留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于优化信任评估的Ad Hoc安全路由协议

陈少华 樊晓光 禚真福 黄金科 孙贤明

陈少华, 樊晓光, 禚真福, 等 . 基于优化信任评估的Ad Hoc安全路由协议[J]. 北京航空航天大学学报, 2016, 42(11): 2524-2531. doi: 10.13700/j.bh.1001-5965.2016.0184
引用本文: 陈少华, 樊晓光, 禚真福, 等 . 基于优化信任评估的Ad Hoc安全路由协议[J]. 北京航空航天大学学报, 2016, 42(11): 2524-2531. doi: 10.13700/j.bh.1001-5965.2016.0184
CHEN Shaohua, FAN Xiaoguang, ZHUO Zhenfu, et al. Secure routing protocol based on optimized trust evaluation in Ad Hoc network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016, 42(11): 2524-2531. doi: 10.13700/j.bh.1001-5965.2016.0184(in Chinese)
Citation: CHEN Shaohua, FAN Xiaoguang, ZHUO Zhenfu, et al. Secure routing protocol based on optimized trust evaluation in Ad Hoc network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016, 42(11): 2524-2531. doi: 10.13700/j.bh.1001-5965.2016.0184(in Chinese)

基于优化信任评估的Ad Hoc安全路由协议

doi: 10.13700/j.bh.1001-5965.2016.0184
基金项目: 国家自然科学基金(61402517);中航工业集团预研基金(619010601)
详细信息
    作者简介:

    陈少华,男,硕士研究生。主要研究方向:移动自组织网络、机载计算机网络。Tel.:17792021962,E-mail:876915107@qq.com;樊晓光,男,博士,教授,博士生导师。主要研究方向:无线通信、综合航电技术。Tel.:029-84787655,E-mail:1203574700@qq.com;禚真福,男,博士,讲师。主要研究方向:嵌入式系统开发。E-mail:zzf_tiger@126.com;黄金科,男,博士研究生。主要研究方向:无线通信、综合航电技术。Tel.:15829717886,E-mail:86297609@qq.com;孙贤明,男,硕士研究生。主要研究方向:机载计算机网络及检测技术。E-mail:1553552609@qq.com

    通讯作者:

    樊晓光,Tel.:029-84787655,E-mail:1203574700@qq.com

  • 中图分类号: TP393.08

Secure routing protocol based on optimized trust evaluation in Ad Hoc network

  • 摘要: 针对Ad Hoc网络中自私节点造成的攻击问题,提出了一种基于信任评估的Ad Hoc安全路由协议TEAR。该协议在节点行为信任评估方案的基础上,通过使用链路信任值和路径信任值表示节点和路径的可信度,同时,在链路信任值计算时,引入了基于公共邻居节点的间接信任评估方法和可变时间窗机制,保证了信任值计算的准确性和实效性;协议中每个节点维护一张信任表,并重新定义了路由请求和路由回复消息格式,实现了安全路径的快速选择。使用NS2进行模拟验证,又与AODV以及基于固定时间窗信任评估的安全路由协议TA-AODV进行性能对比。结果表明,改进的信任评估方案具有更好的性能,采用该方案的安全路由协议能较快地发现自私节点,并准确选择安全路径,提高了Ad Hoc网络性能。

     

  • [1] YANG H,LUO H Y,YE F,et al. Security in mobile Ad Hoc networks:Challenges and solutions[J].IEEE Wireless Communications,2004,11(1):38-47.
    [2] GUPTE S,SINGHAL M.Secure routing in mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):151-174.
    [3] KANNHAVONG B,NAKAYAMA H,NEMOTO Y,et al.A survey of routing attacks in mobile Ad Hoc networks[J].IEEE Wireless Communications,2007,14(5):85-91.
    [4] ZAPATA M G.Secure Ad Hoc on-demand distance vector routing[J].ACM SIGMOBILE Mobile Computing and Communications Review,2002,6(3):106-107.
    [5] HU Y C,PERRIG A,JOHNSON D B.Ariadne:A secure on-demand routing protocol for Ad Hoc networks[J].Wireless Networks,2005,11(1):21-38.
    [6] HU Y C,JOHNSON D B,PERRIG A.SEAD:Secure efficient distance vector routing for mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):175-192.
    [7] 付才,洪帆,洪亮,等.基于信任保留的移动Ad Hoc网络安全路由协议TPSRP[J].计算机学报,2007,30(10):1854-1864.FU C,HONG F,HONG L,et al.Mobile Ad Hoc secure routing protocol based on trust preserving[J].Chinese Journal of Computers,2007,30(10):1854-1864(in Chinese).
    [8] BALAKRISHNAN V,VARADHARAJAN V,LUCS P,et al.Trust enhanced secure mobile Ad-Hoc network routing[C]//Proceedings of the 21st International Conference on Advanced Networking and Applications.Piscataway,NJ:IEEE Press,2007:27-33.
    [9] ABUSALAH L,KHOKHAR A,GUIZANI M.A survey of secure mobile Ad Hoc routing protocols[J].IEEE Communications Surveys and Tutorials,2008,10(4):78-93.
    [10] LI X,JIA Z,ZHANG P,et al.Trust-based on-demand multipath routing in mobile Ad Hoc networks[J].IET Information Security,2010,4(4):212-232.
    [11] PERRONE L F,NELSON S C.A study of on-off attack models for wireless Ad Hoc networks[C]//Proceedings of 1st Workshop on Operator-Assisted(Wireless Mesh)Community Networks.Piscataway,NJ:IEEE Press,2006:58-67.
    [12] USHIKUBO H,TAKEDA S,SHIGENO H.An effective secure routing protocol considering trust in mobile Ad Hoc networks[J].IPSJ Journal,2014,55(2):649-658.
    [13] UMEDA S,TAKEDA S,SHIGENO H.Trust evaluation method adapted to node behavior for secure routing in mobile Ad Hoc networks[C]//Proceedings of 2015 8th International Conference on Mobile Computing and Ubiquitous Networking(ICMU).Berlin:Springer,2015:143-148.
    [14] KUROSAWA S,NAKAYAMA H,KATO N,et al.Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method[J].International Journal of Network Security,2007,5(3):338-345.
    [15] SEN J,CHANDRA M,HARIHARA S,et al.A mechanism for detection of grayhole attack in mobile Ad Hoc networks[C]//Proceedings of 2007 6th International Conference on Information,Communications and Signal Processing.Piscataway,NJ:IEEE Press,2007:1-5.
    [16] GHOSH T,PISSINOU N,MAKKI K.Collaborative trust-based secure routing against colluding malicious nodes in multi-hop Ad Hoc networks[C]//Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks(LCN'04).Piscataway,NJ:IEEE Press,2004:224-231.
    [17] CHENG Y,HUANG C,SHI W.Trusted dynamic source routing protocol[C]//Proceedings of the 3rd International Conference on Wireless Communications,Networking and Mobile Computing.Piscataway,NJ:IEEE Press,2007:1632-1636.
  • 加载中
计量
  • 文章访问数:  752
  • HTML全文浏览量:  156
  • PDF下载量:  476
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-03-09
  • 修回日期:  2016-04-22
  • 网络出版日期:  2016-11-20

目录

    /

    返回文章
    返回
    常见问答