全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

面向MANET路由的多属性动态信任模型

DOI: 10.13190/j.jbupt.2013.05.018

Keywords: 移动自组织网络,多属性决策理论,动态信任模型,路由节点信任度

Full-Text   Cite this paper   Add to My Lib

Abstract:

综合移动自组织网络(MANET)路由节点的状态和行为因素,提出了一种基于多属性决策的MANET路由动态信任模型(MDF-Trust)。该信任模型采用多属性决策理论量化路由节点的状态和行为等信任决策因素并对MANET路由节点的信任进行评价,通过引入推荐信任度和推荐节点搜索算法遏制恶意节点的欺骗行为。仿真实验结果表明,该信任模型能准确地反映MANET路由节点的信任变化,具有更好的动态响应能力,并且在存在欺骗节点的情况下有更高的分组投递数和更低的网络时延。

References

[1]  Sanzgiri K,Dahill B,Levine B N,et al.A secure routing protocol for Ad hoc networks[C]//The 10th IEEE International Conference on Network Protocols.Paris: IEEE Press,2002: 78-87.
[2]  Hu Yin Chun,Johnson D B,Perrig A.Sead: secure efficient distance vector routing for mobile wireless Ad hoc networks[C]//The 4th IEEE Workshop on Mobile Computing Systems & Applications.NY: IEEE Press,2002: 3-13.
[3]  Zhang Yuejun,Wang Pengjun.Design of multi-valued double-edge-triggered JK flip-flop based on neuron MOS transistor[C]//ASIC,2009.ASICON'09.IEEE 8th International Conference on Components,Circuits,Devices & Systems.[S.I.]: IEEE Press,2009: 58-61.
[4]  Chua L O,Roska T.Cellular neural networks and visual computing foundation and applications[M].[S.L.]: Cambridge University Press,2002.
[5]  Chen Fangyue,He Guolong,Chen Guanrong.Realization of boolean functions via CNN: mathematical theory,LSBF and template design[J].IEEE Transactions on Circuits and Systems-I: 2006,2006,53(10): 2203-2213.
[6]  Liu Yanyi,Liu Wenbo,Chen G.Implementing dynamic reconfigurable CNN-based full-adder[C]//The Cellular Nanoscale Networks and Their Applications (CNNA),2012 13th International Workshop on Components,Circuits,Devices & Systems.Turin: IEEE Press,2012: 1-5.
[7]  李冰,袁坚,王剑,等.基于多维Hash链的无线Ad-hoc安全路由数字签名方案[J].清华大学学报: 自然科学版,2009,49(1): 57-60.Li Bing,Yuan Jian,Wang Jian,et al.Digital signature scheme based on multi-dimensional Hash chains for wireless Ad-hoc routing security[J].Journal of Tsinghua University: Science and Technology,2009,49(1): 57-60.
[8]  Buchegger S,Boudec J Y.Performance analysis of the confidant protocol[C]//The 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing.New York: IEEE Press,2002: 226-236.
[9]  王建新,张亚男,王伟平,等.移动自组网中基于声誉机制的安全路由协议设计与分析[J].电子学报,2005,4(4): 596-601.Wang Jianxin,Zhang Ya'nan,Wang Weiping,et al.A security routing protocol based on reputation systems in MANET[J].Chinese Journal of Electronics,2005,4(4): 596-601.
[10]  Sun Yuxing, Huang Songhua, Chen Lijun, et al. Bayesian decision-making based recommendation trust revision model in Ad hoc networks[J]. Journal of Software, 2009, 20(9): 2574- 2586.
[11]  杜君, 李伟华. 面向多跳无线自组织网络的安全信任模型[J]. 吉林大学学报: 工学版, 2011, 9(5): 1421-1425. Du Jun, Li Weihua. Security trust model for multihop wireless Ad hoc networks [J]. Journal of Jilin University: Engineering and Technology Edition, 2011, 9(5): 1421-1425.
[12]  喻莉, 李静茹, 刘祖浩, 等. 基于自适应遗忘机制的半环信任模型[J]. 电子信息学报, 2011, 33(1): 175-179. Yu Li, Li Jingru, Liu Zuhao, et al. Semiring trust model based on adaptive forgetting scheme[J]. Journal of Electronics & Information Technology, 2011, 33(1): 175-179.
[13]  洪亮, 洪帆, 彭冰, 等. 一种基于邻居信任评估的虫洞防御机制[J]. 计算机科学, 2006, 33 (8): 130-133. Hong Liang, Hong Fan, Peng Bing, et al. Defend against wormhole attack based on neighbor trust evaluation in MANET [J]. Computer Science, 2006, 33(8): 130-133. [10] 张骞, 张霞, 文学志, 等. Peer-to-Peer环境下多粒度Trust模型构造[J]. 软件学报, 2006, 17(1): 96-107. Zhang Qian, Zhang Xia, Wen Xuezhi, et al. Construction of peer-to-peer multiple-grain trust model [J]. Journal of Software, 2006, 17(1): 96-107.
[14]  甘早斌, 丁倩, 李开, 等. 基于声誉的多维度信任计算算法[J]. 软件学报, 2011, 22(10): 2401-2411. Gan Zaobin, Ding Qian, Li Kai, et al. Reputation-based multi-dimensional trust algorithm [J]. Journal of Software, 2011, 22(10): 2401-2411.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133