期刊文献+

一种基于信任评估的连通支配集生成算法

A connected dominating set algorithm based on trust evaluation
下载PDF
导出
摘要 针对无线自组织网络中存在的恶意节点攻击问题,提出一种基于信任评估的可信支配集改进算法。在构建连通支配集时利用推荐信任检测模型移除恶意支配节点,保留可信支配节点,通过添加合适的可信节点对于可信支配集的连通性进行维护,最后对可信连通支配集中的冗余支配节点进行缩减,得到最小可信连通支配集。仿真结果表明,改进算法可以有效避免恶意节点攻击对于连通支配集的影响,提升虚拟骨干网的可靠性与安全性。 An improved trusted dominating set algorithm based on trust evaluation is proposed in order to solve the problems of malicious node attacks in wireless ad hoc networks. The recommendation trust detection model is utilized to remove the malicious dominating nodes when constructing a connected dominating set, and to retain the trusted dominating nodes. Therefore then appropriate trusted nodes are added for dominating set nodes to ensure that the trusted dominating set is connected. Lastly, the redundant dominating nodes are reduced to obtain the smallest trusted connected dominating set. Simulation results show that the proposed algorithm can effectively avoid the impact caused by malicious nodes attacks for connected dominating set and improve the reliability and security of the virtual backbone network.
作者 黄庆东 曹丽霞 郭欢 袁润芝 卢茜 HUANG Qingdong;CAO Lixia;GUO Huan;YUAN Runzhi;LU Xi(School of Communication and Information Engineering, Xi'an University of Posts and Telecommunications, Xi'an 710121, China)
出处 《西安邮电大学学报》 2019年第1期31-35,40,共6页 Journal of Xi’an University of Posts and Telecommunications
基金 科技部重大专项资助项目(2017ZX03001012-005) 陕西省教育厅科学研究计划资助项目(17JK0693)
关键词 无线自组网 信任检测 间接信任 可信连通支配集 wireless ad hoc networks trust detection indirect trust trusted connected dominating set
  • 相关文献

参考文献5

二级参考文献34

  • 1唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 2熊志强,黄佳庆,刘威,杨宗凯.无线网络编码综述[J].计算机科学,2007,34(3):6-9. 被引量:23
  • 3耿素云.离散数学[M].北京:高等教育出版社,2000..
  • 4席德勋.离散数学教程[M].北京:科学出版社,..
  • 5Elizabeth,M Royer.A Review of Current Routin Protocols for Ad Hoc Mobile Wireless Networks[J].IEEE Personal Communication,1999; 4 (2):46.
  • 6Lidong Zhou,Zygmunt J.Haas,Securing Ad Hoc Networks[J].IEEE Networks,13 Nov/Dec 1999,24-29.
  • 7S.Marti,T.Giuli,K.Lai,and M.Baker,Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,In Proceedings of MobiCom 2000,Aug 2000,pp.255-265.
  • 8Y-C.Hu,A.Perrig,and D.B.Johnson,"Ariadne:A Secure On-Dernand Routing Protocol for Ad Hoc Networks",In Proceedings of Mobicom 2002,Sep 2002.
  • 9Watts D J.Collective Dynamics of Small World Networks[J].Nature,1998,393(6):440-442.
  • 10Josang A.Trust-Based decision making for electronic transactions.In:Proceedings of the 4th Nordic Workshop on Secure Computer Systems (NORDSEC'99).1999.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部