为了防止网络中存在的潜在恶意节点被加入到机会路由的候选转发集中,减少网络能量的消耗,并保证数据的可靠传输,提出了一种在无线传感器网络中基于信任度的节能机会路由(Trust Based Energy Efficient Opportunistic Routing in Wireles...为了防止网络中存在的潜在恶意节点被加入到机会路由的候选转发集中,减少网络能量的消耗,并保证数据的可靠传输,提出了一种在无线传感器网络中基于信任度的节能机会路由(Trust Based Energy Efficient Opportunistic Routing in Wireless Sensor Networks,TBEEOR)算法。该算法根据网络的拓扑结构计算节点的代数连通度,进而计算节点的连通度诚意;再联合节点的转发诚意和ACK诚意,利用信息熵的概念计算综合信任度;最后,用节点的综合信任度来计算节点之间通信和协作造成的能量消耗,从而得到网络的预期成本。此外,该算法能够有效地识别和判断网络中的恶意节点,进一步减小了恶意节点对网络性能的影响。实验结果表明,TBEEOR算法有效地保证了数据传输的可靠性,有助于延长网络生命周期,从而增加了网络吞吐量,减少了网络能量消耗。展开更多
Many cyber physical networks will involve ad hoc deployments utilizing peer-to-peer communications. Examples include transportation systems where a group of moving cars communicate in order to avoid collisions, teams ...Many cyber physical networks will involve ad hoc deployments utilizing peer-to-peer communications. Examples include transportation systems where a group of moving cars communicate in order to avoid collisions, teams of robotic agents that work together in support of disaster recovery, and sensor networks deployed for health-care monitoring, monitoring the operation of a factory plant or to coordinate and actuate mechanisms for energy conservation in a building. These networks may face a variety of threats that puncture their connectivity and, should their performance degrade, the result could be catastrophic. Consider, for example, a vehicular ad hoc network where communication assists collision avoidance. In such a case, degradation could lead to vehicle accidents. Therefore, in order to overcome network performance degradations and the puncture of a network (such as blackhole or jamming) which is under attack, we propose an algorithm called the Fiedler Value Power Adjustment Topology Adaption (FVPATA). FVPATA aims to dynamically adapt an ad hoc network's topology, even if the attacker varies its location and in the case of an interference-style attack by increasing the interference power. The algorithm utilizes the formulation from the graph theory which works with the Fiedler value to guide each node in wireless ad hoc network utilizing power adjustments to enhance the network's overall robustness. The advantage of the proposed mechanism is that it is a light-weight approach which is totally distributed, based on topology updates inherent in the Optimized Link State Routing (OLSR) protocol and, hence, it is unnecessary to introduce additional messages. Additionally, an algorithm was developed to resolve problems involving asymmetric links that arise in ad hoc networks by eliminating unnecessary energy consumption of Fiedler nodes. Simulation results using NS3 show that the proposed mechanism successfully decreases the average amount of hops used by 50% and the delay of flows when nodes are mig展开更多
文摘为了防止网络中存在的潜在恶意节点被加入到机会路由的候选转发集中,减少网络能量的消耗,并保证数据的可靠传输,提出了一种在无线传感器网络中基于信任度的节能机会路由(Trust Based Energy Efficient Opportunistic Routing in Wireless Sensor Networks,TBEEOR)算法。该算法根据网络的拓扑结构计算节点的代数连通度,进而计算节点的连通度诚意;再联合节点的转发诚意和ACK诚意,利用信息熵的概念计算综合信任度;最后,用节点的综合信任度来计算节点之间通信和协作造成的能量消耗,从而得到网络的预期成本。此外,该算法能够有效地识别和判断网络中的恶意节点,进一步减小了恶意节点对网络性能的影响。实验结果表明,TBEEOR算法有效地保证了数据传输的可靠性,有助于延长网络生命周期,从而增加了网络吞吐量,减少了网络能量消耗。
文摘Many cyber physical networks will involve ad hoc deployments utilizing peer-to-peer communications. Examples include transportation systems where a group of moving cars communicate in order to avoid collisions, teams of robotic agents that work together in support of disaster recovery, and sensor networks deployed for health-care monitoring, monitoring the operation of a factory plant or to coordinate and actuate mechanisms for energy conservation in a building. These networks may face a variety of threats that puncture their connectivity and, should their performance degrade, the result could be catastrophic. Consider, for example, a vehicular ad hoc network where communication assists collision avoidance. In such a case, degradation could lead to vehicle accidents. Therefore, in order to overcome network performance degradations and the puncture of a network (such as blackhole or jamming) which is under attack, we propose an algorithm called the Fiedler Value Power Adjustment Topology Adaption (FVPATA). FVPATA aims to dynamically adapt an ad hoc network's topology, even if the attacker varies its location and in the case of an interference-style attack by increasing the interference power. The algorithm utilizes the formulation from the graph theory which works with the Fiedler value to guide each node in wireless ad hoc network utilizing power adjustments to enhance the network's overall robustness. The advantage of the proposed mechanism is that it is a light-weight approach which is totally distributed, based on topology updates inherent in the Optimized Link State Routing (OLSR) protocol and, hence, it is unnecessary to introduce additional messages. Additionally, an algorithm was developed to resolve problems involving asymmetric links that arise in ad hoc networks by eliminating unnecessary energy consumption of Fiedler nodes. Simulation results using NS3 show that the proposed mechanism successfully decreases the average amount of hops used by 50% and the delay of flows when nodes are mig
基金Supported by the National Natural Science Foundation of China(10871166)the Science Foundation of Shanghai Education Com-mittee (05QZ01)the Financial Grant of Shanghai Department of Finance (1138IA0005 and 1139IA0013)