期刊文献+

Ad hoc网络基于能量考虑的信誉机制研究

Research on Reputation Mechanism Based on The Energy Consideration in Ad hoc Network
原文传递
导出
摘要 移动自组网因其具有无中心、多跳、自组织、可移动等特点,使得它在战场、救灾等特殊场合的应用日渐受到人们的重视。而对其能量和安全方面的研究是使自组网走向实用性的重要方面。论文首先构建了关于能量和安全综合考虑的数学模型,并在此基础上分析了该模型对保证网络的影响,分析得出了在延长网络使用寿命的同时保证了网络的安全。 Mobile Ad hoc network is a special network, and for its features of non-infrastructure, multi-hop, selforganizing, and mobility adhoc network has attracted much attention, particularly in the specific situations, such as battlefield and disaster rescue. The research on its energy and security are the most important aspects of practicality in ad hoe. In this paper, we firstly construct an integrated mathematical model based on the residual energy and security is constructed first, then the characteristics and trends of the security and energy are analyzed respectively. Experiment indicates that this model could prolong the lifetime and improve the security of the system.
出处 《信息安全与通信保密》 2009年第9期132-134,共3页 Information Security and Communications Privacy
关键词 AD HOC网络 安全 能量 联合信誉机制 Ad hoc security energy joint reputation mechanism
  • 相关文献

参考文献8

  • 1沈颖.移动自组网的安全风险分析[J].信息安全与通信保密,2005(8):90-93. 被引量:2
  • 2Papadimitratos P, Haas Z. Secure routing for mobile ad hoe networks[C]. In Proc. of the SCS communication Networks and Distributed Systems Modeling and Simulation Conf. San Autonio, TX, Jan.2002.
  • 3Buchegger S, Boudec L J. Performance analysis of the CONFIDANT protocol: cooperation of nodesfairness In dynamic Ad hoc networks[C]. In Proceeding of IEEE /ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHOC).Lausanne, 2002: 226-236.
  • 4Michiardi P, Molva R. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks[C]. The Sixth IFIP Conference on Security Communications and Multimedia (CMS 2002) Portoroz, Slovenia, 2002: 107-121.
  • 5张纪忠,杨浩,周熙.Ad hoc网络功率控制策略研究[J].通信技术,2007,40(12):337-339. 被引量:2
  • 6TOHCK. Maximum battery life routing to support ubiquitous mobile computing in wireless Ad Hoc networks[J]. IEEE Communications Magazine, 2001, 39(06) 138-147.
  • 7Sun Wei. Trust Modeling and Evaluation in Ad Hoc Network[J]. Global Telecommunications Conference, 2005. GLOBECOM'05.IEEE, 2005, 3: 1862-1867.
  • 8Johnson B D, Maltz A D. Dynamic source routing in Ad hoc wireless network, mobile computing[C]. In Mobile Computing, edited by Tomasz Imieliski and Hank Korth, Kluwer Academie Publishers, 1996 151-181.

二级参考文献15

  • 1许力,郑宝玉,吴子文.移动自组网中节能路由策略的分析与比较[J].计算机应用研究,2004,21(5):1-4. 被引量:7
  • 2王青山,张信明,马涛,唐何.Ad Hoc无线网络功率控制综述[J].计算机科学,2004,31(7):52-56. 被引量:4
  • 3黎宁,牛晓红.Ad hoc网络中的功率控制机制[J].重庆邮电学院学报(自然科学版),2004,16(6):26-31. 被引量:9
  • 4J. Macker and M. Corson. Mobile ad hoc networking and the IETF. Mobile Computing and Communications Review, 1998, 2(1).
  • 5RFC 2501,Mobile Ad hoc Networking(MANET):Routing Protocol Performance Issues and Evaluation Considerations[S].
  • 6W.Ford M.S.Baum 劳帼龄等译.安全电子商务-为数字签名和加密构造基础设施(第二版)[M].北京:人民邮电出版社,2002..
  • 7J.Hubaux,L.Burryan,S.Capkun.The Quest for Security in Mobile Ad hoc Networks.Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHOC 01),2001.
  • 8L.Buttyan,J.Hubaux.Report on a Working Session on Security in Wireless Ad Hoc Networks.Swiss Federal Institute of Technology,EPFL,2001.
  • 9L.Zhou,Z.Haas.Securing Ad Hoc Networks.IEEE Network Magazine,1999,13(6).
  • 10F.Stajano.Security for Ubiquitous Computing.Communications Networking & Distributed Systems,2002.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部