帶有黑洞節(jié)點探測的間斷連接無線網(wǎng)絡(luò)數(shù)據(jù)轉(zhuǎn)發(fā)機制
doi: 10.11999/JEIT150459
基金項目:
國家自然科學基金(61371097),重慶市自然科學重點基金(CSTC2013JJB40001, CSTC2013JJB40006),重慶市青年科技人才培養(yǎng)計劃(cstc2014kjrc-qnrc40001)
Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks
Funds:
The National Natural Science Foundation of China (61371097), Chongqing Natural Science Foundation (CSTC2013JJB40001, CSTC2013JJB40006), Youth Talents Training Project of Chongqing Science Technology Commission (cstc2014kjrc-qnrc40001)
-
摘要: 間斷連接無線網(wǎng)絡(luò)利用節(jié)點移動產(chǎn)生的通信機會完成數(shù)據(jù)傳輸,但網(wǎng)絡(luò)中的惡意節(jié)點通過偽造節(jié)點的相遇信息等方法,吸引并丟棄數(shù)據(jù),影響網(wǎng)絡(luò)的運行。該文提出帶有黑洞攻擊探測的間斷連接無線網(wǎng)絡(luò)數(shù)據(jù)轉(zhuǎn)發(fā)機制,通過節(jié)點誠信度、信用度、間接信任度及數(shù)據(jù)轉(zhuǎn)發(fā)能力4維信任屬性的評估,獲知攻擊節(jié)點的行為規(guī)律,并采用粗糙集理論降低網(wǎng)絡(luò)運行過程中產(chǎn)生的不確定狀態(tài)信息引發(fā)的誤判率,更加準確地對節(jié)點的可信性進行判斷,進而,合理地為數(shù)據(jù)選擇中繼節(jié)點。結(jié)果表明,所提出的方法能有效提升黑洞節(jié)點的辨識率,對網(wǎng)絡(luò)中其它非協(xié)作行為也有一定探測和防御能力,能顯著改善網(wǎng)絡(luò)性能。
-
關(guān)鍵詞:
- 間斷連接無線網(wǎng)絡(luò) /
- 信任管理 /
- 黑洞攻擊探測 /
- 粗糙集
Abstract: Intermittently connected wireless networks transmit data through opportunities caused by nodes movements. But malicious nodes in the network can attack and delete data by falsifying information about their routings, in order to impact the performance of networks. A data forwarding mechanism with blackhole attacking detection in intermittently connected wireless networks is proposed in this paper. By evaluating 4 trust properties include value of honesty, credit, indirect trust, and data forwarding rate, characteristics of attackers are summarized directly behaviors. And using the theory of rough set to decrease the rate of mistakes caused by indeterminate information, so that to determine the reliability of nodes accurately, and choose relay nodes reasonably. Results show that, the proposed mechanism can effectively find out attackers while enhancing the reliability of data transmission, and it also can defense some other non-cooperative nodes in the networks. Thus, the utilization of network resource is improved. -
BOLDRINI C, LEE K, ONEN M, et al. Opportunistic networks[J]. Computer Communications, 2014, 48(14): 1-4. 吳大鵬, 張普寧, 王汝言. 帶有消息投遞概率估計的機會網(wǎng)絡(luò)自適應(yīng)緩存管理策略[J]. 電子與信息學報, 2014, 36(2): 390-395. WU Dapeng, ZHANG Puning, and WANG Ruyan. Adaptive buffer management strategy with message delivery probability estimating method in opportunistic networks[J]. Journal of Electronics Information Technology, 2014, 36(2): 390-395. 吳大鵬, 白娜, 王汝言. 帶有節(jié)點狀態(tài)估計的間斷連接無線網(wǎng)絡(luò)緩存管理策略[J]. 電子與信息學報, 2015, 37(2): 443-448. WU Dapeng, BAI Na, and WANG Ruyan. Cache management mechanism with node status evaluation for intermittently connected wireless networks[J]. Journal of Electronics Information Technology, 2015, 37(2): 443-448. DSOUZA R J and JOSE J. Routing approaches in delay tolerant networks: a survey[J]. International Journal of Computer Applications, 2010, 1(17): 8-14. CAO Z, DONG M, GAO Z, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J]. IEEE Transactions on Parallel Distributed Systems, 2014, 25(1): 22-32. JAIN S. Black hole attack in delay tolerant networks: a survey[J]. International Journal of Computer Science and Engineering, 2014, 2(4): 172-175. DINI G and DUCA A L. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network[J]. Ad Hoc Networks, 2012, 10(7): 1167-1178. LI N and DAS S K. A trust-based framework for data forwarding in opportunistic networks[J]. Ad hoc Networks, 2013, 11(4): 1497-1509. LI F, WU J, and SRINIVASAN A. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[C]. IEEE International Conference on Computer Communications 2009, Rio de Janeiro, Brazil, 2009: 2428-2436. REN Y, CHUAH M C, YANG J, et al. Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording[C]. 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, QC, Canada, 2010: 1-6. GUO Y, SCHILDT S, and WOLF L. Detecting blackhole and greyhole attacks in vehicular delay tolerant networks[C]. Fifth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 2013: 1-7. SAINI K K, SAINI A, and MEHAK. Nature based trust security protocol against greyhole attacks in opportunistic networks[J]. International Journal of Engineering Research Management Technology, 2014, 1(3): 21-28. JULIER S J, UHLMANN J K, and DURRANT-WHYTE H F. A new approach for filtering nonlinear systems[C]. Proceedings of the 1995 American Control Conference, Seattle, WA, USA, 1995, 3: 1628-1632. BAADACHE A and BELMEHDI A. Struggling against simple and cooperative black hole attacks in multi-hop wireless Ad hoc networks[J]. Computer Networks, 2014, 73(1): 173-184. LI F and WU J. Mobility reduces uncertainty in MANETs[C]. 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007: 1946-1954. PAWLAK Z and SOWINSKI R. Rough set approach to multi- attribute decision analysis[J]. European Journal of Operational Research, 1994, 72(3): 443-459. LINDGREN A, DORIA A, and SCHEL?N O. PROPHET: probabilistic routing in intermittently connected networks[J]. Moble Computing and Communications Review, 2003, 7(3): 1246-1250. RAMANA K S, CHARI A A, and KASIVISWANTH N. A survey on trust management for mobile Ad hoc networks[J]. International Journal of Network Security and Its Applications, 2010, 13(4): 562-583. -
計量
- 文章訪問數(shù): 1487
- HTML全文瀏覽量: 96
- PDF下載量: 306
- 被引次數(shù): 0