Advanced Search
Volume 37 Issue 7
Jul.  2015
Turn off MathJax
Article Contents
Wu Da-peng, Feng Yu, Wang Ru-yan, Liu Qiao-shou. Malicious Node Tolerant Packet Forwarding Mechanism for Intermittently Connected Wireless Network[J]. Journal of Electronics & Information Technology, 2015, 37(7): 1591-1597. doi: 10.11999/JEIT141198
Citation: Wu Da-peng, Feng Yu, Wang Ru-yan, Liu Qiao-shou. Malicious Node Tolerant Packet Forwarding Mechanism for Intermittently Connected Wireless Network[J]. Journal of Electronics & Information Technology, 2015, 37(7): 1591-1597. doi: 10.11999/JEIT141198

Malicious Node Tolerant Packet Forwarding Mechanism for Intermittently Connected Wireless Network

doi: 10.11999/JEIT141198
  • Received Date: 2014-09-15
  • Rev Recd Date: 2015-02-04
  • Publish Date: 2015-07-19
  • Packets in ICWN (Intermittently Connected Wireless Network) are delivered in a cooperation manner between nodes, which means the existence of malicious nodes will degrade the network performance. A malicious node tolerant message forwarding mechanism is proposed in this paper. By exploiting the historical node behavior information, directly observed information is combined with the recommendation information from neighbor nodes to perceive malicious node behavior according to the dynamical reputation threshold. Consequently, evidence theory is utilized to quantify the node relation to detect malicious nodes, and then the optimal relay nodes selecting can be achieved. Results show that, under the attack of collaborating malicious nodes, malicious nodes can be accurately identified by the proposed mechanism, which leads to the notably improving packet delivery ratio and average delay.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (976) PDF downloads(436) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return