基于波动识别的可信组播路由协议
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A Trusted Multicast Routing Protocol Based on Fluctuation Recognition
  • 作者:张三顺 ; 夏辉 ; 张公敬
  • 英文作者:ZHANG Sanshun;XIA Hui;ZHANG Gongjing;Department of Computer Science and Technology, Qingdao University;
  • 关键词:移动自组网 ; 安全路由协议 ; 路由攻击 ; 信任模型
  • 英文关键词:MANET;;secure routing protocol;;routing attack;;trust model
  • 中文刊名:XXAQ
  • 英文刊名:Netinfo Security
  • 机构:青岛大学计算机科学技术学院;
  • 出版日期:2018-12-10
  • 出版单位:信息网络安全
  • 年:2018
  • 期:No.216
  • 基金:国家自然科学基金[61402245];; 中国博士后科学基金第八批特别资助[2015T80696];; 山东省自然科学基金[ZR2014FQ010];; 山东省高等学校科技计划项目[J16LN06]
  • 语种:中文;
  • 页:XXAQ201812010
  • 页数:10
  • CN:12
  • ISSN:31-1859/TN
  • 分类号:77-86
摘要
移动自组网络拓扑结构的开放性和动态性使得传统的路由协议容易受到恶意节点的各种攻击。文章提出一个直接信任与推荐信任相结合的信任计算模型。通过基于波动的系统云灰色预测模型计算直接信任,利用不同类型的推荐节点计算推荐信任,动态确定直接信任与推荐信任的权重得出总信任值。以该信任模型为基础,文章设计了基于波动识别的可信组播路由协议BTCMRP。该协议通过信任计算可以识别并排除网络中的恶意节点,有效应对路由攻击。在路由维护中提出了转发组节点复用机制,解决了多源网格结构中组播路由开销过大的问题。仿真结果表明,与已提出的基于信任的组播路由相比,BTCMRP协议提高了投递率,降低了路由开销和平均延时。
        Due to the openness and dynamic natures of the mobile ad hoc network topology, traditional routing protocols are vulnerable to various attacks from malicious nodes.This paper proposes a trust calculation model combining direct trust with recommendation trust. Direct trust is calculated by fluctuation-based system cloud grey prediction model,recommendation trust is calculated by different types of recommendation nodes, and the weights of direct trust and recommendation trust are determined dynamically to get the total trust value. Based on this trust model, this paper designs a fluctuation-based trust multicast routing protocol BTCMRP. The agreement can identify and eliminate malicious nodes in the network through trust calculation, and effectively deal with routing attacks. In routing maintenance, the forwarding group node reuse mechanism is proposed, which solve the problem of excessive multicast routing overhead in multi-source grid structure. The simulation results show that compared with the proposed trust-based multicast routing, BTCMRP improves the delivery rate and reduces the routing overhead and average delay.
引文
[1] JING Qi, VASILAKOS A, WAN Jiafu, et al. Security of the Internet of Things:Perspectives and Challenges[J]. Wireless Networks, 2104, 20(8):2481-2501.
    [2] CHEN Yang, WANG Yong. A New Trust-based AODV Routing Protocol and Performance Optimization towards Wireless Ad Hoc Networks[J]. Netinfo Security, 2018, 18(2):40-47.陈阳,王勇.移动Ad Hoc网络中一种安全的AODV路由协议及性能优化[J].信息网络安全,2018, 18(2):40-47.
    [3] LEE S J, SU W, GERLA M. On-Demand Multicast Routing Protocol(ODMRP)for Ad Hoc Networks[EB/OL].Http://www.ietf.org/proceedings/48/I-D/manet-odmrp-02.txt, 2007-3-1.
    [4] WAN Jiafu, LIU Jianqi, SHAO Zehui, et al. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles[J]. Sensors,2016, 16(1):88.
    [5] LIAO Ziyuan, WANG Wei, CHEN Mingzhi. Research on Trust Model for Security Strength Evaluation of Cloud Computing[J].Netinfo Security, 2016, 16(7):15-19.廖子渊,王维,陈明志.一种用于云计算系统安全强度评估的信任模型研究[J].信息网络安全,2016,16(7):15-19.
    [6] WEIMERSKIRCH A, THONET G. A Distributed Lightweight Authentication Model for Ad-hoc Networks[J].International Conference Seoul on Information Security&Cryptology, 2001, 2288:341-354.
    [7] MOVAHEDI Z, HOSSEINI Z, BAYAN F, al et. Trustdistortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks:A Survey[J]. IEEE Communications Surveys&Tutorials, 2016, 18(2):1287-1309.
    [8] WANG Wei, XIAO Chuanqi, FENG Yingyan, et al. Research on a Trust Model Based on AIFS Weighting[J]. Netinfo Security,2016, 16(12):8-12.王维,肖传奇,冯映燕,等.一种基于AIFS权重计算的信任模型的研究[J].信息网络安全,2016,16(12):8-12.
    [9] LI Wenjia, SONG Houbing. ART:An Attack-resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks[J].IEEE Transactions on Intelligent Transportation Systems, 2016, 17(4):960-969.
    [10] WANG Bo, HUANG Chuanhe. Security Incentive Cooperation Algorithm Based on Payment Model of Defense Policy in Ad Hoc Networks[J]. Chinese Journal of Computers,2012,35(7):1370-1389.王博,黄传河.Ad Hoc网络中一种基于防策略支付模型的安全激励合作算法[J].计算机学报,2012,35(7):1370-1389.
    [11] BORKAR G M, MAHAJAN A R. A Secure and Trust Based on-demand Multipath Routing Scheme for Self-organized Mobile Ad-hoc Networks[J]. Wireless Networks, 2017, 23(8):2455-2472.
    [12] XIA Hui, JIA Zhiping, LI Xin, et al. Trust Prediction and Trust-based Source Routing in Mobile Ad Hoc Networks[J]. Ad Hoc Networks, 2013, 11(7):2096-2114.
    [13] SUN Yuxing, XIE Li, CHEN Yifei. Reliable Dynamic Source Routing Protocol Based on Local Trust System[J]. Journal of Software. 2013,24(5):1098-1110.孙玉星,谢立,陈一飞.基于本地信任系统的可靠动态源路由协议[J].软件学报,2013, 24(5):1098-1110.
    [14] XIA Nu, LI Wei, LUO Junzhou, et al. A Routing Node Behavior Prediction Algorithm Based on Fluctuation Type Identification[J].Chinese Journal of Computers, 2014, 37(2):326-334.夏怒,李伟,罗军舟,等.一种基于波动类型识别的路由节点行为预测算法[J].计算机学报,2104,37(2):326-334.
    [15] TSENG F M, YU H C, TZENG G H. Applied Hybrid Grey Model to Forecast Seasonal Time Series[J]. Technological Forecasting&Social Change, 2001, 67(2-3):291-302.
    [16] EISSA T, RAZAK S A, KHOKHAR R H, et al. Trust-based Routing Mechanism in MANET:Design and Implementation[J].Mobile Networks&Applications, 2014, 18(5):666-677.
    [17] WANG Bo, CHEN Xunxun, CHANG Weiling. A Lightweight Trust-based QoS Routing Algorithm for Ad Hoc Networks[J]. Pervasive and Mobile Computing, 2014, 13:164-180.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700