登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
一种基于D-S证据理论的Ad Hoc网络安全路由协议
  • 摘要

    基于D-S证据理论,设计了一个MANET信任评估模型,为路由建立提供安全的网络环境,改进ARAN协议,提出安全的路由协议AE-ARAN.协议根据信任评估结果选择可信节点建立路由,并提出在路由表中存储节点匿名身份的Hash路由登记表,保证ARAN协议认证安全,实现匿名安全和提高路由查找效率,同时协议在路由建立过程中,完成会话密钥协商,理论分析和仿真结果表明,所提出的协议能有效地检测和隔离恶意节点,抵御攻击.协议可实现路由匿名性,提高网络的效率及安全性.

  • 作者

    李小青  李晖  杨凯  马建峰  Li Xiaoqing  Li Hui  Yang Kai  Ma Jianfeng 

  • 作者单位

    计算机网络与信息安全教育部重点实验室(西安电子科技大学) 西安710071

  • 刊期

    2011年8期 ISTIC EI PKU

  • 关键词

    密码学  路由协议  D-S证据理论  信任评估模型  移动自组织网络 

参考文献
  • [1] 叶阿勇,马建峰. 一种移动自组网中信任评估模型的设计. 计算机研究与发展, 2008,5
  • [2] 陈一雷,王俊杰. 一种D-S证据推理的改进方法. 系统仿真学报, 2004,1
  • [3] JING Qi,唐礼勇,陈钟. 无线传感器网络中的信任管理. 软件学报, 2008,7
  • [4] Catherine K. Murphy. Combining belief functions when evidence conflicts. Decision Support Systems, 2000,1
  • [5] Sanzgiri K.;LaFlamme D.;Dahill B.;Levine B.N.;Shields C.;Belding-Royer E.M.. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2005,3
  • [6] David Goldschlag;Michael Reed;Paul Syverson. Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM, 1999,2
  • [7] Silvia Giordano;Edoardo Biagioni. TOPICS IN AD HOC AND SENSOR NETWORKS. IEEE Communications Magazine: Articles, News, and Events of Interest to Communications Engineers, 2007,4
  • [8] Riva Oriana;Nadeem Tamer;Borcea Cristian;Iftode Liviu. Context-Aware Migratory Services in Ad Hoc Networks. IEEE transactions on mobile computing, 2007,12
  • [9] Zhu Bo;Wan Zhiguo;Mohan S.K. Anonymous secure routing in mobile ad-hoc networks. Los Alamitos.CA:IEEE Computer Society, 2004
  • [10] Chen Sisheng;Li Xu;Chert Zhide. Secure anonymous routing in trust and clustered wireless ad hoc networks. Piscataway,NJ:IEEE, 2007
  • [11] Dempster A. Upper and lower probabilities induced by a multi-valued mapping. Annals of Mathematical Statistics, 1967,02
  • [12] Shafer G. A Mathematical Theory of Evidence. New York:princeton University Press, 1976
  • [13] Jousselme A L;Grenier D;Bosse E. A new distance between bodies of evidence. Information Fusion, 2001,02
  • [14] Zadeh L A. A simple view of the Dempster-Shafer theory of evidence and its implication for the rule of combination. AI Magazine, 1986,02
  • [15] Hu Y C;Perriga A. A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2004,03
  • [16] Mariti S;Guili T;Lai K. Mitigating routing misbehavior in mobile ad hoc networks. New York:ACM, 2000
  • [17] Michiardi P;Molva R. Core:A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. Protoroz:Kluwer, 2002
  • [18] Chakraborty S;Ray I. Trust RBAC-Integrating trust relationships into the RBAC model for access control in open systems. New York:ACM, 2006
  • [19] Peng Shufeng;He Jingsha;Meng Yao. Reputation-based trust update in network environment. Los Alamitos.CA:IEEE Computer Society, 2008
  • [20] Liu J S;lssarny V. Enhanced reputation mechanism for mobile ad-hoc networks. Beilin:Springer-Verlag, 2004
查看更多︾
相似文献 查看更多>>
54.198.92.22