一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

帶有黑洞節(jié)點探測的間斷連接無線網(wǎng)絡(luò)數(shù)據(jù)轉(zhuǎn)發(fā)機制

帶有黑洞節(jié)點探測的間斷連接無線網(wǎng)絡(luò)數(shù)據(jù)轉(zhuǎn)發(fā)機制[J]. 電子與信息學報, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459
引用本文: 帶有黑洞節(jié)點探測的間斷連接無線網(wǎng)絡(luò)數(shù)據(jù)轉(zhuǎn)發(fā)機制[J]. 電子與信息學報, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459
Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks[J]. Journal of Electronics & Information Technology, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459
Citation: Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks[J]. Journal of Electronics & Information Technology, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459

帶有黑洞節(jié)點探測的間斷連接無線網(wǎng)絡(luò)數(shù)據(jù)轉(zhuǎn)發(fā)機制

doi: 10.11999/JEIT150459
基金項目: 

國家自然科學基金(61371097),重慶市自然科學重點基金(CSTC2013JJB40001, CSTC2013JJB40006),重慶市青年科技人才培養(yǎng)計劃(cstc2014kjrc-qnrc40001)

Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks

Funds: 

The National Natural Science Foundation of China (61371097), Chongqing Natural Science Foundation (CSTC2013JJB40001, CSTC2013JJB40006), Youth Talents Training Project of Chongqing Science Technology Commission (cstc2014kjrc-qnrc40001)

  • 摘要: 間斷連接無線網(wǎng)絡(luò)利用節(jié)點移動產(chǎn)生的通信機會完成數(shù)據(jù)傳輸,但網(wǎng)絡(luò)中的惡意節(jié)點通過偽造節(jié)點的相遇信息等方法,吸引并丟棄數(shù)據(jù),影響網(wǎng)絡(luò)的運行。該文提出帶有黑洞攻擊探測的間斷連接無線網(wǎng)絡(luò)數(shù)據(jù)轉(zhuǎn)發(fā)機制,通過節(jié)點誠信度、信用度、間接信任度及數(shù)據(jù)轉(zhuǎn)發(fā)能力4維信任屬性的評估,獲知攻擊節(jié)點的行為規(guī)律,并采用粗糙集理論降低網(wǎng)絡(luò)運行過程中產(chǎn)生的不確定狀態(tài)信息引發(fā)的誤判率,更加準確地對節(jié)點的可信性進行判斷,進而,合理地為數(shù)據(jù)選擇中繼節(jié)點。結(jié)果表明,所提出的方法能有效提升黑洞節(jié)點的辨識率,對網(wǎng)絡(luò)中其它非協(xié)作行為也有一定探測和防御能力,能顯著改善網(wǎng)絡(luò)性能。
  • BOLDRINI C, LEE K, ONEN M, et al. Opportunistic networks[J]. Computer Communications, 2014, 48(14): 1-4.
    吳大鵬, 張普寧, 王汝言. 帶有消息投遞概率估計的機會網(wǎng)絡(luò)自適應(yīng)緩存管理策略[J]. 電子與信息學報, 2014, 36(2): 390-395.
    WU Dapeng, ZHANG Puning, and WANG Ruyan. Adaptive buffer management strategy with message delivery probability estimating method in opportunistic networks[J]. Journal of Electronics Information Technology, 2014, 36(2): 390-395.
    吳大鵬, 白娜, 王汝言. 帶有節(jié)點狀態(tài)估計的間斷連接無線網(wǎng)絡(luò)緩存管理策略[J]. 電子與信息學報, 2015, 37(2): 443-448.
    WU Dapeng, BAI Na, and WANG Ruyan. Cache management mechanism with node status evaluation for intermittently connected wireless networks[J]. Journal of Electronics Information Technology, 2015, 37(2): 443-448.
    DSOUZA R J and JOSE J. Routing approaches in delay tolerant networks: a survey[J]. International Journal of Computer Applications, 2010, 1(17): 8-14.
    CAO Z, DONG M, GAO Z, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J]. IEEE Transactions on Parallel Distributed Systems, 2014, 25(1): 22-32.
    JAIN S. Black hole attack in delay tolerant networks: a survey[J]. International Journal of Computer Science and Engineering, 2014, 2(4): 172-175.
    DINI G and DUCA A L. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network[J]. Ad Hoc Networks, 2012, 10(7): 1167-1178.
    LI N and DAS S K. A trust-based framework for data forwarding in opportunistic networks[J]. Ad hoc Networks, 2013, 11(4): 1497-1509.
    LI F, WU J, and SRINIVASAN A. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[C]. IEEE International Conference on Computer Communications 2009, Rio de Janeiro, Brazil, 2009: 2428-2436.
    REN Y, CHUAH M C, YANG J, et al. Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording[C]. 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, QC, Canada, 2010: 1-6.
    GUO Y, SCHILDT S, and WOLF L. Detecting blackhole and greyhole attacks in vehicular delay tolerant networks[C]. Fifth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 2013: 1-7.
    SAINI K K, SAINI A, and MEHAK. Nature based trust security protocol against greyhole attacks in opportunistic networks[J]. International Journal of Engineering Research Management Technology, 2014, 1(3): 21-28.
    JULIER S J, UHLMANN J K, and DURRANT-WHYTE H F. A new approach for filtering nonlinear systems[C]. Proceedings of the 1995 American Control Conference, Seattle, WA, USA, 1995, 3: 1628-1632.
    BAADACHE A and BELMEHDI A. Struggling against simple and cooperative black hole attacks in multi-hop wireless Ad hoc networks[J]. Computer Networks, 2014, 73(1): 173-184.
    LI F and WU J. Mobility reduces uncertainty in MANETs[C]. 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007: 1946-1954.
    PAWLAK Z and SOWINSKI R. Rough set approach to multi- attribute decision analysis[J]. European Journal of Operational Research, 1994, 72(3): 443-459.
    LINDGREN A, DORIA A, and SCHEL?N O. PROPHET: probabilistic routing in intermittently connected networks[J]. Moble Computing and Communications Review, 2003, 7(3): 1246-1250.
    RAMANA K S, CHARI A A, and KASIVISWANTH N. A survey on trust management for mobile Ad hoc networks[J]. International Journal of Network Security and Its Applications, 2010, 13(4): 562-583.
  • 加載中
計量
  • 文章訪問數(shù):  1487
  • HTML全文瀏覽量:  96
  • PDF下載量:  306
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-04-22
  • 修回日期:  2015-09-02
  • 刊出日期:  2016-02-19

目錄

    /

    返回文章
    返回