高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

带有黑洞节点探测的间断连接无线网络数据转发机制

带有黑洞节点探测的间断连接无线网络数据转发机制[J]. 电子与信息学报, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459
引用本文: 带有黑洞节点探测的间断连接无线网络数据转发机制[J]. 电子与信息学报, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459
Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks[J]. Journal of Electronics & Information Technology, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459
Citation: Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks[J]. Journal of Electronics & Information Technology, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459

带有黑洞节点探测的间断连接无线网络数据转发机制

doi: 10.11999/JEIT150459
基金项目: 

国家自然科学基金(61371097),重庆市自然科学重点基金(CSTC2013JJB40001, CSTC2013JJB40006),重庆市青年科技人才培养计划(cstc2014kjrc-qnrc40001)

Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks

Funds: 

The National Natural Science Foundation of China (61371097), Chongqing Natural Science Foundation (CSTC2013JJB40001, CSTC2013JJB40006), Youth Talents Training Project of Chongqing Science Technology Commission (cstc2014kjrc-qnrc40001)

  • 摘要: 间断连接无线网络利用节点移动产生的通信机会完成数据传输,但网络中的恶意节点通过伪造节点的相遇信息等方法,吸引并丢弃数据,影响网络的运行。该文提出带有黑洞攻击探测的间断连接无线网络数据转发机制,通过节点诚信度、信用度、间接信任度及数据转发能力4维信任属性的评估,获知攻击节点的行为规律,并采用粗糙集理论降低网络运行过程中产生的不确定状态信息引发的误判率,更加准确地对节点的可信性进行判断,进而,合理地为数据选择中继节点。结果表明,所提出的方法能有效提升黑洞节点的辨识率,对网络中其它非协作行为也有一定探测和防御能力,能显著改善网络性能。
  • BOLDRINI C, LEE K, ONEN M, et al. Opportunistic networks[J]. Computer Communications, 2014, 48(14): 1-4.
    吴大鹏, 张普宁, 王汝言. 带有消息投递概率估计的机会网络自适应缓存管理策略[J]. 电子与信息学报, 2014, 36(2): 390-395.
    WU Dapeng, ZHANG Puning, and WANG Ruyan. Adaptive buffer management strategy with message delivery probability estimating method in opportunistic networks[J]. Journal of Electronics Information Technology, 2014, 36(2): 390-395.
    吴大鹏, 白娜, 王汝言. 带有节点状态估计的间断连接无线网络缓存管理策略[J]. 电子与信息学报, 2015, 37(2): 443-448.
    WU Dapeng, BAI Na, and WANG Ruyan. Cache management mechanism with node status evaluation for intermittently connected wireless networks[J]. Journal of Electronics Information Technology, 2015, 37(2): 443-448.
    DSOUZA R J and JOSE J. Routing approaches in delay tolerant networks: a survey[J]. International Journal of Computer Applications, 2010, 1(17): 8-14.
    CAO Z, DONG M, GAO Z, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J]. IEEE Transactions on Parallel Distributed Systems, 2014, 25(1): 22-32.
    JAIN S. Black hole attack in delay tolerant networks: a survey[J]. International Journal of Computer Science and Engineering, 2014, 2(4): 172-175.
    DINI G and DUCA A L. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network[J]. Ad Hoc Networks, 2012, 10(7): 1167-1178.
    LI N and DAS S K. A trust-based framework for data forwarding in opportunistic networks[J]. Ad hoc Networks, 2013, 11(4): 1497-1509.
    LI F, WU J, and SRINIVASAN A. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[C]. IEEE International Conference on Computer Communications 2009, Rio de Janeiro, Brazil, 2009: 2428-2436.
    REN Y, CHUAH M C, YANG J, et al. Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording[C]. 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, QC, Canada, 2010: 1-6.
    GUO Y, SCHILDT S, and WOLF L. Detecting blackhole and greyhole attacks in vehicular delay tolerant networks[C]. Fifth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 2013: 1-7.
    SAINI K K, SAINI A, and MEHAK. Nature based trust security protocol against greyhole attacks in opportunistic networks[J]. International Journal of Engineering Research Management Technology, 2014, 1(3): 21-28.
    JULIER S J, UHLMANN J K, and DURRANT-WHYTE H F. A new approach for filtering nonlinear systems[C]. Proceedings of the 1995 American Control Conference, Seattle, WA, USA, 1995, 3: 1628-1632.
    BAADACHE A and BELMEHDI A. Struggling against simple and cooperative black hole attacks in multi-hop wireless Ad hoc networks[J]. Computer Networks, 2014, 73(1): 173-184.
    LI F and WU J. Mobility reduces uncertainty in MANETs[C]. 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007: 1946-1954.
    PAWLAK Z and SOWINSKI R. Rough set approach to multi- attribute decision analysis[J]. European Journal of Operational Research, 1994, 72(3): 443-459.
    LINDGREN A, DORIA A, and SCHEL?N O. PROPHET: probabilistic routing in intermittently connected networks[J]. Moble Computing and Communications Review, 2003, 7(3): 1246-1250.
    RAMANA K S, CHARI A A, and KASIVISWANTH N. A survey on trust management for mobile Ad hoc networks[J]. International Journal of Network Security and Its Applications, 2010, 13(4): 562-583.
  • 加载中
计量
  • 文章访问数:  1456
  • HTML全文浏览量:  92
  • PDF下载量:  306
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-04-22
  • 修回日期:  2015-09-02
  • 刊出日期:  2016-02-19

目录

    /

    返回文章
    返回