Dynamical credibility aware data forwarding mechanism for intermittently connected wireless networks
Academic paper|更新时间:2024-06-05
|
Dynamical credibility aware data forwarding mechanism for intermittently connected wireless networks
Journal on CommunicationsVol. 36, Issue 8, Pages: 13-22(2015)
作者机构:
重庆邮电大学 光通信与网络重点实验室,重庆 400065
作者简介:
基金信息:
The National Natural Science Foundation of China(61371097);The Natural Science Foundation of Chongqing(cstc2013jjB40001);The Natural Science Foundation of Chongqing(cstc2013jjB40006);The Foundation of Chongqing University of Posts and Telecommunication(A2012-93);Youth Talents Training Project of Chongqing Science & Technology Commission(CSTC2014KJRC-QNRC40001)
A novel dynamic credibility aware packet forwarding mechanism for intermittently connected wireless networks is proposed.According to the network state information obtained locally by a moving node
the malicious degrees and collaboration degrees of nodes can be obtained in a distributed manner.Meanwhile
based on the node connectivity
the credibility of a node is estimated
furthermore
the relay node can be selected reasonably.Results show that the proposed mechanism can effectively enhance the reliability of data transmission while reducing the network load rate significantly.Thus
the utilization of network resources is improved.
关键词
Keywords
references
DARSHANA P , VANDANA V . Security enhancement of AODV protocol for mobile ad hoc network [J ] . International Journal of Application or Innovation in Engineering & Management(IJAIEM) , 2013 , 2 ( 1 ): 317 - 321 .
ZHU Y , XU B , SHI X H , et al . A Survey of social-based routing in delay tolerant networks:positive and negative social effects [J ] . IEEE Communications Surveys & Tutorials , 2013 , 15 ( 1 ): 387 - 401 .
MANAM V K C , MAHENDRAN V , MURTHY C S R . Performance modeling of DTN routing with heterogeneous and selfish nodes [J ] . Wireless Networks , 2014 , 20 ( 1 ): 25 - 40 .
LI Y , SU G , WANG Z . Evaluating the effects of node cooperation on DTN routing [J ] . AEU-International Journal of Electronics and Communications , 2012 , 66 ( 1 ): 62 - 67 .
RESTA G , SANTI P . A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 1 ): 2 - 10 .
ZHU H , DU S , GAO Z , et al . A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 22 - 32 .
ANUSHA T , RAO N S . Improving the trust and adversary detection process for delay-tolerant networks [J ] . International Journal of Computer Science and Mobile Applications , 2013 , 1 ( 5 ): 44 - 50 .
GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile adhoc networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2012 , 14 ( 2 ): 279 - 298 .
WANG X , LIU L , SU J . Rlm:a general model for trust representation and aggregation [J ] . IEEE Transactions on Services Computing , 2012 , 5 ( 1 ): 131 - 143 .
LI F , WU J , SRINIVASAN A . Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets [A ] . IEEE INFOCOM 2009 [C ] . 2009 . 2428 - 2436 .
LI N , DAS S K . A trust-based framework for data forwarding in opportunistic networks [J ] . Ad Hoc Networks , 2011 , 11 ( 4 ): 1497 - 1509 .
AYDAY E , FEKRI F . An iterative algorithm for trust management and adversary detection for delay-tolerant networks [J ] . IEEE Transactions on Mobile Computing , 2012 , 11 ( 9 ): 1514 - 1531 .
HUI P , CROWCROFT J , YONEKI E . BUBBLE rap:social-based forwarding in delay-tolerant Networks [J ] . IEEE Transactions on Mobile Computing , 2011 , 10 ( 11 ): 1576 - 1589 .
EYUPHAN B , BOLESLAW K . Exploiting friendship relations for efficient routing in mobile social networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 12 ): 2254 - 2265 .
CHEUNG S , SUN Y , ABERER K , et al . Guest editorial:special issue on privacy and trust management in cloud and distributed systems [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 6 ): 835 - 837 .
KERÄNEN A , OTT J,KÄRKKÄINEN T . The one simulator for dtn protocol evaluation [A ] . Proceedings of the 2nd International Conference on Simulation Tools and Techniques.ICST(Institute for Computer Sciences,Social-Informatics and Telecommunications Engineering) [C ] . 2009 . 1 - 10 .
THOMPSON N , NELSON S C , BAKHT M , et al . Retiring replicants:congestion control for intermittently-connected networks [A ] . IEEE INFOCOM [C ] . 2010 . 1 - 9 .
LINDGREN A , DORIA A , SCHELEN O . Probabilistic routing in intermittently connected networks [J ] . ACM SIGMOBILE Mobile Computing and Communications Review , 2003 , 7 ( 3 ): 19 - 20 .
CHEN I , BAO F , CHANG M , et al . Dynamic trust management for delay tolerant networks and its application to secure routing [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 25 ( 5 ): 1200 - 1210 .
ZHOU H , CHEN J , ZHAO H , et al . On exploiting contact patterns for data forwarding in duty-cycle opportunistic mobile networks [J ] . IEEE Transactions on Vehicular Technology , 2013 , 62 ( 9 ): 4629 - 4642 .