Wireless Mesh network secure routing mechanism based on dynamic reputation
Correspondences|更新时间:2024-06-05
|
Wireless Mesh network secure routing mechanism based on dynamic reputation
Journal on CommunicationsVol. 40, Issue 4, Pages: 195-201(2019)
作者机构:
中国民航大学计算机科学与技术学院,天津 300300
作者简介:
基金信息:
The Civil Aviation Joint Research Fund Project of National Natural Science Foundation of China(U1833107);The National Science and Technology Major Project(2012ZX03002002)
Aiming at the problem that the wireless Mesh network (WMN) security routing mechanism was scarce and internal malicious nodes drop data packets during data transmission
a secure routing mechanism based on dynamic reputation (SRMDR) for wireless Mesh network was proposed.Firstly
the dynamic reputation mechanism was used to evaluate the node’s behavior
the node’s comprehensive reputation value was calculated according to the node’s direct reputation value and the recommended reputation value
and the node’s dynamic reputation value was calculated according to the node’s historical comprehensive reputation value and the current comprehensive reputation value.Then
the dynamic reputation was combined with the routing mechanism to establish secure routing paths
the nodes with a dynamic reputation value less than the threshold were determined to be malicious nodes
which were isolated during the routing process.Experimental results show that compared with HWMP and SHaRP
SRMDR has higher malicious node recognition rates
and SRMDR can effectively reduce packet loss rate and improve network throughput.
YANG H Y , LI H . Malicious node detection model for wireless Mesh networks [J ] . Journal of Tsinghua University (Science and Technology) , 2017 , 57 ( 7 ): 687 - 694 .
BARGHI H , AZHARI V.A practical sleep coordination and management scheme with duty cycle control for energy sustainable IEEE 802 . 11s wireless mesh networks [J ] . Wireless Networks , 2018 , 12 ( 4 ): 1 - 26 .
MALARVIZHI L , GOPALAKRISHNAN V . Malicious node detection scheme for upgraded femtocell architecture in wireless mesh networks [J ] . Journal of Computational & Theoretical Nanoscience , 2016 , 13 ( 7 ): 4573 - 4579 .
SARMA D , KAR A , MALL R . A hierarchical and role based secure routing protocol for mobile wireless sensor networks [J ] . Wireless Personal Communications , 2016 , 90 ( 3 ): 1067 - 1103 .
BOUNOUNI M , BOUALLOUCHE-MEDJKOUNE L . A hybrid stimulation approach for coping against the malevolence and selfishness in mobile Ad Hoc network [J ] . Wireless Personal Communications , 2016 , 88 ( 2 ): 255 - 281 .
WU J , MO W W , YIN X Q , et al . Trusted opportunistic routing forwarding model based on feedback credibility [J ] . Computer Engineering and Applications , 2017 , 53 ( 8 ): 23 - 28 .
GUO J , ZHOU X , YUAN J , et al . Secure access control guarding against internal attacks in distributed networks [J ] . Wireless Personal Communications , 2013 , 68 ( 4 ): 1595 - 1609 .
SOOKHAK M , AKHUNDZADA A , SOOKHAK A , et al . Geographic wormhole detection in wireless sensor networks [J ] . Plos One , 2015 , 10 ( 1 ): 77 - 98 .
HOOGH J , ZANNONE N . Flow-based reputation with uncertainty:evidence-based subjective logic [J ] . International Journal of Information Security , 2016 , 15 ( 4 ): 381 - 402 .
CHO H . Dynamics of uncertain and conflicting opinions in social networks [J ] . IEEE Transactions on Computational Social Systems , 2018 , 5 ( 2 ): 518 - 531 .
LIN H , MA J F . Cross layer reputation mechanism based secure routing protocol for WMNs [J ] . Journal of Xidian University , 2014 , 41 ( 1 ): 116 - 123 .
PLOUMIDIS M , PAPPAS N , TRAGANITIS A . Flow allocation for maximum throughput and bounded delay on multiple disjoint paths for random access wireless multihop networks [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 1 ): 720 - 733 .