期刊文献+

一种MANET中基于位置的可信路由 被引量:2

A Location-Based Trust Routing for MANET
在线阅读 下载PDF
导出
摘要 由于基于距离的位置辅助路由算法无法抵御恶意节点拒绝服务攻击(denial of service,DoS)的安全漏洞,引入信任度量,将信任模型加载到路由发现中以解决恶意节点对路由的DoS攻击.改进的基于信任的安全位置辅助路由利用节点的直接信任度和推荐信任度来避免信任值低的恶意节点加入路由转发工作.仿真结果表明,ST-LAR(secure trust location-aided routing)能更有效地抵御恶意节点的DoS攻击,并在平均端到端时延、分组成功投递率、吞吐量等方面优于DBLAR. To deal with the safety weakness in resisting active attacks from malicious nodes,trust metric is introduced to combat the attacks by loading a trust model on the proposed distance-based location-aided routing(DBLAR).The improved routing algorithm ST-LAR uses direct trust and recommendation trust to prevent malicious nodes with low trust value from joining the forwarding.Simulation results show that STLAR can effectively resist attacks from malicious nodes.Its performance is also better than DBLAR in terms of average end-to-end delay,packet successful delivery ratio and throughput.
出处 《应用科学学报》 EI CAS CSCD 北大核心 2010年第5期447-456,共10页 Journal of Applied Sciences
基金 国家"863"高技术研究发展计划基金(No.2006AA01Z208) 江苏省六大人才高地基金(No.06-E-043) 南京邮电大学引进人才科研启动项目基金(No.NY209016)资助
关键词 信任路由 信任模型 安全 位置辅助路由 自组织网 trust routing trust model security location-aided routing(LAR) MANET Ad Hoc
  • 相关文献

参考文献20

  • 1DAVID R,IGNAS G N.Ad hoc networking in future wireless communications[J].Computer Communications,2003,26(1):36-40.
  • 2Ko Y,VAIDYA N H.Location-aided routing(LAR)in mobile ad hoc networks[C]//1998 ACM/IEEE International Conference on Mobile Computing and Networking,Dallas,Texas,USA,1998:66-75.
  • 3KARP B,KUNG H T.GPSR(greedy perimeter stateless routing)for wireless networks[C]//2000 ACM/IEEE International Conference on Mobile Computing and Networking.New York:ACM Press,2000:243-254.
  • 4MAUVE M,WIDMER J,HARTENSTEIN H.A survey on position based routing in mobile Ad hoc networks[J].IEEE Network Magazine,2001,15(6):30-39.
  • 5王堃,吴蒙.一种Ad Hoc中基于位置路由的改进算法[J].西安电子科技大学学报,2008,35(2):367-372. 被引量:2
  • 6YANG Hao,Luo Haiyu,YE Fan,Lu Songwu,ZHANG Lixia.Security in mobile ad hoc networks:challenges and solutions[J].IEEE Wireless Communications,2004,11(1):38-47.
  • 7Hu Y C,JOHNSON D B,PERRIG A.A survey of secure wireless ad hoc routing[J].IEEE Security & Privacy Magazine,2004,2(3):28-39.
  • 8WANG Fei,MO Yijun,HUANG Benxiong.COSR:cooperative on-demand secure route protocol in MANET[C]//2006 International Symposium on Communications and Information Technologies,2006:890-893.
  • 9KARIM E D,GENE T.ALARM:anonymous locationaided routing in suspicious MANETs[C]//2007 IEEE International Conference of Network Protocols,Beijing,China,2007:304-313.
  • 10CHENG Yong,HUANG Chuanhe,SHI Wenming.Trusted dynamic source routing protocol[C]//2007 International Conference on Wireless Communications,Networking and Mobile Computing,2007:1632-1636.

二级参考文献32

  • 1贺鹏,李建东,陈彦辉.一种新型的基于地理位置信息的Ad Hoc路由算法[J].西安电子科技大学学报,2006,33(2):218-222. 被引量:2
  • 2陈灼,刘凯,张军.一种新的基于位置信息的MANET路由协议[J].西安电子科技大学学报,2007,34(1):149-153. 被引量:2
  • 3KHAMBATTI M, DASGUPTA P. A role-based trust model for peer to peer communities and dynamic coalitions[A]. Proceedings of the Second IEEE International Information Assurance Workshop[C]. 2004.141-154.
  • 4ERBAS D G, AYSSI K A, RTAIL A H. A reputation based trust model for peer-to-peer e-commerce communities[A].The IEEE Int'l Conf on E-Commerce [C].Hangzhou,China,2003.
  • 5ALTMAN J. PKI Security for JXTA Overlay Networks[R]. TR-12- 03-06, Palo Alto:Sun Mierosystem 2003.
  • 6ALBRECHT K, RUEDI A R. Clippee: A Large-Scale Client/peer s ystem[R]. TR-410, Swiss Federal Institute of Technology,2003.
  • 7CORNELLI F. Choosing reputable s ervents in a P2P network[A]. Proc of the 1 lth Int'l Wodd Wide Web Conf[C]. Hawaii, 2002. 441-449.
  • 8KAMVAR S D, SCHLOSSER M T. EigenRep: reputation management in P2P networks[A]. Proc of the 12th Int'l WorldWide Web Conf[C]. Budapest, 2003.123-134.
  • 9LI G. JXTA: a network programming environment[J]. IEEE Internet Computing,2001, 5(3):88-95.
  • 10HALEPOVIC E, DETERS R. Building a P2P forum system with JXTA[A]. Second International Conference on Peer-to-Peer Computing[C]. 2002.41-48.

共引文献21

同被引文献35

  • 1SICHITIU M L.Wireless mesh networks:opportunities and challenge[C] //2005 Proceedings of World Wireless Congress.San Francisco,California,2005:562-567.
  • 2AKYILDIZ I F,WANG X.Wireless mesh networks:a survey[J].Computer Networks,2005,47(5):445-487.
  • 3HU Y C,PERRIG A.A survey of secure wireless ad hoc routing[J].IEEE Security and Privacy,2004,2(3):28-39.
  • 4DING Xuyang,LUO Huiqiong.Trust evaluation based reliable routing in wireless mesh network[C] //2007International Conference on Wireless Communications,Networking and Mobile Computing,WiCom 2007,2007:2294-2297.
  • 5JOSANG A,GRAY E,KINATEDER M.Simplification and analysis of transitive trust networks[J].Web Intelligence and Agent Systems Journal,2006,4(2):139-161.
  • 6MARITI S,GUILI T,LAI K,BAKER M.Mitigating routing misbehavior in mobile ad hoc networks[C] //2000 International Conference on Mobile Computing and Networking,MobiCom,August 2000:255-265.
  • 7BUCHEGGER S,BOUDEC J Y.Performance analysis of the confidant protocol (cooperation of nodes:fairness in dynamic ad-hoc networks)[C] // 2002IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing,June 2002:226-236.
  • 8MICHIARDI P,MOLVA R.Core:a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks[C] // 2002 Proceedings of Communications and Multimedia Security Conference,September,2002:278-290.
  • 9PENG Shufeng,HE Jingsha,MENG Yao.Reputationbased trust update in network environment[C] //2008 International Symposium on Electronic Commerce and Security,Guangzhou,China,2008:118-123.
  • 10LIU J S,ISSARNY V.Enhanced.reputation mechanism for mobile ad-hoc networks[C] //2004 International Conference on Trust Management (iTrust04),Oxford,United Kingdom,2004:48-62.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部