期刊文献+

移动ad hoc网络可信路由发现算法 被引量:6

Discovery of Trust Routing for Mobile Ad Hoc Networks
在线阅读 下载PDF
导出
摘要 综述了移动adhoc网络环境下已有路由协议的研究现状,针对移动adhoc网络特点和已有协议在安全方面存在的缺陷,提出了一种新的可信路由发现算法,并将该算法加入到被IETF认可的DSR路由协议中得到实现,经NS2网络仿真工具仿真实验,证明该算法是行之有效的·使用信任度表示某个节点可以作为路由的下一跳的可能性,给出了信任度计算方法·决策者对一个证据的信任程度不仅与第三方对证据的建议有关,并且更重要的是与决策者本身的直接经验有关·对信任模型进行了形式化描述,该信任模型主要解决了没有认证中心的陌生者的信任管理问题,通讯节点可以提供不完整、不确定的信任证据,弥补了现有安全协议的缺陷· Reviewing the defects of existing ad hoc network route protocols, a new method searching trust routing for mobile ad hoc network was presented on the basis of the peculiarity of ad hoc network. The method was applied to DSR protocol approved by IETF. NS2 simulation experiment showed that the method is feasible and effective. Trust probability was suggested to describe the probability that a node may be acted as next hop, with an arithmetic given to calculate the trust probability. It's an empirical proof that how a rout designer trusted an evidence is dependent not only on recommendations from third parties but more important on his/her own experience. A trust model was thus formalized, which is available to manage the trust relation between strangers. The model can deal with incomplete and uncertain evidence so as to make up the defects of existing ad hoc route protocol.
作者 王翠荣 高远
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2003年第11期1045-1048,共4页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(60073059).
关键词 移动AD HOC网络 安全路由协议 证据 信任度 仿真 ad hoc network security routing evidence trust probability simulation
  • 相关文献

参考文献11

  • 1周福才,朱伟勇.基于混沌理论身份认证的研究[J].东北大学学报(自然科学版),2002,23(8):730-732. 被引量:17
  • 2Perkins C E, Royer E M. Ad hoc on-demand distance vector muting[A]. IEEE Workshop on Mobile Computing System and Applications [ C ]. New Orleans: IEEE Computer Society, 1999.90 - 100.
  • 3Kivinen T, Kojo M. IP security protocol[R]. Cambridge: The Intemet Engineering Task Force, 1998.
  • 4Johnson D, Maitz D. DSR : the dynamic murce routing protocol for multi-hop wireless ad hoc networks [ M ]. Redwood :Addison-Wesley, 2001. 139- 172.
  • 5Sanzgiri K, Dahill B. A secure muting protocol for ad hoc networks[ A]. Proceedings of 2002 IEEE International Conference on Network Protocols [ C ]. Paris : IEEE Computer Society, 2002.78 - 90.
  • 6Papadimitratos P, Haas J. Secure muting for mobile ad hoc networks [ J ]. Mobile Computing and Communications Review, 2002,1(2):1-2.
  • 7Chun Y H, Johnson D B. SEAD: secure efficient distance vector muting for mobile wireless ad hoc networks [ A ]. Proceeding.s of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002)[C]. NY:Calicoon, 2002.3 - 13.
  • 8Herzberg A. Access control meets public key infrastructure [ A]. Proceedings of the 2000 IEEE Symposium on Securityand Privacy[C]. Berkeley: IEEE Computer Society, 2000.2-14.
  • 9Ch Y, Feigenbaum J. Referee: trust management for web applications[J ]. Word Wide Web Journal, 1997, 29 ( 1 ) :127- 139.
  • 10Josang A. A logic uncertain probabilities[J ]. International Journal of Uncertainty, Fuzziness and Knowledge, 2001,9(3) :279 - 311.

二级参考文献2

共引文献16

同被引文献43

  • 1蒋毅,史浩山.一种新的移动Ad hoc网络的安全路由策略[J].微电子学与计算机,2005,22(4):30-32. 被引量:4
  • 2杨纶标 高英仪.模糊数学原理及应用[M].广州:华南理工大学出版社,2002..
  • 3Perkins C E, Royer E M, Das S R. RFC 3561:ad hoc on demand distance vector(AODV) routing[EB/OL].http://www.ietf.org/rfc/rfc3561.txt, 2003-11-15.
  • 4Perkins C E, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing(DSDV) for mobile computers[A].Proceeding of ACM SIGCOMM 1994[C].New York:ACM Press, 1994.234-244.
  • 5JohnsonD B, Maltz D A. The dynamic source routing protocol for mobile ad hoc networks[EB/OL].http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt, 2004-01-12.
  • 6Lofti Z. Fuzzy sets[J].Journal of Information and Control, 1965,8(3):338-353.
  • 7Fall K, Varadhan K. NS notes and documents[EB/OL].http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf, 2004-01-15.
  • 8Corson S, Macker J. Mobile ad hoc networking (MANET):routing protocol performance issues and evaluation considerations[EB/OL].http://www.ietf.org/rfc/rfc2501.txt, 2004-01-15.
  • 9Hu Y C,Johnson D B,Perrig A.SEAD:secure efficient distance vector routing for mobile wireless ad hoc networks[A].The Fourth IEEE Workshop on Mobile Computing Systems and Applications[C].Callicoon:IEEE Press,2002.3-13.
  • 10Seung Y,Prasad N,Robin K.Security-aware ad hoc routing for wireless networks[A].The Second ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc'01)[C].Long Beach:ACM Press,2001.299-302.

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部