期刊文献+

基于可用性信任模型的AODV路由协议改进 被引量:6

Improvement of AODV based on the availability trust model
原文传递
导出
摘要 针对当前MANET安全机制研究中过于关注机密性和完整性而忽略可用性的问题,该文指出在MANET这样无中心、动态拓扑、资源受限的环境中,信任模型是最为合理的安全解决方案,从而提出基于可用性的信任模型。并在此基础上,以网络数据包的传递作为信任参考依据,对传统的AODV路由协议进行了改进,提出了ATAODV路由协议。网络模拟实验的数据显示基于可用性信任模型的ATAODV相对于传统AODV,丢包率平均降低了70.2%。 Traditional security research of mobile ad hoc network(MANET) focuses on the information confidentiality and integrity but ignores the availability.This paper notes that the best security solution for center-less,dynamic and resource-constrained MANET is the trust model.An availability trust model was then developed based on the packet forwarding in the network to improve the ad hoc on-demand distance vector routing(AODV) protocol,named availability trust AODV(ATAODV).Simulations show that the packet loss ratio of ATAODV declined by 70.2% compared with that of AODV.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第5期735-738,共4页 Journal of Tsinghua University(Science and Technology)
关键词 移动自组织网络 可用性 AODV mobile ad hoc network(MANET) availability ad hoc on-demand distance vector routing(AODV)
  • 相关文献

参考文献11

  • 1Djenouri D, Khelladi L, Badache A N. A survey of security issues in mobile ad hoc and sensor networks[J].IEEE Communications Surveys & Tutorials, 2005, 7(4): 2-28. 被引量:1
  • 2Zhou L D, Zygmunt J H. Securing ad hoc networks[J]. IEEE Network, 1999, 13(6): 24 - 30. 被引量:1
  • 3Capkun S, Buttyan L, Hubaux J P. Self-organized public-key management for mobile ad hoe networks[J]. IEEE Transactions on Mobile Computing, 2003, 2(1): 52- 64. 被引量:1
  • 4Seung Y, Robin K. MOCA: Mobile certificate authority for wireless ad hoc networks[C]// The 2nd Annual PKI Research Workshop (PKI 03). USA: University of Illinois, 2003, 65 - 79. 被引量:1
  • 5Pirzada A A, McDonald C. Establishing trust in pure ad hoc networks[C]// Proc the 27th Australasian Conference on Computer Science. Australia: Australian Computer Society, 2004:47 - 54. 被引量:1
  • 6Abdul Rahman A, Hailes S. A distributed trust model[C]// Proc the 1997 New Security Paradigms Workshop. New York: ACM, 1998: 48-60. 被引量:1
  • 7Beth T, Borcherding M, Klein B. Valuation of trust in open network [C]// Proc of the European Syrup on Research in Security. Berlin: Springer Verlag, 1994:3- 18. 被引量:1
  • 8Jφsang A. A subjective metric of authentication [C]// Computer Security-Esorics 98. Berlin: Springer, 1998: 329- 344. 被引量:1
  • 9Jφsang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision [J]. Decision Support Systems, 2007, 43(2) : 618 - 644. 被引量:1
  • 10Ray I, Chakraborty S. A vector model of trust for developing trustworthy systems [C]// Computer Security Esorics 2004. Berlin: Springer, 2004:260- 275. 被引量:1

同被引文献56

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部