首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于优化信任评估的Ad Hoc安全路由协议
引用本文:陈少华,樊晓光,禚真福,黄金科,孙贤明.基于优化信任评估的Ad Hoc安全路由协议[J].北京航空航天大学学报,2016,42(11):2524-2531.
作者姓名:陈少华  樊晓光  禚真福  黄金科  孙贤明
作者单位:空军工程大学航空航天工程学院,西安,710038
基金项目:国家自然科学基金(61402517),中航工业集团预研基金(619010601)National Natural Science Foundation of China(61402517),AVIC Pre-Research Foundation of China(619010601)
摘    要:针对Ad Hoc网络中自私节点造成的攻击问题,提出了一种基于信任评估的Ad Hoc安全路由协议TEAR。该协议在节点行为信任评估方案的基础上,通过使用链路信任值和路径信任值表示节点和路径的可信度,同时,在链路信任值计算时,引入了基于公共邻居节点的间接信任评估方法和可变时间窗机制,保证了信任值计算的准确性和实效性;协议中每个节点维护一张信任表,并重新定义了路由请求和路由回复消息格式,实现了安全路径的快速选择。使用NS2进行模拟验证,又与AODV以及基于固定时间窗信任评估的安全路由协议TA-AODV进行性能对比。结果表明,改进的信任评估方案具有更好的性能,采用该方案的安全路由协议能较快地发现自私节点,并准确选择安全路径,提高了Ad Hoc网络性能。

关 键 词:Ad  Hoc网络  自私节点  安全路由  信任评估  可变时间窗  节点行为
收稿时间:2016-03-09

Secure routing protocol based on optimized trust evaluation in Ad Hoc network
CHEN Shaohua,FAN Xiaoguang,ZHUO Zhenfu,HUANG Jinke,SUN Xianming.Secure routing protocol based on optimized trust evaluation in Ad Hoc network[J].Journal of Beijing University of Aeronautics and Astronautics,2016,42(11):2524-2531.
Authors:CHEN Shaohua  FAN Xiaoguang  ZHUO Zhenfu  HUANG Jinke  SUN Xianming
Abstract:Aimed at the attack of selfish nodes in mobile Ad Hoc networks, this paper proposes a secure routing protocol TEAR, which is based on trust evaluation. In order to realize the accuracy and timeliness of trust values, the proposed protocol, which is based on the trust evaluation scheme of node behavior, uses the link trust and path trust to represent the reliability of a node and a path respectively, and introduces the indirect trust evaluation scheme with public neighbors' trust values and variable time window. The trust value table of each node and the new structure of RREQ and RREP provide the quick selection of secure routing. Finally, TEAR protocol was verified by NS2 simulation and compared with AODV and TA-AODV which is based on fixed time window trust evaluation. The simulation results show that the improved trust evaluation scheme has a superior performance, and TEAR can not only detect the selfish nodes correctly but also select secure path, which improves the function of Ad Hoc networks.
Keywords:Ad Hoc network  selfish nodes  secure routing  trust evaluation  variable time window  node behavior
本文献已被 万方数据 等数据库收录!
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号