期刊文献+

基于分布式信任管理的时延容忍网络数据转发方案 被引量:1

DATA FORWARDING SCHEME IN DELAY TOLERANT NETWORKS BASED ON DISTRIBUTED TRUST MANAGEMENT
下载PDF
导出
摘要 为解决时延容忍网络中恶意或自私节点严重影响网络性能的问题,提出一种基于分布式信任管理的时延容忍网络数据转发方案。通过计算节点信任值先滤除网络中的恶意节点,再执行数据转发行为。根据节点的转发行为以及它们的能量消耗信息计算出直接信任;邻居节点推荐的信息融合间接信任和推荐信誉计算出推荐信任;融合直接信任和推荐信任得到节点总体信任,并利用信任记录窗口对节点信任值进行更新。仿真结果表明:所提方案能有效消除时延容忍网络路由的不正当行为,在数据包传递率、开销和时延等性能上均优于RBTM方案、CWS方案和SPRAY方案。 In order to resolve the problem that malicious nodes or selfish nodes seriously affect network performance in delay tolerant network,a distributed trust management-based data forwarding scheme in delay tolerant network is proposed.It filtered out the malicious nodes in the network by calculating the trust value of nodes,and then performed the data forwarding behavior.The direct trust was calculated according to the forwarding behavior of nodes and their energy consumption information;the recommendation trust was calculated by the information fusion indirect trust and recommendation reputation of neighbor nodes;direct trust and recommendation trust were fused to obtain the overall trust of the node,and the trust value of the node was updated by using the trust record window.Simulation results show that the proposed scheme can effectively eliminate the improper behavior of network routing and is superior to the scheme of RBTM,CWS and SPRAY in the performance of packet transmission rate,overhead and delay.
作者 邬迎 高静 Wu Ying;Gao Jing(Zhengzhou University of Economics and Business,Zhengzhou 451191,Henan,China)
机构地区 郑州经贸学院
出处 《计算机应用与软件》 北大核心 2021年第1期116-120,134,共6页 Computer Applications and Software
基金 河南省科技厅科技攻关项目(192102210287)。
关键词 时延容忍网络 分布式信任管理 直接信任 间接信任 恶意节点 Delay tolerant networks Distributed trust management Direct trust Indirect trust Malicious node
  • 相关文献

参考文献4

二级参考文献39

  • 1程林,陈福生.无线Ad hoc网络路由协议的分析比较[J].计算机工程与应用,2004,40(22):143-149. 被引量:19
  • 2宫晓强,尚飞,刘洛琨.利用局域网对无线自组网路由协议DSR进行仿真[J].微计算机信息,2005,21(09X):56-58. 被引量:14
  • 3符琦,蒋云霞,蒋瑞林.基于NS2的Ad Hoc网络路由协议的模拟实现[J].计算机工程与应用,2006,42(5):149-151. 被引量:18
  • 4郑少仁,王海涛,赵志峰,等.Ad Hoc网络技术[M].北京:人民邮电出版社,2008,1(13):64-79. 被引量:1
  • 5Burgess J,Gallagher B,Jensen D,et al.Maxprop:Routing for vehiclebased disruption-tolerant networking[C]//Proceedings of IEEE INFOCOM’06,April 2010. 被引量:1
  • 6Zhang Z.Routing in intermittently connected mobile ad hoc networks and delay tolerant networks:Overview and challenges[J].IEEE Communications Surveys Tutorials,2009,8(1):24-37. 被引量:1
  • 7Spyropoulos T,Psounis K,Raghavendra C S.Spray and focus:Efficient mobility-assisted routing for heterogeneous and correlated mobility[C]//Proceedings of IEEE PerCom Workshop on Intermittently Connected Mobile Ad hoc Networks,March 2009. 被引量:1
  • 8Li J,Mohapatra P.Laker:location aided knowledge extraction routing for mobile ad hoc networks[C]//Proceedings of IEEE Wireless Communications and Networking,March 2013. 被引量:1
  • 9Wang X,Shu Y,Jin Z,et al.Adaptive randomized epidemic routing for disruption tolerant networks[C]//Proceedings of the 5th International Conference on Mobile Ad-hoc and Sensor Networks,pages 424-429,December 2009. 被引量:1
  • 10Spyropoulos T,Psounis K,Raghavendra C S.Performance analysis of mobility-assisted routing[C]//Proceedings of the ACM MobiHoc’06,May 2012. 被引量:1

共引文献2

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部