南京大学学报(自然科学版) ›› 2012, Vol. 48 ›› Issue (2): 206–213.

• • 上一篇    下一篇

 移动自组网中兼顾通信可靠性和
链路长度的可信路由协议*

 梁广民1**,王健2   

  • 出版日期:2015-05-28 发布日期:2015-05-28
  • 作者简介: (l.深圳职业技术学院电子与通信工程学院,深圳,518055;
    2.吉林大学计算机科学与技术学院,长春,130012)
  • 基金资助:
     深圳市科技计划项日(QK 200608)

 Trusted routing protocol under consideration with communication
reliability and path length in mobile Ad-hoc network

 Liang Guang -Min1 ,Wang Jian2
  

  • Online:2015-05-28 Published:2015-05-28
  • About author: (1.The School of Electronic and Communication Enginecring,Shenzhen Polytechnic,Shcnzhcn, 518055,China
    2. College of Computer Science and Technology, Jilin University, Changchun, 130012,China)

摘要:  不同于以往只考虑最短路径或只依靠转发行为评价信任或基于信誉推荐机制的传统路由算法,提出了一种兼顾通信可靠性和路径长度的主观信任路由模型.该模型借鉴人类信任关系建立模式,通过引入属性相似度概念将邻居选择、信任评估、数据转发等路由环节紧密相连,在陌生节点间建立信任关系,从而实现了一种兼顾通信可靠性和链路长度的可信路由协议.仿真结果表明,提出的信任路由模型较传统的动态源路由协议协议具有较高的抵抗恶意节点存在的能力,并研究了通信半径和移动速度等参数对模型效率的影响.

Abstract:  Different from most of past routing algorithms which only considered shortest path first or evaluated the trust level solely on the forwarding behavior or were dependent on reputation recommendation mechanism,we proposed a novel subjective trusted routing model under consideration to both communication reliability and path length, Inspired by the establishment pattern of trust relationships in human life,we introduce the concept of attribute similarity to inherently bind neighbor selection, trust evaluation, packet forwarding, and other routing processes. Simulations show that the proposed trust routing model behaves better than dynamic source routing protocol on defending against malicious nodes. Also we provided some numerical results about the impacts of different communication ranges, moving speeds and node numbers on performance.

[1]Mui L, Mohtashcmi M. Halhcrstadt A. A computational model of trust and rcputation. Proceedings of the 35th Hawaii International
Conference on System Sciences, Big Island,Ha- waii,USA,2002,188一196.
[2]Raya M, Hubaux J P. Securing vehicular Ad hoc networks. Journal of Computer Security, 2007,15(1):39一68.
[3]Adibi S, Agnew G B. Multilayer flavored dy- namic source routing in mobile ad-hoc net- works. The institution of Engineering and
Technology Communications, 2008,2(5):690一707.
[4]Johnson D, Maltz D. Dynamic source routing in Ad-hoc wireless networks, Imiclinski T,Korth H. Mobile Computing. Norwcll:Kluwcr Aca-
demic Publishers, 1996,153一181.
[5]Perkins C, Belding E, Das S. Ad-hoc on-de mand distance vector (AODV) routing, Internet Engineering Task Force Request for Comments,2003,561.
[6]Zhang Q, Hu G M,Chen H T,et al. Cluste- ring algorithm and analysis based on objective trust modeling in MANET. Journal on Commu-
nications, 2009, 35(2); 12~21.(张强,胡光明,陈海涛等.MANET基于客观信任度建模的分簇算法与分析.通信学报,2009, 35(2); 12一21.)
[7]Peng S C,Jia W J,Wang G J,et al.Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks.The institute of Elec-
tronics, Information and Communication Engi- neers Transactions on information and Systems,2010,E93一D(3):510一517.
[8]Pirzada A A,McDonald C. Establishing trust in pure ad-hoc networks. Proceedings of A us tralasian Conference on Computer Science,2004,56:47~54
[9]A nantvalce T,Wu J. Reputation-based system for encouraging the cooperation of nodes in mo- bile Ad-hoc networks. Proceedings of IEEE In-
ternational Conference on the Communications,2007,3383一3388.
[10]Peng S C, Jia W J,Wang G J. Voting-based clustering algorithm with subjective trust and stability in mobile ad-hoc networks. Proceed-
ings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008, 2:3一9.
[11]Luo J,Liu X, Zhang Y,et al. Fuzzy trust rec ommendation based on collaborative filtering for mobile ad-hoc networks. Proceedings of IEEE
Conference on Local Computer Networks,2008,305一311.
[12]Li J,Li R,Kato J. Future trust management framework for mobile Ad-hoc networks, IEEE Communications Magazine,2008,46(4): 108一114.
[13]Marti S, Giuli T J,Lai K,et al. Mitigating routing misbehavior in mobile Ad-hoc net- works. Proceedings of nternational Conference
on Mobile Computing and Networking, 2000,255一265.
[14]Buchegger S, Boudec Le J Y. Performance anal- ysis of the CONF7DANT protocol:Cooperation of nodes-fairness in dynamic ad-hoc networks.
Proceedings of ACM international Symposium on Mobile Ad-hoc Networking and Computing, 2002,226一236.
[15]Yang H B, Zhang N R. The comparative study of secure routing protocols for mobile Ad Hoc networks. Journal of Nanjing University(Natu-
ralScicnces), 2005, 41(5): 340~346.(杨华兵,张宁蓉.移动Ad Hoc网络安全路由协议的比较研究.南京大学学报(自然科学),2005, 41 (5):340一346).
[16]Winjum E Spilling P,Kure ¢.Trust metric routing to regulate routing cooperation in mobile wireless Ad-hoc networks. Proceedings of Eu
ropcan Wireless,2005,399一406.




No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!