首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
针对无人机自组织网络(FANETs)容易遭受内部攻击、链路中断频繁的问题,提出了一种基于信任的按需多径距离矢量路由协议(TAOMDV).首先,建立了节点信任度评估模型,引入数据包转发率、可信交互度、探测包接收率作为信任评估因子,设计了自适应模糊信任聚合网络(AFTAN)计算节点的直接信任度,综合可信邻居节点的间接信任度以计算节点信任度.其次,引入信任波动惩罚机制,抵御信任模型中的开关攻击.最后,将信任模型应用于按需多径距离矢量路由协议(AOMDV)中,在路由发现阶段引入路径信任度作为路由选择依据,建立可信路径,在路由维护阶段通过路径报警机制对恶意节点做出及时响应.仿真结果表明TAOMDV不仅能抵御常见的黑洞、灰洞攻击与开关攻击,而且能够降低网络拓扑变更与链路中断的影响.与轻量级信任增强路由协议(TEAOMDV)相比,有效提高了网络的数据包投递率与吞吐量,优化了路由开销与平均端到端时延.  相似文献   

2.
节点间的信任关系对MANET网络路由协议的可靠性和安全性有重要意义,由于MANET网络的特性,难以通过传统的方式建立节点间信任关系。提出一个适用于MANET的信任评估模型CETM(Contribution and Evaluation Trust Model),用来度量MANET节点间信任关系,并将此模型应用于AODV协议中,提出了一种新的安全路由协议TAODV。仿真结果表明当网络中存在少于一半的恶意节点时,CETM能有效抵御如诋毁等恶意行为,从而显著地提高了交易的成功率。基于CETM的TAODV建立在可靠的节点信任关系之上,具有较好的安全性。  相似文献   

3.
在研究信任关系的基础上,介绍信任度的概念,同时提出一种信任度的计算方法,将主观判断和第三方认证结合起来得出节点间的信任关系,并在此基础上实现一种安全、灵活的信任管理机制和路由选择算法。通过仿真实验结果证明,该方法可以有效地提高路由协议的安全性能。  相似文献   

4.
作为下一代网络发展趋势之一的移动Ad Hoc网络受到各种类型的安全威胁,灰洞攻击就是其中最常见的类型之一。仿真模拟了MANET环境下的灰洞攻击,即选择性丢包攻击对MANET性能的影响。从仿真模拟中可以看出灰洞攻击对于MANET的路由影响,不仅导致丢包率增加,而且会导致端到端时延方面的增加。基于信任度的定义,提出一种可信AODV路由协议(Trusted AODV Routing,TAR),方案通过交换相邻节点的节点信任度,并计算路径信任度的方法,集合最短路径算法,从而选择合适的可信路径。通过性能分析,TAR协议在丢包率、端到端时延和路径建立时延方面,相比于AODV协议有明显的提高,能够有效地抵制灰洞攻击。  相似文献   

5.
李峰  司亚利  陈真  鲁宁  申利民 《软件学报》2018,29(9):2829-2843
提出一种基于信任机制的机会网络安全路由决策方法TOR,该方法在节点中引入信任向量的数据结构,记录节点携带消息能力的信任度.采用层状硬币模型和数字签名机制,在消息传递过程中将节点签名的转发证据动态捆绑到消息包上,依靠消息携带方式实现证据链的采集.周期性地将具有签名和时间戳的信任向量表通过洪泛方式反馈到网络中,在每个节点,迭代形成一个由多维行向量集组成的只读可信路由表TRT,作为选择下一跳节点和副本分割策略的决策依据.在节点相遇时,选择信任度比自身大的作为下一跳转发节点,消息沿着信任梯度递增的方向传递.实验结果表明:与现有路由算法相比,TOR算法能够有效抑制恶意节点和自私节点的破坏行为,且具有较高的消息传递成功率和较低的消息转发平均时延,对缓存空间和计算能力要求较低.  相似文献   

6.
陈剑  曾凡平 《计算机工程》2008,34(7):139-141
虫洞攻击是一种针对Ad hoc路由协议,破坏网络路由机制的攻击,它是Ad hoc网络的重大安全威胁。该文提出一种基于信任评估的端到端虫洞检测方法,估算源节点和目的节点间最短路径长度,根据路由长度和邻居节点信任度来选择路由,从而检测和防御虫洞 攻击。  相似文献   

7.
为了进一步提高Ad Hoc网络的安全性,提出一种利用可信平台模块传递信任链的方案。该方案以将信任关系从Ad Hoc网络节点扩展至Ad Hoc网络为设计目标,利用信任模型评估每个节点的信任度,在ARAN安全路由协议的基础上,结合信任度对ARAN安全路由协议进行了改进,选出一条可信度最高的路由,对可信链传递方案进行性能分析。  相似文献   

8.
基于贝叶斯决策的自组网推荐信任度修正模型   总被引:3,自引:0,他引:3  
孙玉星  黄松华  陈力军  谢立 《软件学报》2009,20(9):2574-2586
在分析了信任评估过程中攻击手段及其相互间关系的基础上,提出了基于贝叶斯决策理论的根据推荐偏差度修正对推荐的信任度方法.使用贝塔分布描述推荐偏差度,依据最小损失原则修正对推荐的信任度,并将具备推荐信任修正机制的信任模型运用在自组网的路由协议中,以便优化路由选择.MATLAB下的仿真结果表明,该方法能够有效抵御一些针对信任管理的威胁并提升信任管理的正确率,进而提高自组网环境下检测恶意节点的效率.  相似文献   

9.
一种基于D-S证据理论的Ad Hoc网络安全路由协议   总被引:1,自引:0,他引:1  
基于D-S证据理论,设计了一个MANET信任评估模型,为路由建立提供安全的网络环境.改进ARAN协议,提出安全的路由协议AE-ARAN.协议根据信任评估结果选择可信节点建立路由,并提出在路由表中存储节点匿名身份的Hash路由登记表,保证ARAN协议认证安全,实现匿名安全和提高路由查找效率,同时协议在路由建立过程中,完成会话密钥协商.理论分析和仿真结果表明,所提出的协议能有效地检测和隔离恶意节点,抵御攻击.协议可实现路由匿名性,提高网络的效率及安全性.  相似文献   

10.
报告了MANET网络结构、应用特点以及在路由选择、传输性能自适应方面的现状.针对目前MANET网络节点的智能化程度不高,网络节点及其通信路由的性能参数不能随通信条件适时优化的实际问题,运用状态感知路由选择与免疫微粒群优化算法原理,提出了人工智能与MANET相结合的智能MANET网络结构,论述了智能MANET网络中基于状态感知和免疫微粒群优化算法的路由选择、切换与性能适时优化方法.仿真实验结果表明,该方法的收敛速度与优化质量均优于其它算法.  相似文献   

11.
In mobile ad hoc network (MANET), the issues such as limited bandwidth availability, dynamic connectivity and so on cause the process of intrusion detection to be more complex. The nodes that monitor the malicious nodes should have necessary residual bandwidth and energy and should be trustable. In order to overcome these drawbacks, in this paper, we propose a swarm-based efficient distributed intrusion detection system for MANET. In this technique, swarm agents are utilised to select the nodes with highest trust value, residual bandwidth and residual energy as active nodes. Each active node monitors its neighbour nodes within its transmission range and collects the trust value from all monitored nodes. The active nodes adaptively change as per the trust thresholds. Upon collaborative exchange of the trust values of the monitored nodes among the active nodes, if the active node finds any node below a minimum trust threshold, then the node is marked as malicious. When the source receives alert message about the malicious node, a defence technique is deployed to filter the corresponding malicious node from the network. By simulation results, we show that the proposed approach is efficient intrusion detection mechanism for MANET.  相似文献   

12.
MANET (Mobile Ad hoc Network) has distinctive characteristics like node mobility, broadcast nature of wireless communication, and peer to peer data transfer. Due to these characteristics uncertainty is an integral part of MANET behavior. Uncertainty quantification is important for performance evaluation and better decision making in MANET. Packet dropping is a serious issue in MANET which degrades the performance of the network to a great extent. The packet dropping attack increases uncertainty in the network communication and eventually of the MANET. Trust based routing mechanisms are useful for neutralizing packet dropping attack. There are many existing trust based routing protocols which uses uncertainty for precise trust calculations. Thus, trust and uncertainty are closely related to each other. The paper proposes Uncertainty Analysis Framework (UAF) for MANET, it calculates the network Belief, Disbelief, and Uncertainty (BDU) values. The UAF framework integrated into different trust variants of AODV protocol which use direct trust, indirect trust, and global trust. The research work discovers impact of different trust models on MANET BDU using various mobility models. Experimental analysis shows that, trust based routing protocols show average 3 % gain in packet delivery ratio and at least 5 % increase in the network belief.  相似文献   

13.
一种基于邻居信任评估的虫洞防御机制   总被引:6,自引:0,他引:6  
洪亮  洪帆  彭冰  陈晶 《计算机科学》2006,33(8):130-133
移动adhoc网是一种新型无线移动网络,具有无中心、自组织、拓扑结构变化频繁以及开放式通讯信道等特性,因此adhoc网络下的路由协议所面临的安全问题比有线网环境中更为严重。虫洞攻击就是其中的一种,能够对adhoc网络产生致命的影响。在这种攻击下,网络的路由机制将会紊乱,特别是那些依赖通过接收对方的广播报文进行邻居探测的路由协议。本文首先从虫洞形成的根源上入手,重新定义了邻居的概念,强调了邻居作为节点信息转发第一站的功能。然后根据邻居定义,引入简化的Marsh信任模型,将邻居的以往表现作为信任评估的经验来源,再通过具体公式对邻居关系做出判定。在具体的路由过程中,节点根据信任评估值选取高可信度的邻居作为下一跳的转发节点,从而避免虫洞攻击的危害。为了验证方法的可行性,本文将模型应用于OLSR路由协议中并在NS2中进行了仿真。  相似文献   

14.
As the use of mobile devices continues to rise, trust administration will significantly improve security in routing the guaranteed quality of service (QoS) supply in Mobile Ad Hoc Networks (MANET) due to the mobility of the nodes. There is no continuance of network communication between nodes in a delay-tolerant network (DTN). DTN is designed to complete recurring connections between nodes. This approach proposes a dynamic source routing protocol (DSR) based on a feed-forward neural network (FFNN) and energy-based random repetition trust calculation in DTN. If another node is looking for a node that swerved off of its path in this situation, routing will fail since it won’t recognize it. However, in the suggested strategy, nodes do not stray from their pathways for routing. It is only likely that the message will reach the destination node if the nodes encounter their destination or an appropriate transitional node on their default mobility route, based on their pattern of mobility. The EBRRTC-DTN algorithm (Energy based random repeat trust computation) is based on the time that has passed since nodes last encountered the destination node. Compared to other existing techniques, simulation results show that this process makes the best decision and expertly determines the best and most appropriate route to send messages to the destination node, which improves routing performance, increases the number of delivered messages, and decreases delivery delay. Therefore, the suggested method is better at providing better QoS (Quality of Service) and increasing network lifetime, tolerating network system latency.  相似文献   

15.
移动自组网是一种由具有自配置功能的移动设备通过无线连接方式组成的网络。近几年来,对无线自组网各方面的研究十分突出,尤其是在灾难救援和执法等领域。一个自然而然的想法就是,将基于位置的操作引进到无线自组网中。在各种应用中,节点的身份认证事实上往往不如节点的位置有用。在可疑的无线自组网中,节点之间甚至不能信任彼此,因此它们的身份必须隐藏。本文将对移动自组网中的路由协议进行研究和对比。  相似文献   

16.
针对现有信任模型的缺点和信任本身的模糊性和主观性,提出了一个基于灰色理论和神经网络的信任模型。在模型实施中使用灰色关联方法进行关键因素筛选,减小了计算量,有效地延长了移动自组网的使用寿命。利用神经网络进行信任评估,综合考虑节点本身的全局信任值,提高了信任模型的可行性和客观性,并有助于节点的行为选择。  相似文献   

17.

Many researchers have been inspired to work on diverse challenges by a particularly favourable platform, namely mobile ad hoc networks (MANET) routing optimization. However, the lack of trust assessment is one of MANET’s main flaws. As a result, trust-based routing has received increasing attention in MANET over the last few years. Hence, the majority of recent work has focused on the development of routing protocols for security enhancement in a hostile environment. However, on the MANET environment, these protocols have many weaknesses and are also not that much secure. Hence, the primary goal of this study is to design a framework for balancing multiple performance measures in order to find the optimal multipath routing solution. In this scheme, we have employed the exponential cauchy kernelized adaptive neuro-fuzzy inference system (ECK-ANFIS) focused trust assessment with hybrid trust (HT) evaluation and optimal MANET routing. The ECK-ANFIS evaluates the trust after the nodes are initialised where, HT and the weight value, which are estimated for each node throughout the evaluation. The performance of the proposed mechanism has been measured using the various metrics defined in the existing protocols and also proved the superiority of the scheme by comparing it with other related ones.

  相似文献   

18.
Providing security to Mobile Ad-hoc Networks (MANET) is a challenging and demanding task. It is important to secure the network against intrusions in MANET for assuring the development of services. For this purpose, some intrusion-detection systems (IDSs) have been developed in traditional works. However, these have some drawbacks, such as that there is no assurance for public key authentication, certificate validation between two nodes is not possible, and they require a large amount of time for processing. To overcome all these issues, a Trust-Based Authentication Routing with Bio-Inspired Intrusion Detection System (TRAB-IDS) is developed in this article. The main aim of this article is to provide security to the network against harmful intrusions. Here, the trust and deep packet inspection (DPI) concepts are integrated for improving the security. Moreover, the certificate authority generates a public and private key pair for initiating the route agent and authenticating the neighboring nodes. Based on the trust of the node, the packet is forwarded to the intermediate node by calculating a bogus key. Then, the DPI is initiated for extracting the packet features and the similarity between the features is estimated. If the packet is matched with the attacker, an error report will be forwarded to the certificate authority; otherwise, the packet will be forwarded to the other node. The experimental results evaluate the performance of the proposed TRAB-IDS in terms of delivery ratio, delay, security cost, and misdetection ratio.  相似文献   

19.
陶开勇  陶洋 《计算机应用》2005,25(10):2441-2443
在MANET中,大多数按需协议只是在路由中断以后才会重建一条新的路由。提出了一种新的路由维护机制来避免路由的中断。在该机制中,使用活性路由上的每一个中间节点来探测到上游节点的链路中断的危险,并在路由中断以前重建一条新的路由。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号