一种基于信任的组播路由协议
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A Trust-based Multicast Routing Protocol
  • 作者:李本霞 ; 夏辉 ; 张三顺
  • 英文作者:LI Benxia;XIA Hui;ZHANG Sanshun;Scholl of Computer Science and Technology, Qingdao University;
  • 关键词:Ad-hoc网络 ; 路由攻击 ; 信任模型 ; 模糊逻辑
  • 英文关键词:Ad-hoc network;;routing attack;;trust model;;fuzzy logic
  • 中文刊名:XXAQ
  • 英文刊名:Netinfo Security
  • 机构:青岛大学计算机科学技术学院;
  • 出版日期:2019-01-10
  • 出版单位:信息网络安全
  • 年:2019
  • 期:No.217
  • 基金:国家自然科学基金[61402245];; 中国博士后科学基金[2015T80696];; 山东省自然科学基金[ZR2014FQ010];; 山东省高等学校科技计划项目[J16LN06]
  • 语种:中文;
  • 页:XXAQ201901008
  • 页数:9
  • CN:01
  • ISSN:31-1859/TN
  • 分类号:65-73
摘要
Ad-hoc网络是一个无中心的对等式网络,网络中的节点地位平等,节点可以随时加入或离开,缺乏集中管理。这导致网络极易受到各种内部攻击,其中最常见的是路由攻击。目前学术界应对此类攻击的有效方法是提出合适的节点信任模型,并应用到各种路由协议中。现有信任模型中普遍存在的问题是不能合理整合计算节点信任值的各类决策因子。文章提出一种信任模型,运用模糊逻辑理论综合两个因子,并在反模糊化后得出节点信任值。文章将信任模型用于MAODV组播路由协议的路由建立与维护过程中,提出一种路由协议MTAODV。仿真实验证明,MTAODV以端到端延迟和路由开销略微增大为代价,有效提高了网络中数据包的传递率。
        Ad-hoc network is a centerless peer-to-peer network. Nodes in the network have equal status. Nodes can join or leave the network at any time without centralized management. This makes the network vulnerable to various internal attacks, the most common of which is routing attack. At present, the effective way to deal with such attacks in academia is to propose a suitable trust model for nodes and apply it to various routing protocols. The common problem in existing trust models is that it is impossible to integrate reasonably all kinds of decision-making factors for calculating the trust values of nodes. This paper proposes a trust model, which synthesizes two factors by using the fuzzy logic theory, and obtains the trust values of nodes after de-fuzzification. This paper applies trust model to the routing establishment and maintenance of multicast routing protocol MAODV, and proposes a routing protocol MTAODV. The simulation results show that MTAODV can effectively improve the transmission rate of data packets in the network at the cost of end-to-end delay and slightly increased routing overhead.
引文
[1]LIAO Ziyuan,CHEN Mingzhi,DENG Hui.Research on the Model of Cloud Computing Trust Management Based on Evaluation Credibility[J].Netinfo Security,2016,16(2):33-39.廖子渊,陈明志,邓辉.基于评价可信度的云计算信任管理模型研究[J].信息网络安全,2016,16(2):33-39.
    [2]ZOURIDAKI C,MARK B L,HEJMO M,et al.A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs[C]//ACM.The 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks,November 7,2005,Alexandria,VA,USA.New York:ACM,2005:1-10.
    [3]TAN Shuaishuai,LI Xiaoping,DONG Qingkuan.A Trust Management System for Securing Data Plane of Ad-Hoc Networks[J].IEEE Transactions on Vehicular Technology,2016,65(9):7579-7592.
    [4]SIRISALA N,BINDU C S.Uncertain Rule Based Fuzzy Logic QoS Trust Model in MANETs[C]//IEEE.2015 International Conference on Advanced Computing and Communications,September 18-20,2015,Chennai,India.NJ:IEEE,2015:55-60.
    [5]QI Jian,CHEN Xiaoming,YOU Weiqing.Research on the Method of Network Protocol Security Evaluation Based on Fuzzing Test[J].Netinfo Security,2017,17(3):59-65.齐健,陈小明,游伟青.基于fuzzing测试的网络协议安全评估方法研究[J].信息网络安全,2017,17(3):59-65.
    [6]JIANG Shouxu,LI Jianzhogn.A Reputation-Based Trust Mechanism for P2P E-Commerce Systems[J].Journal of Software,2007,18(10):2551-2563.姜守旭,李建中.一种P2P电子商务系统中基于声誉的信任机制[J].软件学报,2007,18(10):2551-2563
    [7]LI Xiaoyong,GUI Xiaolin.Trust Quantitative Model with Multiple Decision Factors in Trusted Network[J].Chinese Journal of Computers,2009,32(3):405-416.李小勇,桂小林.可信网络中基于多维决策属性的信任量化模型[J].计算机学报,2009,32(3):405-416.
    [8]BUCHEGGER S,LEBOUDEC J Y.A Robust Reputation System for Mobile Ad-hoc Networks[EB/OL].https://infoscience.epfl.ch/record/486?tdsourcetag=s_pcqq_aiomsg,2018-9-20.
    [9]CHEN Liqun,QIN L,MARTIN K M,et al.A Privacy-aware Reputation-based Announcement Scheme for VANETs[C]//IEEE.2013 IEEE 5th International Symposium on Wireless Vehicular Communications(WiVeC),June 2-3,2013,Dresden,Germany.NJ:IEEE,2013:1-5.
    [10]CHANG Yingxian,CHEN Guangyong,SHI Xinlei,et al.Research on Security Technology of Mobile Network[J].Netinfo Security,2016,16(4):76-81.常英贤,陈广勇,石鑫磊,等.移动网络安全防范技术研究[J].信息网络安全,2016,16(4):76-81.
    [11]KAMEL M B M,ALAMERI I,ONAIZAH A N.STAODV:A Secure and Trust based Approach to Mitigate Blackhole Attack on AODV based MANET[C]//IEEE.2017 IEEE 2nd Advanced Information Technology,Electronic and Automation Control Conference(IAEAC),March 25-26,2017,Chongqing,China.NJ:IEEE,2017:1278-1282.
    [12]XIA Hui,XIA Shoujun,YU Jia,et al.Applying Link Stability Estimation Mechanism to Multicast Routing in MANETs[J].Journal of Systms Architecture,2014,60(5):467-480.
    [13]SALEHI M,BOUKERCHE A,DAREHSHOORZADEH A,et al.Towards a Novel Trust-based Opportunistic Routing Protocol for Wireless Networks[J].Wireless Networks,2015,22(3):1-17.
    [14]ROYER E M.Multicast Ad hoc On-Demand Distance Vector(MAODV)Routing[EB/OL].http://ijsetr.org/wp-content/uploads/2017/05/IJSETR-VOL-6-ISSUE-4-716-719.pdf,2018-9-20.
    [15]MARCHANG N,DATTA R.Light-weight Trust-based Routing Protocol for Mobile Ad Hoc Networks[J].Iet Information Security,2012,6(2):77-83.
    [16]SHABUT A M,DAHAL K P,BISTA S K,et al.Recommendation Based Trust Model with an Effective Defence Scheme for MANETs[J].IEEE Transactions on Mobile Computing,2015,14(10):2101-2115.
    [17]ZHU Yufang,KUNZ T.MAODV Implementation for NS-2.26[EB/OL].http://read.pudn.com/downloads71/ebook/256393/maodv-ns-2.26.pdf,2018-9-20.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700