期刊文献+

基于区域动态信任管理的可信路由协议 被引量:1

Credible Routing Protocol Based on the Zone Dynamic Trust Management
下载PDF
导出
摘要 在区域路由协议ZRP的基础上,提出了一种新的移动Ad hoc网络安全可信路由协议。此协议使用基于区域动态管理的可信度计算方法以及身份验证技术,采用动态调整、区域更新、必要时验证等策略,可有效防止路径中信息篡改和路由失效等恶意节点的攻击,提高了网络中路由信息的可信度,较好地解决了Ad hoc网络的路由安全问题。 Based on the zone routing protocol (ZRP) ,a new secure and credible routing protocol of mobile Ad hoc network was proposed. This protocol can effectively prevent the attacks from malicious nodes,such as information tampering and routing failures,etc, in the routing path by using the method of calculating credibility based on the zone dynamic management and authentication technique and, adopting a number of strategies, such as dynamic adjustment, regional updates,as well as verification when necessary, and so on. Accordingly, it improved the credibility of routing information and better solved the routing security issues in the Ad hoc network.
作者 李静 卫文学
出处 《山东科技大学学报(自然科学版)》 CAS 2010年第3期84-88,共5页 Journal of Shandong University of Science and Technology(Natural Science)
基金 "十一五"国家科技支撑计划项目(2006BAJ09B10)
关键词 AD HOC网络 可信度 路由协议 身份验证 Ad hoc network credibility routing protocol authentication
  • 相关文献

参考文献11

二级参考文献34

  • 1袁禄来,曾国荪,姜黎立,蒋昌俊.网格环境下基于信任模型的动态级调度[J].计算机学报,2006,29(7):1217-1224. 被引量:53
  • 2Zygmunt J Haas,et al.Wireless Ad Hoc Networks.Wiley Encyclopedia of Telecommunications,December 2002 被引量:1
  • 3Hongbo Zhou.A Survey on Routing Protocols in MANETs.MSU-CSE-03-8,( Tech Report) 被引量:1
  • 4Zygmunt J Haas,et al.The Zone Routing Protocol (ZRP) for Ad Hoc Networks.draft-ietf-manet-zone-zrp-04.txt,July 2002 被引量:1
  • 5M R Pearlman,Z J Haas.Determining the Optimal Configuration for the Zone Routing Protocol.IEEE Journal on Selected Areas in Communications,Special Issue on Wireless Ad Hoc Networks,August 1999,17(8):1395~1414 被引量:1
  • 6Z J Haas,M Perlman.The performance of query control schemes for the zone routing protocol.IEEE/ACM Trans.on Networking,2001,9(4):427~438 被引量:1
  • 7Z J Hass.A new routing protocol for the reconfigurable wireless networks.Proc.IEEE ICUPC'97,CA,Oct 1997 被引量:1
  • 8JOHNSON D B, MALTZ A D, HU Y C. The dynamic source routing protocol for mobile Ad Hoc Networks(DSR) [EB/OL]. http.//tools. ietf. org/wg/manet/draft-ietf-manet-dsr/draft-ietf-manet-dsr-10, txt, 2005-07-17. 被引量:1
  • 9SHI Jinglun, ZHANG Ling, DONG Shoubin, et al. A stability based multipath routing algorithm for Ad Hoc networks[A]. 14th IEEE Proceedings on Personal, Indoor and Mobile RadioCommunications[C]. Beijing, China, 2003. 被引量:1
  • 10MARWAHA S, SRINIVASAN D, CHEN K T, VASILAKOS A. Evolutionary fuzzy multi-objective routing for wireless mobile ad hoe networks[A]. Congress on Evolutionary Computation[C]. Portland, USA, 2004. 被引量:1

共引文献35

同被引文献7

  • 1Johansson T, Carr-Motyckova, L. Bandwidth constrained clustering in ad hoc networks [C] //Proceedings of the 3th Annual Mediterranean Ad Hoc Networking Workshop. Piscataway: IEEE, 2004: 379-385. 被引量:1
  • 2Chattejek M, Das S, Turgut D, WCA: A weighted clus- tering algorithm for mobile ad hoc networks [J]. Cluster Computing, 2002 (5) :193-204. 被引量:1
  • 3Chen T, Mehani O, Boreli R. Trusted routing for VANETs [C] //Proceedings of the 9th International Con- ference on Intelligent Transport Systems Tele- communications. Piscataway: IEEE Computer Society, 2009 : 647-552. 被引量:1
  • 4Virendra M, Jadliwala M, Chandrasekaran M, et al. Quantifying trust in mobile ad-hoc networks[C]// Pro- ceedings of International Conference on Integration ofKnowledge Intensive Multi-Agent Systems. Piscataway: IEEE Computer Society, 2005 : 65-70. 被引量:1
  • 5Buchegger S, Le Boudec J Y. Performance analysis of the CONFIDANT protocol[C]//Proceedings of the Interna- tional Symposium on Mobile Ad Hoc Networking and Computing. New York: Association for Computing Ma- chinery, 2002: 226-236. 被引量:1
  • 6Coi J, Jtmg S. Asecurity framework with strong non- repudiation and privacy in VANETs[C]//Proceedings of the 6th IEEE Consumer Communications and Network- ing Conference. Piscataway: IEEE, 2009: 835-839. 被引量:1
  • 7何俊婷,刘衍珩,王健.一种高生存性的车载自组网可信路由协议[J].武汉大学学报(理学版),2010,56(2):189-193. 被引量:2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部