基于动态信誉的无线Mesh网络安全路由机制
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Wireless Mesh network secure routing mechanism based on dynamic reputation
  • 作者:杨宏宇 ; 韩越
  • 英文作者:YANG Hongyu;HAN Yue;College of Computer Science and Technology, Civil Aviation University of China;
  • 关键词:无线Mesh网络 ; 路由机制 ; 恶意节点 ; 主观逻辑 ; 动态信誉
  • 英文关键词:wireless Mesh network;;routing mechanism;;malicious node;;subjective logic;;dynamic reputation
  • 中文刊名:TXXB
  • 英文刊名:Journal on Communications
  • 机构:中国民航大学计算机科学与技术学院;
  • 出版日期:2019-04-09 10:51
  • 出版单位:通信学报
  • 年:2019
  • 期:v.40;No.384
  • 基金:国家自然科学基金民航联合研究基金资助项目(No.U1833107);; 国家科技重大专项基金资助项目(No.2012ZX03002002)~~
  • 语种:中文;
  • 页:TXXB201904019
  • 页数:7
  • CN:04
  • ISSN:11-2102/TN
  • 分类号:199-205
摘要
针对无线Mesh网络安全路由机制匮乏、内部恶意节点在数据传输过程中容易产生分组丢失的问题,提出了一种基于动态信誉的无线Mesh网络安全路由机制(SRMDR)。首先,采用动态信誉机制评价节点行为,根据节点直接信誉值和推荐信誉值计算节点综合信誉值,整合节点历史综合信誉值与当前综合信誉值计算节点动态信誉值。然后,结合动态信誉机制和路由机制建立安全路由路径,将动态信誉值小于阈值的节点判定为恶意节点,并在路由过程中将其隔离。实验结果表明,与HWMP、SHaRP相比,SRMDR具有较高的恶意节点识别率,并能有效减小分组丢失率,提高网络吞吐量。
        Aiming at the problem that the wireless Mesh network(WMN) security routing mechanism was scarce and internal malicious nodes drop data packets during data transmission, a secure routing mechanism based on dynamic reputation(SRMDR) for wireless Mesh network was proposed. Firstly, the dynamic reputation mechanism was used to evaluate the node's behavior, the node's comprehensive reputation value was calculated according to the node's direct reputation value and the recommended reputation value, and the node's dynamic reputation value was calculated according to the node's historical comprehensive reputation value and the current comprehensive reputation value. Then, the dynamic reputation was combined with the routing mechanism to establish secure routing paths, the nodes with a dynamic reputation value less than the threshold were determined to be malicious nodes, which were isolated during the routing process.Experimental results show that compared with HWMP and SHaRP, SRMDR has higher malicious node recognition rates,and SRMDR can effectively reduce packet loss rate and improve network throughput.
引文
[1]杨宏宇,李航.无线Mesh网络恶意节点检测模型[J].清华大学学报(自然科学版),2017,57(7):687-694.YANG H Y,LI H.Malicious node detection model for wireless Mesh networks[J].Journal of Tsinghua University(Science and Technology),2017,57(7):687-694.
    [2]BARGHI H,AZHARI V.A practical sleep coordination and management scheme with duty cycle control for energy sustainable IEEE802.11s wireless mesh networks[J].Wireless Networks,2018,12(4):1-26.
    [3]MALARVIZHI L,GOPALAKRISHNAN V.Malicious node detection scheme for upgraded femtocell architecture in wireless mesh networks[J].Journal of Computational&Theoretical Nanoscience,2016,13(7):4573-4579.
    [4]SARMA D,KAR A,MALL R.A hierarchical and role based secure routing protocol for mobile wireless sensor networks[J].Wireless Personal Communications,2016,90(3):1067-1103.
    [5]BOUNOUNI M,BOUALLOUCHE-MEDJKOUNE L.A hybrid stimulation approach for coping against the malevolence and selfishness in mobile Ad Hoc network[J].Wireless Personal Communications,2016,88(2):255-281.
    [6]吴军,莫伟伟,印新棋,等.基于反馈可信度的可信机会路由转发模型[J].计算机工程与应用,2017,53(8):23-28.WU J,MO W W,YIN X Q,et al.Trusted opportunistic routing forwarding model based on feedback credibility[J].Computer Engineering and Applications,2017,53(8):23-28.
    [7]GUO J,ZHOU X,YUAN J,et al.Secure access control guarding against internal attacks in distributed networks[J].Wireless Personal Communications,2013,68(4):1595-1609.
    [8]SOOKHAK M,AKHUNDZADA A,SOOKHAK A,et al.Geographic wormhole detection in wireless sensor networks[J].Plos One,2015,10(1):77-98.
    [9]HOOGH J,ZANNONE N.Flow-based reputation with uncertainty:evidence-based subjective logic[J].International Journal of Information Security,2016,15(4):381-402.
    [10]CHO H.Dynamics of uncertain and conflicting opinions in social networks[J].IEEE Transactions on Computational Social Systems,2018,5(2):518-531.
    [11]林晖,马建峰.无线Mesh网络中基于跨层信誉机制的安全路由协议[J].西安电子科技大学学报,2014,41(1):116-123.LIN H,MA J F.Cross layer reputation mechanism based secure routing protocol for WMNs[J].Journal of Xidian University,2014,41(1):116-123.
    [12]PLOUMIDIS M,PAPPAS N,TRAGANITIS A.Flow allocation for maximum throughput and bounded delay on multiple disjoint paths for random access wireless multihop networks[J].IEEE Transactions on Vehicular Technology,2017,66(1):720-733.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700