浏览全部资源
扫码关注微信
1. 西安电子科技大学 计算机学院,陕西 西安 710071
2. 中国电子科技集团36所通信信息控制和安全技术重点实验室,浙江 嘉兴 314033
3. 海南大学 信息科学技术学院,海南 海口 570228
[ "刘卓超(1990-),男,湖北武汉人,西安电子科技大学硕士生,主要研究方向为无线自组织网络路由协议及安全技术等。" ]
[ "杨力(1977-),男,陕西乾县人,西安电子科技大学副教授、硕士生导师,主要研究方向为无线网络安全、可信计算、应用密码学等。" ]
[ "姜奇(1983-),男,安徽全椒人,西安电子科技大学副教授、硕士生导师,主要研究方向为安全协议及无线网络安全技术。" ]
[ "王巍(1980-),男,河北张家口人,中国电子科技集团36所高级工程师,主要研究方向为网络安全、网络对抗等。" ]
[ "曹春杰(1977-),男,河北衡水人,海南大学副教授,主要研究方向为信息安全、应用密码学。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-30
移动端阅览
刘卓超, 杨力, 姜奇, 等. 基于信任评估的Ad Hoc网络关键节点选取算法[J]. 通信学报, 2014,35(Z2):213-219.
Zhuo-chao LIU, Li YANG, Qi JIANG, et al. Critical nodes selection based on trust evaluation in Ad Hoc networks[J]. Journal on communications, 2014, 35(Z2): 213-219.
刘卓超, 杨力, 姜奇, 等. 基于信任评估的Ad Hoc网络关键节点选取算法[J]. 通信学报, 2014,35(Z2):213-219. DOI: 10.3969/j.issn.1000-436x.2014.z2.029.
Zhuo-chao LIU, Li YANG, Qi JIANG, et al. Critical nodes selection based on trust evaluation in Ad Hoc networks[J]. Journal on communications, 2014, 35(Z2): 213-219. DOI: 10.3969/j.issn.1000-436x.2014.z2.029.
Ad Hoc 网络中存在关键节点,它们的失效会严重影响网络性能。为了有效地选取重要且可信的关键节点,给出了关键节点的定义,提出了一种基于信任评估的关键节点选取算法。首先利用节点收缩法计算节点的重要度,然后结合D-S证据理论,建立节点的信任评估模型,通过该模型得到节点的客观信任值来判断节点的可信度,最后综合考虑节点的重要度和可信度来选取关键节点。仿真实验结果表明,通过该方法得到的关键节点失效后将造成网络性能急剧下降。
There are some critical nodes in Ad Hoc networks
and the failure of these critical nodes can critically affect the performance of the network.For the aim of selecting the important and trusted critical nodes in Ad Hoc networks
the definition of critical nodes is given
meanwhile
a critical nodes selection algorithm based on trust evaluation is proposed.By using the node contraction
the importance degree of the node is calculated.Then combined with D-S evidence theory
the trust evaluation model of critical node is presented
which is used to obtain the objective trust of the node and to judge the credibility of the node.Finally
the critical nodes are selected by considering of the importance degree and the credibility of the node.Simulation results show that when those critical nodes are failure
selected by the proposed algorithm
the network performance is decreasing significantly.
RAMANATHAN R , REDI J . A brief overview of Ad Hoc networks:challenges and directions [J ] . IEEE Communication Magazine , 2002 , 40 ( 5 ): 20 - 22 .
YANG H , LUO H , YE F . Security in mobile Ad Hoc networks:challenges and solutions [J ] . Wireless Communications,IEEE , 2004 , 11 ( 1 ): 38 - 47 .
BASU P , REDI J . Movement control algorithms for realization of faultolerant Ad Hoc robot networks [J ] . IEEE Network , 2004 , 18 ( 4 ): 36 - 44 .
SHEN Z , CHANG Y L , CUI C . A fault-tolerant and minimum-energy path-preserving topology control algorithm for wireless multi-hop networks [A ] . International Conference on Computational Intelligence and Security (CIS) [C ] . Xi’an,China , 2005 . 864 - 869 .
GOYAL D , CAFFERY J . Partitioning avoidance in mobile Ad Hoc networks using network survivability concepts [A ] . The 7th IEEE Symposium on Computers and Communications (ISCC) [C ] . Taormina,Italy , 2002 . 553 - 558 .
JORGIC M , HAUSPIE M,SIMPLOT-RYL D . Localized algorithms for detection of critical nodes and links for connectivity in Ad Hoc networks [A ] . Proceedings of 3rd IFIP Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET 2004) [C ] . Turkey , 2004 .12.
SHENG M , LI J D , SHI Y . Critical nodes detection in mobile Ad Hoc network [A ] . IEEE the 20th International Conference on Advanced Information Networking and Applications (IEEE AINA) [C ] . Vienna,Austria , 2006 . 336 - 340 .
李建东 , 田野 , 盛敏 . 大规模 Ad Hoc 网络拓扑分割探测研究 [J ] . 通信学报 , 2008 , 29 ( 9 ): 54 - 61 .
LI J D , TIAN Y , SHENG M . Partition detection for large scale Ad Hoc networks [J ] . Journal on Communications , 2008 , 29 ( 9 ): 54 - 61 .
MARTI S , GIULI T J , LAI K , et al . Mitigating routing misbehavior in mobile Ad Hoc networks [A ] . Proceedings of the 6th Annual International Conference on Mobile Computing and Networking [C ] . ACM , 2000 . 255 - 265 .
GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile Ad Hoc networks:a survey [J ] . Communications Surveys & Tutorials , 2012 , 14 ( 2 ): 279 - 298 .
CHO J H , SWAMI A , CHEN R . A survey on trust management for mobile Ad Hoc networks [J ] . Communications Surveys & Tutorials , 2011 , 13 ( 4 ): 562 - 583 .
谭跃进 , 吴俊 , 邓宏钟 . 复杂网络中节点重要度评估的节点收缩方法 [J ] . 系统工程理论与实践 , 2006 , 26 ( 11 ): 79 - 83 .
TAN Y J , WU J , DENG H Z . Evaluation method for node importance based on node contraction in complex networks [J ] . Journal of Systems Science and Information , 2006 , 26 ( 11 ): 79 - 83 .
DEMPSTER A P . Upper and lower probabilities induced by a multi-valued mapping [J ] . The Annals of Mathematical Statistics , 1967 , 38 ( 2 ): 325 - 339 .
SHAFER G . A Mathematical Theory of Evidence [M ] . Princeton : Princeton University PressPress , 1976 .
AHMED M R , HUANG X , SHARMA D . A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks [A ] . Proceedings of the thirteenth ACM international symposium on Mobile Ad hoc Networking and Computing [C ] . ACM , 2012 . 259 - 260 .
叶阿勇 , 马建峰 . 一种移动自组网中信任评估模型的设计 [J ] . 计算机研究与发展 , 2008 , 45 ( 5 ): 765 - 771 .
YE A Y , MA J F . A trust valuation model in MANET [J ] . Journal of Computer Research and Development , 2008 , 45 ( 5 ): 765 - 771 .
ING Q , TANG L CHEN Z . Trust management in wireless sensor networks [J ] . Journal of Software , 2008 , 19 ( 7 ): 1716 - 1730 .
ZADEH L A . A simple view of the Dempster-Shafer theory of evidence and its implication for the rule of combination [J ] . AI Magazine , 1986 , 7 ( 2 ): 85 - 90 .
MURPHY C K . Combining belief functions when evidence conflicts [J ] . Decision Support Systems , 2000 , 29 ( 1 ): 1 - 9 .
JOUSSELME A L , MAUPIN P . Distances in evidence theory:Comprehensive survey and generalizations [J ] . International Journal of Approximate Reasoning , 2012 , 53 ( 2 ): 118 - 145 .
陈一雷 , 王俊杰 . 一种 D-S 证据推理的改进方法 [J ] . 系统仿真学报 , 2004 , 16 ( 1 ): 28 - 30 .
CHEN Y L , WANG J J . An improved method of D-S evidential reasoning [J ] . Journal of System Simulation , 2004 , 16 ( 1 ): 28 - 30 .
WEI J , GUO W , SU J , et al . Mobile agent based topology discovery in mobile Ad Hoc networks [A ] . Wireless Communications,Networking and Mobile Computing 2009 [C ] . 2009 . 1 - 4 .
MIGAS N , BUCHANAN W J , MCARTNEY K A . Mobile agents for routing topology discovery,and automatic network reconfiguration in ad-hoc networks [A ] . Engineering of Computer-Based Systems,2003.Proceedings.10th IEEE International Conference and Workshop on the IEEE [C ] . 2003 . 200 - 206 .
NS3 [EB/OL ] . http://www.nsnam.org http://www.nsnam.org .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构