通信工程

一种新的无线网状网可信路由

展开
  • 西安电子科技大学计算机学院,西安710071
杨凯,博士生,研究方向:信誉模型、可信计算,E-mail: sydeny-001@163.com;马建峰,教授,博导,长江学者,研究方向:计算机安全、密码学,E-mail: jfma@xidian.edu.cn

收稿日期: 2010-10-18

  修回日期: 2011-02-23

  网络出版日期: 2011-05-26

基金资助

国家自然科学基金(No.60633020, No.60702059, No.60872041);中央高校基本科研业务费专项资金(No.JY10000903001)资助

Novel Trusted Routing in Wireless Mesh Networks

Expand
  • College of Computer, Xidian University, Xi’an 710071, China

Received date: 2010-10-18

  Revised date: 2011-02-23

  Online published: 2011-05-26

摘要

由于现有信任模型不能直接应用于无线网状网,为此提出了一种基于主观逻辑的信誉模型. 该模型不但能监测和隔离WMN中的恶意节点,而且能区分恶意丢包和由于链路质量造成的丢包. 将该模型应用到无线电度量的按需距离矢量路由协议(RM-AODV)中,得到了一个可信的路由协议T-AODV. 仿真结果表明,所给出的机制能有效抵御黑洞、灰洞等网络攻击,提高网络可靠性、鲁棒性及安全性. 网络中存在的恶意节点越多,这种优势越明显.

本文引用格式

杨凯, 马建峰, 杨超 . 一种新的无线网状网可信路由[J]. 应用科学学报, 2011 , 29(3) : 221 -227 . DOI: 10.3969/j.issn.0255-8297.2011.03.001

Abstract

Because of the inherent characteristics of wireless mesh networks (WMN), the existing trust models are not applicable. This paper proposes a novel subjective logic based reputation model to detect and isolate malicious nodes in WMN. The model can also differentiate between malicious packet drop and the packet drop due to poor link quality. The model is applied to radio-metric ad hoc on-demand distance vector routing (RMAODV)
to obtain a trusted routing T-AODV. Simulation results show that the proposed scheme can effectively evaluate trustworthiness of nodes, resist attacks to some extent and improve overall reliability, robustness and security of the network.

参考文献


[1] Sichitiu M L. Wireless mesh networks: opportunities and challenge
[C]//2005 Proceedings of World Wireless Congress. San Francisco, California, 2005: 562-567.

[2] Akyildiz I F, Wang X. Wireless mesh networks: a survey
[J]. Computer Networks, 2005, 47(5): 445-487.

[3] Hu Y C, Perrig A. A survey of secure wireless ad
hoc routing
[J]. IEEE Security and Privacy, 2004,
2(3): 28-39.

[4] Ding Xuyang, Luo Huiqiong. Trust evaluation based
reliable routing in wireless mesh network
[C] // 2007
International Conference on Wireless Communications,
Networking and Mobile Computing, WiCom
2007, 2007: 2294-2297.

[5] Josang A, Gray E, Kinateder M. Simplification
and analysis of transitive trust networks
[J]. Web
Intelligence and Agent Systems Journal, 2006, 4(2):
139-161.

[6] Mariti S, Guili T, Lai K, Baker M. Mitigating
routing misbehavior in mobile ad hoc networks
[C] //
2000 International Conference on Mobile Computing
and Networking, MobiCom, August 2000: 255-265.

[7] Buchegger S, Boudec J Y. Performance analysis
of the confidant protocol (cooperation of nodes:
fairness in dynamic ad-hoc networks)
[C] // 2002
IEEE/ACM Symposium on Mobile Ad Hoc Networking
and Computing, June 2002: 226-236.

[8] Michiardi P, Molva R. Core: a collaborative reputation
mechanism to enforce node cooperation in
mobile ad-hoc networks
[C] // 2002 Proceedings of
Communications and Multimedia Security Conference,
September, 2002: 278-290.

[9] Peng Shufeng, He Jingsha, Meng Yao. Reputationbased
trust update in network environment

[C]//2008 International Symposium on Electronic
Commerce and Security, Guangzhou, China, 2008:
118-123.

[10] Liu J S, Issarny V. Enhanced reputation mechanism
for mobile ad-hoc networks
[C]//2004 International
Conference on Trust Management (iTrust04),
Oxford, United Kingdom, 2004: 48-62.

[11] Li Xueming, Wang Jianke. A global trust model of
P2P network based on distance-weighted recommendation

[C] // 2009 IEEE International Conference on
Networking, Architecture, and Storage, Zhangjiajie,
Hunan, China, 2009: 281-284.

[12] 路松峰,刘芳,胡和平,刘巍峰.一种节点信誉相
关的P2P网络信任管理模型
[J]. 小型微型计算机系
统,2009, 30(11):2139-2145.
Lu Songfeng, Liu Fang, Hu Heping, Liu Weifeng.
Trust management model based on reputation of
nodes for P2P network
[J]. Journal of Chinese Computer
Systems, 2009, 30(11): 2139-2145. (in Chinese)

[13] Yan Sun, Zhu Han, Liu K J R. Defense of trust
management vulnerabilities in distributed networks

[J]. IEEE Communications Magazine, 2008, 46(2):
112-119.

[14] 王堃,吴蒙. P2P网络中一种可信任的全局信任模型
[J].
应用科学学报,2010, 28(3):237-245.
Wang Kun, Wu Meng. Trustworthy global reputation
model in peer-to-peer networks
[J]. Journal of
Applied Sciences, 2010, 28(3): 237-245. ( in Chinese)

[15] 王潮,应仲平,王海玲,林强. 基于蚁群算法的无线网
状网安全路由算法
[J]. 武汉大学学报:理学版,2009,
5(1): 105-108.
Wang Chao, Ying Zhongping, Wang Hailing, Lin
Qiang. Security routing algorithm for wireless mesh
network based on ant colony
[J]. Journal of Wuhan
University: Natural Science Edition, 2009, 5(1): 105-
108. ( in Chinese)

[16] Chen Dajun, Wang Chao, Lin Qiang. Ant-based
trusted routing algorithm for wireless mesh networks

[C]// 2009 Asia Pacific Conference on Postgraduate
Research in Microelectronics and Electronics,
PrimeAsia 2009, 2009: 53-56.

[17] 王堃,吴蒙,鲁蔚锋. 一种MANET中基于位置的可信
路由
[J]. 应用科学学报,2010, 28(5): 447-456.
Wang Kun, Wu Meng, Lu Weifeng. A Locationbased
trust routing for MANET
[J]. Journal of Applied
Sciences, 2010, 28(5): 447-456. (in Chinese)

[18] 余旺科,马文平,严亚俊,杨元原. 利用信任模型构
建安全路由协议
[J]. 北京邮电大学学报,2010,33(3):
48-51.
Yu Wangke, Ma Wenping, Yan Yajun, Yang
Yuanyuan. Constructing secure routing protocol using
trust model
[J]. Journal of Beijing University of
Posts and Telecommunications, 2010, 33(3): 48-51.
(in Chinese)

[19] Kim K, Shin K G. On accurate measurement of
link quality in multi-hop wireless mesh networks

[C]//2006 the 12th Annual International Conference
on Mobile Computing and Networking, MOBICOM
2006, 2006: 38-49.

[20] Perkins C E, Royer E M. Ad-hoc on-demanding
distance vector routing
[C]//1999 Proceedings of the
2nd IEEE Workshop on Mobile Computing Systems
and Applications(WMCSA’99), New Orleans, Los
Angles, February 1999: 90-100.

[21] Johnson D B, Maltz D A, Hu Y C. Dynamic source
routing protocol (DSR) in ad hoc networks
[M]. Dordrecht:
Kluwer Academic Publishers, 1999: 153-181.

[22] Perkins C E, Bhagwat P. Highly dynamic
destination-sequenced distance-vector routing
(DSDV) for mobile computers
[J]. ACM SIGCOMM
Computer Communication Review, 1994, 24(4):
234-244.

[23] Takeda S, Yagyu K, Aoki H, Matsumoto Y.
Multi-interface oriented radio metric on-demand
routing protocol for layer-2 mesh networks
[J]. IEIC
(Institute of Electronics, Information and Communication
Engineers) Technical Report, RCS2005-58,
Jul. 2005: 109-114.

[24] Bahr M. Update on the hybrid wireless mesh protocol
of IEEE 802.11s
[C]//2007 the 1st IEEE International
Workshop on Enabling Technologies and
Standards for Wireless Mesh Network (MeshTech),
Pisa, Italy, Oct. 2007: 1-10.

文章导航

/