通信学报 ›› 2013, Vol. 34 ›› Issue (2): 56-64.doi: 10.3969/j.issn.1000-436x.2013.02.007

• 学术论文 • 上一篇    下一篇

认知无线电网络中基于信任的安全路由模型

张光华1,2,张玉清1,3,刘雪峰1,3   

  1. 1 西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
    2 河北科技大学 信息科学与工程学院,河北 石家庄 050000
    3 中国科学院研究生院 国家计算机网络入侵防范中心,北京 100043
  • 出版日期:2013-02-25 发布日期:2017-07-17
  • 基金资助:
    国家自然科学基金资助项目;河北省高等学校科学研究基金资助项目;河北省自然科学基金资助项目

Trust based secure routing model for cognitive radio networks

Guang-hua ZHANG1,2,Yu-qing ZHANG1,3,Xue-feng LIU1,3   

  1. 1 State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071,China
    2 College of Information Science and Engineering,Hebei University of Science and Technology, Shijiazhuang 050000, China
    3 National Computer Network Intrusion Protection Center, GUCAS, Beijing 100043, China
  • Online:2013-02-25 Published:2017-07-17
  • Supported by:
    The National Natural Science Foundation of China;The University Scientific Research Foundation of Hebei Province;The Natural Science Foundation of Hebei Province

摘要:

摘 要:针对认知无线电网络中路由受到的选择性转发攻击,提出一种基于信任的安全路由模型。通过监视节点的数据转发行为,构建节点的信任以识别恶意节点。基于路由选择必须同频谱分配紧密结合的特点,在路由发现阶段,请求信息中封装节点的可用频谱机会并避免发送给恶意节点。在路由选择阶段,利用节点信任构建可用路径信任,结合延时度量进行路由决定。同时,根据节点的信任划分对其服务请求采取不同的响应,对非可信节点的恶意行为采取更严厉的惩罚,从而激励节点在路由中的合作。仿真结果及分析表明,在选择性转发攻击下,该模型较已有模型在网络吞吐率、端到端延迟方面都有较好的表现。

关键词: 认知无线电网络, 选择性转发攻击, 信任, 路由

Abstract:

A trust-based secure routing model was put forward for defending against the selective forwarding attack on routing in cognitive radio networks.Based on monitoring results of nodes' forwarding behavior, trusts were built in order to identify malicious nodes.For the characteristic that routing selection must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities was sent to non-malicious nodes during the routing discovery phase, and routing decisions were performed according to delays and available paths' trusts calculated from nodes' trusts during the routing selection phase.At t e time, different responses were made to service requests from nodes in different trust levels, and more severe penalties were taken for malicious behavior from non-trusted nodes, which can promote nodes’ cooperation in routing.Simul ion results and analysis show that under selective forwarding attack the proposed model has advantages in network throughput and end-to-end delay over the existing models.

Key words: cognitive radio network, selective forwarding attack, trust, routing

No Suggested Reading articles found!