首页 | 本学科首页   官方微博 | 高级检索  
     

移动自组网的主观信任建模与仿真
引用本文:王健,刘衍珩,张婧,刘雪莲.移动自组网的主观信任建模与仿真[J].电子学报,2011,39(12):2813-2819.
作者姓名:王健  刘衍珩  张婧  刘雪莲
作者单位:1. 吉林大学计算机科学与技术学院,吉林长春130012;吉林大学符号计算与知识工程教育部重点实验室,吉林长春130012
2. 吉林大学软件学院,吉林长春,130012
基金项目:国家自然科学基金,科技部国际科技合作与交流专项,欧盟BTG合作项目,吉林大学研究生"985工程"创新计划项目,吉林大学基本科研业务费项目
摘    要:不同于以往只考虑最短路径或只依靠转发行为评价信任或基于推荐机制的传统路由算法,提出了一种兼顾通信可靠性和路径长度的主观信任路由模型.通过引入属性相似度概念将邻居选择、信任评估、数据转发等路由环节紧密相连,进一步建立一种新的动态包转发规则,并给出了一种计算属性相似度的推荐方法.实验结果表明主观信任路由模型较传统的DSR(...

关 键 词:移动自组网  属性相似度  恶意节点  信任路由  动态源路由协议
收稿时间:2010-08-18

Modeling and Simulating Subjective Trust in MANETs
WANG Jian,LIU Yan-heng,ZHANG Jing,LIU Xue-lian.Modeling and Simulating Subjective Trust in MANETs[J].Acta Electronica Sinica,2011,39(12):2813-2819.
Authors:WANG Jian  LIU Yan-heng  ZHANG Jing  LIU Xue-lian
Affiliation:1. College of Computer Science and Technology,Jilin University,Changchun,Jilin 130012,China;2. Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education,Jilin University, Changchun,Jilin 130012,China;3. College of Software,Jilin University,Changchun,Jilin 130012,China
Abstract:Different from most the past routing algorithms only considering the shortest path first,or evaluating the trust level solely on the forwarding behavior,or depending on recommendation-based trust mechanism,we propose a novel subjective trust routing model under consideration to both communication reliability and path length.We introduce the concept of attribute similarity to inherently bind neighbor selection,trust evaluation,packet forwarding,and other routing processes.Based on the similarity degree,we put forward a new forwarding behavior.We give a recommended method to calculate the similarity degree between attributes.Simulations show that the routing scheme behaves better than Dynamic Source Routing (DSR) protocol and previous trust-based routing protocols on standing against the blackhole attack and the on-off attack,and meanwhile is not affected by the slander attack.
Keywords:mobile ad hoc networks  attribute similarity  malicious nodes  trusted routing  dynamic source routing
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号