南京大学学报(自然科学版) ›› 2012, Vol. 48 ›› Issue (2): 206213.
梁广民1**,王健2
Liang Guang -Min1 ,Wang Jian2
摘要: 不同于以往只考虑最短路径或只依靠转发行为评价信任或基于信誉推荐机制的传统路由算法,提出了一种兼顾通信可靠性和路径长度的主观信任路由模型.该模型借鉴人类信任关系建立模式,通过引入属性相似度概念将邻居选择、信任评估、数据转发等路由环节紧密相连,在陌生节点间建立信任关系,从而实现了一种兼顾通信可靠性和链路长度的可信路由协议.仿真结果表明,提出的信任路由模型较传统的动态源路由协议协议具有较高的抵抗恶意节点存在的能力,并研究了通信半径和移动速度等参数对模型效率的影响.
[1]Mui L, Mohtashcmi M. Halhcrstadt A. A computational model of trust and rcputation. Proceedings of the 35th Hawaii International Conference on System Sciences, Big Island,Ha- waii,USA,2002,188一196. [2]Raya M, Hubaux J P. Securing vehicular Ad hoc networks. Journal of Computer Security, 2007,15(1):39一68. [3]Adibi S, Agnew G B. Multilayer flavored dy- namic source routing in mobile ad-hoc net- works. The institution of Engineering and Technology Communications, 2008,2(5):690一707. [4]Johnson D, Maltz D. Dynamic source routing in Ad-hoc wireless networks, Imiclinski T,Korth H. Mobile Computing. Norwcll:Kluwcr Aca- demic Publishers, 1996,153一181. [5]Perkins C, Belding E, Das S. Ad-hoc on-de mand distance vector (AODV) routing, Internet Engineering Task Force Request for Comments,2003,561. [6]Zhang Q, Hu G M,Chen H T,et al. Cluste- ring algorithm and analysis based on objective trust modeling in MANET. Journal on Commu- nications, 2009, 35(2); 12~21.(张强,胡光明,陈海涛等.MANET基于客观信任度建模的分簇算法与分析.通信学报,2009, 35(2); 12一21.) [7]Peng S C,Jia W J,Wang G J,et al.Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks.The institute of Elec- tronics, Information and Communication Engi- neers Transactions on information and Systems,2010,E93一D(3):510一517. [8]Pirzada A A,McDonald C. Establishing trust in pure ad-hoc networks. Proceedings of A us tralasian Conference on Computer Science,2004,56:47~54 [9]A nantvalce T,Wu J. Reputation-based system for encouraging the cooperation of nodes in mo- bile Ad-hoc networks. Proceedings of IEEE In- ternational Conference on the Communications,2007,3383一3388. [10]Peng S C, Jia W J,Wang G J. Voting-based clustering algorithm with subjective trust and stability in mobile ad-hoc networks. Proceed- ings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008, 2:3一9. [11]Luo J,Liu X, Zhang Y,et al. Fuzzy trust rec ommendation based on collaborative filtering for mobile ad-hoc networks. Proceedings of IEEE Conference on Local Computer Networks,2008,305一311. [12]Li J,Li R,Kato J. Future trust management framework for mobile Ad-hoc networks, IEEE Communications Magazine,2008,46(4): 108一114. [13]Marti S, Giuli T J,Lai K,et al. Mitigating routing misbehavior in mobile Ad-hoc net- works. Proceedings of nternational Conference on Mobile Computing and Networking, 2000,255一265. [14]Buchegger S, Boudec Le J Y. Performance anal- ysis of the CONF7DANT protocol:Cooperation of nodes-fairness in dynamic ad-hoc networks. Proceedings of ACM international Symposium on Mobile Ad-hoc Networking and Computing, 2002,226一236. [15]Yang H B, Zhang N R. The comparative study of secure routing protocols for mobile Ad Hoc networks. Journal of Nanjing University(Natu- ralScicnces), 2005, 41(5): 340~346.(杨华兵,张宁蓉.移动Ad Hoc网络安全路由协议的比较研究.南京大学学报(自然科学),2005, 41 (5):340一346). [16]Winjum E Spilling P,Kure ¢.Trust metric routing to regulate routing cooperation in mobile wireless Ad-hoc networks. Proceedings of Eu ropcan Wireless,2005,399一406. |
No related articles found! |
|