带有黑洞节点探测的间断连接无线网络数据转发机制
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks
  • 作者:杨静 ; 赵妍妍 ; 王汝言 ; 龚玲玲 ; 谢毅 ; 谢金凤
  • 英文作者:YANG Jing;ZHAO Yanyan;WANG Ruyan;GONG Lingling;XIE Yi;XIE Jinfeng;Optical Communication and Network Key Laboratory of Chongqing;School of Telecommunication and Information Engineering, Chongqing University of Posts and Telecommunications;Chongqing Institute of Telecommunications;
  • 关键词:间断连接无线网络 ; 信任管理 ; 黑洞攻击探测 ; 粗糙集
  • 英文关键词:Intermittently connected wireless network;;Trust management;;Blackhole attack detection;;Rough set
  • 中文刊名:DZYX
  • 英文刊名:Journal of Electronics & Information Technology
  • 机构:重庆高校市级光通信与网络重点实验室;重庆邮电大学通信与信息工程学院;重庆电信研究院;
  • 出版日期:2016-02-15
  • 出版单位:电子与信息学报
  • 年:2016
  • 期:v.38
  • 基金:国家自然科学基金(61371097);; 重庆市自然科学重点基金(CSTC2013JJB40001;CSTC2013JJB40006);; 重庆市青年科技人才培养计划(cstc2014kjrc-qnrc40001)~~
  • 语种:中文;
  • 页:DZYX201602009
  • 页数:8
  • CN:02
  • ISSN:11-4494/TN
  • 分类号:60-67
摘要
间断连接无线网络利用节点移动产生的通信机会完成数据传输,但网络中的恶意节点通过伪造节点的相遇信息等方法,吸引并丢弃数据,影响网络的运行。该文提出带有黑洞攻击探测的间断连接无线网络数据转发机制,通过节点诚信度、信用度、间接信任度及数据转发能力4维信任属性的评估,获知攻击节点的行为规律,并采用粗糙集理论降低网络运行过程中产生的不确定状态信息引发的误判率,更加准确地对节点的可信性进行判断,进而,合理地为数据选择中继节点。结果表明,所提出的方法能有效提升黑洞节点的辨识率,对网络中其它非协作行为也有一定探测和防御能力,能显著改善网络性能。
        Intermittently connected wireless networks transmit data through opportunities caused by nodes' movements. But malicious nodes in the network can attack and delete data by falsifying information about their routings, in order to impact the performance of networks. A data forwarding mechanism with blackhole attacking detection in intermittently connected wireless networks is proposed in this paper. By evaluating 4 trust properties include value of honesty, credit, indirect trust, and data forwarding rate, characteristics of attackers' are summarized directly behaviors. And using the theory of rough set to decrease the rate of mistakes caused by indeterminate information, so that to determine the reliability of nodes accurately, and choose relay nodes reasonably. Results show that, the proposed mechanism can effectively find out attackers while enhancing the reliability of data transmission, and it also can defense some other non-cooperative nodes in the networks. Thus, the utilization of network resource is improved.
引文
[1]BOLDRINI C,LEE K,ONEN M,et al.Opportunistic networks[J].Computer Communications,2014,48(14):1-4.
    [2]吴大鹏,张普宁,王汝言.带有消息投递概率估计的机会网络自适应缓存管理策略[J].电子与信息学报,2014,36(2):390-395.WU Dapeng,ZHANG Puning,and WANG Ruyan.Adaptive buffer management strategy with message delivery probability estimating method in opportunistic networks[J].Journal of Electronics&Information Technology,2014,36(2):390-395.
    [3]吴大鹏,白娜,王汝言.带有节点状态估计的间断连接无线网络缓存管理策略[J].电子与信息学报,2015,37(2):443-448.WU Dapeng,BAI Na,and WANG Ruyan.Cache management mechanism with node status evaluation for intermittently connected wireless networks[J].Journal of Electronics&Information Technology,2015,37(2):443-448.
    [4]D’SOUZA R J and JOSE J.Routing approaches in delay tolerant networks:a survey[J].International Journal of Computer Applications,2010,1(17):8-14.
    [5]CAO Z,DONG M,GAO Z,et al.A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J].IEEE Transactions on Parallel&Distributed Systems,2014,25(1):22-32.
    [6]JAIN S.Black hole attack in delay tolerant networks:a survey[J].International Journal of Computer Science and Engineering,2014,2(4):172-175.
    [7]DINI G and DUCA A L.Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network[J].Ad Hoc Networks,2012,10(7):1167-1178.
    [8]LI N and DAS S K.A trust-based framework for data forwarding in opportunistic networks[J].Ad hoc Networks,2013,11(4):1497-1509.
    [9]LI F,WU J,and SRINIVASAN A.Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[C].IEEE International Conference on Computer Communications 2009,Rio de Janeiro,Brazil,2009:2428-2436.
    [10]REN Y,CHUAH M C,YANG J,et al.Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording[C].2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks(Wo WMo M),Montreal,QC,Canada,2010:1-6.
    [11]GUO Y,SCHILDT S,and WOLF L.Detecting blackhole and greyhole attacks in vehicular delay tolerant networks[C].Fifth International Conference on Communication Systems and Networks(COMSNETS),Bangalore,India,2013:1-7.
    [12]SAINI K K,SAINI A,and MEHAK.Nature based trust security protocol against greyhole attacks in opportunistic networks[J].International Journal of Engineering Research&Management Technology,2014,1(3):21-28.
    [13]JULIER S J,UHLMANN J K,and DURRANT-WHYTE H F.A new approach for filtering nonlinear systems[C].Proceedings of the 1995 American Control Conference,Seattle,WA,USA,1995,3:1628-1632.
    [14]BAADACHE A and BELMEHDI A.Struggling against simple and cooperative black hole attacks in multi-hop wireless Ad hoc networks[J].Computer Networks,2014,73(1):173-184.
    [15]LI F and WU J.Mobility reduces uncertainty in MANETs[C].26th IEEE International Conference on Computer Communications,Anchorage,AK,USA,2007:1946-1954.
    [16]PAWLAK Z and SOWINSKI R.Rough set approach to multi-attribute decision analysis[J].European Journal of Operational Research,1994,72(3):443-459.
    [17]LINDGREN A,DORIA A,and SCHELéN O.PROPHET:probabilistic routing in intermittently connected networks[J].Moble Computing and Communications Review,2003,7(3):1246-1250.
    [18]RAMANA K S,CHARI A A,and KASIVISWANTH N.A survey on trust management for mobile Ad hoc networks[J].International Journal of Network Security and Its Applications,2010,13(4):562-583.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700