选取可信节点作为网络骨干节点,同时将低于信任阈值的恶意节点进行隔离,以骨干节点为簇头对网络进行安全分簇,簇头节点及簇内成员节点间构成可靠骨干网,基于可靠骨干网进行安全路由协议的设计。仿真实验表明,与AODV等路由协议相比,本协议在满足安全性的同时能达到更优的网络性能。 In order to get the secure routing in Ad Hoc networks,based on the reliable backbone networks,a secure routing protocol was proposed. The trust evaluation mechanism was introduced to select the trust backbone nodes,the behavior of the node was evaluated and the malicious nodes was isolated from the network. Then the network was clustered by backbone nodes which act as the cluster head nodes. The reliable backbone network was established by cluster head nodes and cluster member nodes. At last,the secure routing protocol was established based on the reliable backbone network. Simulation results showed that the proposed secure routing protocol can improve the network performance significantly even under attacking when compared with other typical routing protocols.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2016年第2期111-117,共7页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(U1135002 61202390 61202389 61173135 61100230 61100233) 信息保障重点实验室开放课题资助项目(KJ-14-109) 中国民航大学信息安全测评中心开放基金课题资助项目(CAAC-ISECCA-201401)
关键词 AD HOC网络 网络安全 信任 路由协议 Ad Hoc networks network security trust routing protocol
  • 相关文献

参考文献3

二级参考文献15

  • 1时锐,刘宏伟,董剑,杨孝宗.自组网容错拓扑控制的研究[J].电子学报,2005,33(11):1978-1982. 被引量:7
  • 2毛莺池,冯国富,陈力军,陈道蓄.与位置无关的无线传感器网络连通性覆盖协议[J].软件学报,2007,18(7):1672-1684. 被引量:18
  • 3Gaurav Srivastava,Paul Boustead,Joe Chicharo.A comparison of topology control algorithms for ad-hoc networks[A].Australian Telecommunications Networks Applications Conference[C].Melbourne,Australia:ATNAC,2003.ISBN:0-646-42229-4.
  • 4K Alzoubi,X Y Li,Y Wang,et al.Geometric spanners for wireless ad hoc networks[J].IEEE Trans Parallel and Distributed Systems,2003,14(5):408-421.
  • 5Yu Wang,WeiZhao Wang,Xiang-Yang Li.Distributed low-cost weighted backbone formation for wireless ad hoc networks[A].Proc of ACM MobiHoc05[C].Urbana-Champaign,IL:ACM press,2005.2-13.
  • 6Sergiy Butenko,Xiuzhen Cheng,Ding-Zhu Du,Panos M Pardalos.On the construction of virtual backbone for ad hoc wireless networks,in S.Butenko et al.(eds.)Cooperative Control:Models,Applications and Algorithms[M].Kluwer Academic Publishers,2003.volume 1 of Cooperative Systems,chapter 3.43-54.
  • 7F Dai,J Wu.An extended localized algorithm for connected dominating set formation in ad hoc wireless networks[J].IEEE Trans Parallel and Distributed Systems,2004,15(10):908-920.
  • 8Haitao Liu,Rajiv Gupta.Selective backbone construction for topology control in ad hoc networks[A].Proc of 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems[C].Florida:IEEE press,2004.41-50.
  • 9Basagni S,Mastrogiovanni M,Petrioli C.A performance comparison of protocols for clustering and backbone formation in large scale ad hoc networks[A].Proc of 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems[C].Florida:IEEE press,2004.70-79.
  • 10UCLA Parallel Computing Laboratory and Wireless Adaptive Mobility Laboratory.GloMoSim:A Scalable Simulation Environment for Wireless and Wired Network Systems[EB/OL].http://pcl.cs.ucla.edu/projects/glomosim/,2001-02-07.

共引文献20

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部