期刊文献+

基于优化信任评估的Ad Hoc安全路由协议 被引量:3

Secure routing protocol based on optimized trust evaluation in Ad Hoc network
下载PDF
导出
摘要 针对Ad Hoc网络中自私节点造成的攻击问题,提出了一种基于信任评估的Ad Hoc安全路由协议TEAR。该协议在节点行为信任评估方案的基础上,通过使用链路信任值和路径信任值表示节点和路径的可信度,同时,在链路信任值计算时,引入了基于公共邻居节点的间接信任评估方法和可变时间窗机制,保证了信任值计算的准确性和实效性;协议中每个节点维护一张信任表,并重新定义了路由请求和路由回复消息格式,实现了安全路径的快速选择。使用NS2进行模拟验证,又与AODV以及基于固定时间窗信任评估的安全路由协议TA-AODV进行性能对比。结果表明,改进的信任评估方案具有更好的性能,采用该方案的安全路由协议能较快地发现自私节点,并准确选择安全路径,提高了Ad Hoc网络性能。 Aimed at the attack of selfish nodes in mobile Ad Hoc networks, this paper proposes a secure routing protocol TEAR, which is based on trust evaluation. In order to realize the accuracy and timeliness of trust values, the proposed protocol, which is based on the trust evaluation scheme of node behavior, uses the link trust and path trust to represent the reliability of a node and a path respectively, and introduces the indi- rect trust evaluation scheme with public neighbors' trust values and variable time window. The trust value ta- ble of each node and the new structure of RREQ and RREP provide the quick selection of secure routing. Fi- nally, TEAR protocol was verified by NS2 simulation and compared with AODV and TA-AODV which is based on fixed time window trust evaluation. The simulation results show that the improved trust evaluation scheme has a superior performance, and TEAR can not only detect the selfish nodes correctly but also select secure path, which improves the function of Ad Hoc networks.
出处 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2016年第11期2524-2531,共8页 Journal of Beijing University of Aeronautics and Astronautics
基金 国家自然科学基金(61402517) 中航工业集团预研基金(619010601)~~
关键词 Ad HOC网络 自私节点 安全路由 信任评估 可变时间窗 节点行为 Ad Hoc network selfish nodes secure routing trust evaluation variable time window node behavior
  • 相关文献

参考文献1

二级参考文献16

  • 1于枫,王敏,高翔.数值型关联规则挖掘在网络入侵检测系统中的应用研究[J].计算机应用与软件,2006,23(11):52-53. 被引量:3
  • 2Papadimitratos P,Haas Z J.Secure routing for mobile Ad Hoc networks//Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference(CNDS 2002).2002:1-13.
  • 3Sanzgiri K,Dahill B,Levine B N et al.A secure routing protocol for ad hoc networks//Proceedings of the 10th IEEE International Conference on Network Protocols.Paris,France,2002:78-87.
  • 4Hu Y C,Perrig A,Johnson D B.Ariadne:A secure ondemand routing protocol for Ad Hoc networks//Proceedings of the 8th Annual International Conference Mobile Computing and Networking(MobiCom2002).Atlanta,GA,United States,2002:12-23.
  • 5Hu Y-C,Johnson D B,Perrig A.SEAD:Secure efficient distance vector routing in mobile wireless Ad Hoc networks//Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 02).Callicoon,NY,2002:3-13.
  • 6Hong Fan,Hong Liang,Fu Cai.Secure OLSR//Shih T K,Shibata Y eds.Proceedings of the 19th International Conference on Advanced Information Networking and Applications.Taipei,China,2005,2(1):713-718.
  • 7Marti S et al.Mitigating routing misbehavior in mobile Ad Hoc networks//Proceedings of the 6th Annual International Conference Mobile Computing and Networking (MobiCom 2000).Boston,MA,USA,2000:255-265.
  • 8Kong Jiejun,Zerfos Petros,Luo Hauyun et al.Providing robust and ubiquitous security support for mobile Ad-Hoc networks//Proceedings of the 2001 International Conference on Network Protocols ICNP.Riverside,CA,2001:251-260.
  • 9Zhou L,Hass Z J.Securing Ad Hoc networks.IEEE Network,1999,13(6):24-30.
  • 10Srdjan Capkun,Levente Buttyan.Self-organized public-key management for mobile ad hoc networks.IEEE Transactions on Mobile Computing,2003,2(1):52-64.

共引文献6

同被引文献25

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部