Advanced Search
Volume 32 Issue 7
Aug.  2010
Turn off MathJax
Article Contents
Luo Jun-hai, Zheng Long, Fan Ming-yu. Research on MANETs Trusted Routing Decision Based on Multi-objective in Frequency Domain[J]. Journal of Electronics & Information Technology, 2010, 32(7): 1602-1607. doi: 10.3724/SP.J.1146.2009.00505
Citation: Luo Jun-hai, Zheng Long, Fan Ming-yu. Research on MANETs Trusted Routing Decision Based on Multi-objective in Frequency Domain[J]. Journal of Electronics & Information Technology, 2010, 32(7): 1602-1607. doi: 10.3724/SP.J.1146.2009.00505

Research on MANETs Trusted Routing Decision Based on Multi-objective in Frequency Domain

doi: 10.3724/SP.J.1146.2009.00505
  • Received Date: 2009-04-10
  • Rev Recd Date: 2010-04-20
  • Publish Date: 2010-07-19
  • Mobile Ad-hoc Networks (MANETs) have their fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. Due to the anonymous and self-organization nature of mobile nodes in the network, intermediate nodes on a communication path are expected to forward packets of other nodes so that nodes can communicate beyond their wireless transmission range. In this paper, a trusted routing selection algorithm based on multi-objectives in frequency-domain for MANETs is proposed. It is distinctly different with most of routing algorithms that select routing based on a single-objective in the time-domain. The proposed algorithm tries to analyze the secure and trusted routing based on probability theory to reduce the computation complex with the mutual transformation of probability functions between time-domain and frequency-domain. It solves the problem of finding secure and trusted routing for MANETs in the case of the lack of physical security, untrustworthy scenario and low trust levels among nodes in MANETs and malicious nodes colluding with one another to disrupt the network operation. Extensive analysis is carried out to evaluate the design of the algorithm.
  • loading
  • Prayag N, Sanjay Kumar D, and Sudip M, et al.. Security inmobile Ad-hoc networks using soft encryption andtrust-based multi-path routing [J]. ComputerCommunications, 2008, 31(4): 760-769.[2]Vasantha V and Manimegalai D. Mitigating routingmisbehaviors using subjective trust model in mobile Ad hocnetworks [C]. International Conference on ComputationalIntelligence and Multimedia Applications, Sivakasi, TamilNadu, India, December 13-15, 2007: 417-422.Neeraj N, Patel R B, and Bhat V K. Trust aware routing withload balancing in ad hoc network using mobile agent [C]. 15thInternational Conference on Advanced Computing andCommunications, Guwahati, India, December 18-21, 2007:454-459.[3]Wang Kun, Wu Meng, and Shen Su bin. A trust evaluationmethod for node cooperation in mobile ad hoc networks [C].5th International Conference on Information Technology,Nevada, USA, April 7-9, 2008: 1000-1005.[4]Bounpadith, Hidehisa N, and Nei K, et al.. A study of arouting attack in OLSR-based mobile ad hoc networks [J].International Journal of Communication Systems.2007,20(11):1245-1261[5]Satyanarayana A. Unified formula for analysis of somenetwork reliability problems [J].IEEE Transactions onReliability.1982, R-31(1):23-32[6]Kannhavong Bounpadith, Nakayama Hidehisa, and NemotoYoshiaki, et al.. A survey of routing attacks in mobile Ad hocnetworks[J].IEEE Wireless Communications.2007, 14(5):85-91[7]Katsuhiko O. System Dynamics (Fourth Edition) [M]. NewJersey, Prentice Hall, August 23, 2003: 350-480.[8]Andel Todd R and Yasinsac Alec. Adaptive threat modelingfor secure Ad hoc routing protocols [J]. Electronic Notes inTheoretical Computer Science, 2008, 197(2): 3-14.[9]Zouridaki Charikleia, Brian M L, and Marek H. Byzantinerobust trust establishment for mobile Ad hoc networks [J].Telecommunication Systems.2007, 35(3-4):189-206[10]Zheng Long and Zhou J L. Optimization of militarytransportation path based on generalized cut set algorithm[J]. Computer Engineering, 2007, 33(11): 4-9.[11]Zheng Long, Liu Xue, and Zhou Jing lun. Frequency-domainreliability analysis and modeling of networked controlsystems [C]. Third International Workshop on FeedbackControl Implementation and Design in Computing Systemsand Networks, Annapolis, Maryland, USA, June 6, 2008:35-40.[12]Carlos R H and Thomas K. A mutual networksynchronization method for wireless Ad hoc and sensornetworks [J].IEEE Transactions on Mobile Computing.2008,7(5):633-645
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3338) PDF downloads(549) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return