期刊文献+

基于区块链技术的机会网络安全性研究 被引量:3

Research on opportunity network security based on block-chain technology
下载PDF
导出
摘要 机会网络由于具有间歇式连接、多跳转发等特点,很容易遭受恶意攻击。文章提出一种基于区块链技术的节点身份识别方案,可以检测出破坏网络的恶意节点,在此基础上改进了Epidemic路由,在提高消息投递率的同时,降低了网络开销和平均延迟。通过仿真实验,证实了该方案可以有效地防范各种恶意攻击,在消息投递率、平均延迟、网络开销以及恶意节点检测率等方面均优于传统方案。 Opportunity network is vulnerable to malicious attack because of its intermittent connection,multi-hop forwarding and so on.In this paper,a node identification scheme based on block chain technology is proposed,which can detect malicious nodes in broken ring networks.On this basis,the Epidemic routing is improved,which not only improves the message delivery rate,but also reduces the network overhead and average delay.The simulation results show that the scheme can effectively prevent all kinds of malicious attacks,and it is superior to the traditional scheme in message delivery rate,average delay,network overhead and malicious node detection rate.
作者 马维刚 Ma Weigang(School of Computer Science and Technology,Wuhan University of Technology,Wuhan 430063,China)
出处 《无线互联科技》 2019年第24期132-136,共5页 Wireless Internet Technology
基金 国家级大学生创新创业训练计划资助项目 项目编号:201910497147
关键词 机会网络 区块链 恶意攻击 身份识别 路由优化 opportunistic networks block-chain malicious attacks identity routing optimization
  • 相关文献

参考文献4

二级参考文献100

  • 1王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:234
  • 2方凯彬,闫巍.移动互联网应用代码安全测试方法的使用[J].中国检验检疫,2013(11):31-32. 被引量:2
  • 3王飞跃.计算实验方法与复杂系统行为分析和决策评估[J].系统仿真学报,2004,16(5):893-897. 被引量:147
  • 4王飞跃,蒋正华,戴汝为.人口问题与人工社会方法:人工人口系统的设想与应用[J].复杂系统与复杂性科学,2005,2(1):1-9. 被引量:18
  • 5Hull B, Bychkovsky V, Zhang Y, Chen K, Goraczko M, Miu A, Shih E, Balakrishnan H, Madden S. CarTel: A distributed mobile sensor computing system. In: Proc. of the 4th Int'l Conf. on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 125-138.
  • 6Pan H, Chaintreau A, Scott J, Gass R, Crowcroft J, Diot C. Pocket switched networks and human mobility in conference environments. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM. 2005. 244-251.
  • 7Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy-Efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In: Proc. of the 10th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2002.96-107. DO1=http://doi.acm.org/10.1145/605397.605408
  • 8Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, 2006,44(11): 134-141.
  • 9Conti M, Giordano S. Multihop ad hoe networking: The reality. Communications Magazine, 2007,45(4):88-95.
  • 10Fall K. A delay-tolerant network architecture for challenged Internets. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe: ACM, 2003.27-34.

共引文献3028

同被引文献13

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部