高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

移动自组网中一种基于集群的Byzantine节点检测机制

刘洋 俞能海 冯现磊

刘洋, 俞能海, 冯现磊. 移动自组网中一种基于集群的Byzantine节点检测机制[J]. 电子与信息学报, 2006, 28(12): 2386-2389.
引用本文: 刘洋, 俞能海, 冯现磊. 移动自组网中一种基于集群的Byzantine节点检测机制[J]. 电子与信息学报, 2006, 28(12): 2386-2389.
Liu Yang, Yu Neng-hai, Feng Xian-lei. A Cluster Based Solution to BGP on Mobile Ad hoc Network[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2386-2389.
Citation: Liu Yang, Yu Neng-hai, Feng Xian-lei. A Cluster Based Solution to BGP on Mobile Ad hoc Network[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2386-2389.

移动自组网中一种基于集群的Byzantine节点检测机制

A Cluster Based Solution to BGP on Mobile Ad hoc Network

  • 摘要: 该文主要介绍了移动自组网中一种基于集群方法的Byzantine错误检测机制。并结合CBRP,提出了一种适合移动自组网的内部出错节点清除算法。通过算法分析证明了所提出的算法可以显著减少清除具有Byzantine错误节点时所需的消息数目,降低了网络负载,有效提高了移动自组网的安全性和可信度。
  • Zhou L, Haas Z J. Securing Ad hoc networks. IEEE Network, 1999, 13(6): 24-30.[2]Luo H Y, Lu S W. Ubiquitous and robust authentication services for Ad hoc wireless networks. Technical Report TR-200030, Dept. of Computer Science, UCLA. 2000.[3]Lamport L, Shostak R, Pease M. The Byzantine generals problem[J].ACM Trans. on Programming Languages and Systems.1982, 4(3):382-401[4]Dolev D, Strong H R. Authenticated algorithms for Byzantine agreement[J].SIAM Journal of Computation.1983, 12(4):656-666[5]Dolev D, Reischuk R, Strong H R. Early stoping in Byzantine agreement[J].Journal of the ACM.1990, 37(4):720-741[6]Siu Hin-Sing, Chin Yeh-Hao, Yang Wei-Pang. Byzantine agreement in the presence of mixed faults on processors and links[J].IEEE Trans. on Parallel and Distributed Systems.1998, 9(4):335-345[7]Galil Z, Mayer A, Yung Moti. Resolving message complexity of Byzantine agreement and beyond. 36th Annual Symposium on Foundations of Computer Science, 1995: 724-733.[8]Burmester M, Desmedt Y G. Secure communication in an unknown network with Byzantine faults[J].Electronics Letters.1998, 34(8):741-742[9]Wang S C, Yang W P, Cheng C F. Byzantine agreement on mobile Ad-hoc network[J].IEEE International Conference on Networking, Sensing and Control.2004, vol.1:52-57[10]Bergano M R, et al.. System design specification for mobile multimedia wireless network (MMWN) (draft), DARPA project DAAB07-95-C-D156, Oct.1996.[11]Atsushi Iwata, Ching C C, Pei, G Y, Gerla M, Chen T W. Scalable routing strategies for Ad hoc wireless networks[J].IEEE Journal on Selected Areas in Communications.1999, 17(8):1369-1379[12]Jiang M L, Li J Y, Tay Y C. Cluster based routing protocol (CBRP) fuctional specification, draft-ietf-manet-cbrp-spec-01.txt, Work in progress, Aug. 1999.[13]Poosarla R, Deng Hongmei, Ojha A, Agrawal D P. A cluster based secure routing scheme for wireless Ad hoc networks. IEEE International Conference on Performance, Computing, and Communications, 2004: 171-175.[14]Bechler M, Hof H. A cluster-based security architecture for Ad hoc networks, INFOCOM 2004, Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 7-11 March, 2004, vol.4: 2393-2403.
  • 加载中
计量
  • 文章访问数:  2478
  • HTML全文浏览量:  130
  • PDF下载量:  676
  • 被引次数: 0
出版历程
  • 收稿日期:  2005-05-08
  • 修回日期:  2005-09-19
  • 刊出日期:  2006-12-19

目录

    /

    返回文章
    返回