重庆邮电大学 光通信与网络重点实验室,重庆 400065
[ "吴大鹏(1979-),男,黑龙江大庆人,重庆邮电大学教授、硕士生导师,主要研究方向为泛在无线网络、社会计算、互联网服务质量控制。" ]
[ "张洪沛(1988-),男,河南南阳人,重庆邮电大学硕士生,主要研究方向为间断连接无线网络、信任管理机制、服务发现。" ]
[ "王汝言(1969-),男,湖北浠水人,博士,重庆邮电大学教授、博士生导师,主要研究方向为泛在网络、多媒体信息处理等。" ]
[ "刘乔寿(1979-),男,云南曲靖人,重庆邮电大学副教授,主要研究方向为泛在无线网络、物联网等。" ]
网络首发:2015-08,
纸质出版:2015-08-25
移动端阅览
吴大鹏, 张洪沛, 王汝言, 等. 可信度动态感知的间断连接无线网络数据转发机制[J]. 通信学报, 2015,36(8):13-22.
Da-peng WU, Hong-pei ZHANG, Ru-yan WANG, et al. Dynamical credibility aware data forwarding mechanism for intermittently connected wireless networks[J]. Journal on Communications, 2015, 36(8): 13-22.
吴大鹏, 张洪沛, 王汝言, 等. 可信度动态感知的间断连接无线网络数据转发机制[J]. 通信学报, 2015,36(8):13-22. DOI: 10.11959/j.issn.1000-436x.2015159.
Da-peng WU, Hong-pei ZHANG, Ru-yan WANG, et al. Dynamical credibility aware data forwarding mechanism for intermittently connected wireless networks[J]. Journal on Communications, 2015, 36(8): 13-22. DOI: 10.11959/j.issn.1000-436x.2015159.
提出了一种节点可信度动态感知的间断连接无线网络数据转发机制,节点根据运动过程中所获知的局部网络状态信息以分布式的方式估计其他节点恶意度及协作度,并根据历史信息预测节点的连通状态,进而获知各个节点的信任程度,以合理地选择中继节点,实现高效的数据转发。仿真结果表明,所提出的机制能够有效提高数据传输的可靠性,并大幅降低网络负载率,提高网络资源利用率。
A novel dynamic credibility aware packet forwarding mechanism for intermittently connected wireless networks is proposed.According to the network state information obtained locally by a moving node
the malicious degrees and collaboration degrees of nodes can be obtained in a distributed manner.Meanwhile
based on the node connectivity
the credibility of a node is estimated
furthermore
the relay node can be selected reasonably.Results show that the proposed mechanism can effectively enhance the reliability of data transmission while reducing the network load rate significantly.Thus
the utilization of network resources is improved.
DARSHANA P , VANDANA V . Security enhancement of AODV protocol for mobile ad hoc network [J ] . International Journal of Application or Innovation in Engineering & Management(IJAIEM) , 2013 , 2 ( 1 ): 317 - 321 .
ZHU Y , XU B , SHI X H , et al . A Survey of social-based routing in delay tolerant networks:positive and negative social effects [J ] . IEEE Communications Surveys & Tutorials , 2013 , 15 ( 1 ): 387 - 401 .
MANAM V K C , MAHENDRAN V , MURTHY C S R . Performance modeling of DTN routing with heterogeneous and selfish nodes [J ] . Wireless Networks , 2014 , 20 ( 1 ): 25 - 40 .
LI Y , SU G , WANG Z . Evaluating the effects of node cooperation on DTN routing [J ] . AEU-International Journal of Electronics and Communications , 2012 , 66 ( 1 ): 62 - 67 .
RESTA G , SANTI P . A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 1 ): 2 - 10 .
ZHU H , DU S , GAO Z , et al . A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 22 - 32 .
ANUSHA T , RAO N S . Improving the trust and adversary detection process for delay-tolerant networks [J ] . International Journal of Computer Science and Mobile Applications , 2013 , 1 ( 5 ): 44 - 50 .
GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile adhoc networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2012 , 14 ( 2 ): 279 - 298 .
WANG X , LIU L , SU J . Rlm:a general model for trust representation and aggregation [J ] . IEEE Transactions on Services Computing , 2012 , 5 ( 1 ): 131 - 143 .
LI F , WU J , SRINIVASAN A . Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets [A ] . IEEE INFOCOM 2009 [C ] . 2009 . 2428 - 2436 .
LI N , DAS S K . A trust-based framework for data forwarding in opportunistic networks [J ] . Ad Hoc Networks , 2011 , 11 ( 4 ): 1497 - 1509 .
AYDAY E , FEKRI F . An iterative algorithm for trust management and adversary detection for delay-tolerant networks [J ] . IEEE Transactions on Mobile Computing , 2012 , 11 ( 9 ): 1514 - 1531 .
HUI P , CROWCROFT J , YONEKI E . BUBBLE rap:social-based forwarding in delay-tolerant Networks [J ] . IEEE Transactions on Mobile Computing , 2011 , 10 ( 11 ): 1576 - 1589 .
EYUPHAN B , BOLESLAW K . Exploiting friendship relations for efficient routing in mobile social networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 12 ): 2254 - 2265 .
CHEUNG S , SUN Y , ABERER K , et al . Guest editorial:special issue on privacy and trust management in cloud and distributed systems [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 6 ): 835 - 837 .
KERÄNEN A , OTT J,KÄRKKÄINEN T . The one simulator for dtn protocol evaluation [A ] . Proceedings of the 2nd International Conference on Simulation Tools and Techniques.ICST(Institute for Computer Sciences,Social-Informatics and Telecommunications Engineering) [C ] . 2009 . 1 - 10 .
THOMPSON N , NELSON S C , BAKHT M , et al . Retiring replicants:congestion control for intermittently-connected networks [A ] . IEEE INFOCOM [C ] . 2010 . 1 - 9 .
LINDGREN A , DORIA A , SCHELEN O . Probabilistic routing in intermittently connected networks [J ] . ACM SIGMOBILE Mobile Computing and Communications Review , 2003 , 7 ( 3 ): 19 - 20 .
CHEN I , BAO F , CHANG M , et al . Dynamic trust management for delay tolerant networks and its application to secure routing [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 25 ( 5 ): 1200 - 1210 .
ZHOU H , CHEN J , ZHAO H , et al . On exploiting contact patterns for data forwarding in duty-cycle opportunistic mobile networks [J ] . IEEE Transactions on Vehicular Technology , 2013 , 62 ( 9 ): 4629 - 4642 .
孙利民 , 李建中 , 陈渝 . 无线传感器网络 [M ] . 北京 : 清华大学出版社 , 2005 .
SUN L , LI J Z , CHEN Y . Wireless Sensor Networks [M ] . Beijing : Tsinghua University Press , 2005 .
0
浏览量
1171
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621