高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于频率域多目标MANETs可信路由决策研究

罗俊海 郑龙 范明钰

罗俊海, 郑龙, 范明钰. 基于频率域多目标MANETs可信路由决策研究[J]. 电子与信息学报, 2010, 32(7): 1602-1607. doi: 10.3724/SP.J.1146.2009.00505
引用本文: 罗俊海, 郑龙, 范明钰. 基于频率域多目标MANETs可信路由决策研究[J]. 电子与信息学报, 2010, 32(7): 1602-1607. doi: 10.3724/SP.J.1146.2009.00505
Luo Jun-hai, Zheng Long, Fan Ming-yu. Research on MANETs Trusted Routing Decision Based on Multi-objective in Frequency Domain[J]. Journal of Electronics & Information Technology, 2010, 32(7): 1602-1607. doi: 10.3724/SP.J.1146.2009.00505
Citation: Luo Jun-hai, Zheng Long, Fan Ming-yu. Research on MANETs Trusted Routing Decision Based on Multi-objective in Frequency Domain[J]. Journal of Electronics & Information Technology, 2010, 32(7): 1602-1607. doi: 10.3724/SP.J.1146.2009.00505

基于频率域多目标MANETs可信路由决策研究

doi: 10.3724/SP.J.1146.2009.00505

Research on MANETs Trusted Routing Decision Based on Multi-objective in Frequency Domain

  • 摘要: 移动Ad-hoc网络(MANETs)具有开放的媒质,动态的拓扑结构,分布式的合作和受限的网络能力等基本特点。网络中移动节点具有匿名性和高度自治的特点,网络通讯依靠在通信路径上的中间节点转发数据包,实现无线传输范围外节点间的正常通信。该文提出了一种独特的MANETs中基于频率下多目标可信路由决策算法,它和现在大多数路由算法都是在时间域下使用单一约束参数选择路由的方式截然不同。利用概率理论分析安全和可信路由,基于概率密度函数的时频相互转化,减小计算复杂度,解决MEANTs中节点间缺乏物理安全以及在低信任水平和节点相互勾结扰乱网络操作情况下,发现可信安全路由难的问题。实例分析证明了此算法的可行性。
  • Prayag N, Sanjay Kumar D, and Sudip M, et al.. Security inmobile Ad-hoc networks using soft encryption andtrust-based multi-path routing [J]. ComputerCommunications, 2008, 31(4): 760-769.[2]Vasantha V and Manimegalai D. Mitigating routingmisbehaviors using subjective trust model in mobile Ad hocnetworks [C]. International Conference on ComputationalIntelligence and Multimedia Applications, Sivakasi, TamilNadu, India, December 13-15, 2007: 417-422.Neeraj N, Patel R B, and Bhat V K. Trust aware routing withload balancing in ad hoc network using mobile agent [C]. 15thInternational Conference on Advanced Computing andCommunications, Guwahati, India, December 18-21, 2007:454-459.[3]Wang Kun, Wu Meng, and Shen Su bin. A trust evaluationmethod for node cooperation in mobile ad hoc networks [C].5th International Conference on Information Technology,Nevada, USA, April 7-9, 2008: 1000-1005.[4]Bounpadith, Hidehisa N, and Nei K, et al.. A study of arouting attack in OLSR-based mobile ad hoc networks [J].International Journal of Communication Systems.2007,20(11):1245-1261[5]Satyanarayana A. Unified formula for analysis of somenetwork reliability problems [J].IEEE Transactions onReliability.1982, R-31(1):23-32[6]Kannhavong Bounpadith, Nakayama Hidehisa, and NemotoYoshiaki, et al.. A survey of routing attacks in mobile Ad hocnetworks[J].IEEE Wireless Communications.2007, 14(5):85-91[7]Katsuhiko O. System Dynamics (Fourth Edition) [M]. NewJersey, Prentice Hall, August 23, 2003: 350-480.[8]Andel Todd R and Yasinsac Alec. Adaptive threat modelingfor secure Ad hoc routing protocols [J]. Electronic Notes inTheoretical Computer Science, 2008, 197(2): 3-14.[9]Zouridaki Charikleia, Brian M L, and Marek H. Byzantinerobust trust establishment for mobile Ad hoc networks [J].Telecommunication Systems.2007, 35(3-4):189-206[10]Zheng Long and Zhou J L. Optimization of militarytransportation path based on generalized cut set algorithm[J]. Computer Engineering, 2007, 33(11): 4-9.[11]Zheng Long, Liu Xue, and Zhou Jing lun. Frequency-domainreliability analysis and modeling of networked controlsystems [C]. Third International Workshop on FeedbackControl Implementation and Design in Computing Systemsand Networks, Annapolis, Maryland, USA, June 6, 2008:35-40.[12]Carlos R H and Thomas K. A mutual networksynchronization method for wireless Ad hoc and sensornetworks [J].IEEE Transactions on Mobile Computing.2008,7(5):633-645
  • 加载中
计量
  • 文章访问数:  3315
  • HTML全文浏览量:  93
  • PDF下载量:  549
  • 被引次数: 0
出版历程
  • 收稿日期:  2009-04-10
  • 修回日期:  2010-04-20
  • 刊出日期:  2010-07-19

目录

    /

    返回文章
    返回