通信学报 ›› 2013, Vol. 34 ›› Issue (9): 92-104.doi: 10.3969/j.issn.1000-436x.2013.09.012

• 学术论文 • 上一篇    下一篇

ad hoc网络中一种基于信任模型的机会路由算法

王博,陈训逊   

  1. 国家计算机网络应急技术处理协调中心,北京 100029
  • 出版日期:2013-09-25 发布日期:2017-07-05
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目

Opportunistic routing algorithm based on trust model for ad hoc network

Bo WANG,Xun-xun CHEN   

  1. CNCERT/CC,Beijing 100029,China
  • Online:2013-09-25 Published:2017-07-05
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National High Technology Re-search and Development of China (863 Program)

摘要:

由于ad hoc网络具有缺乏足够的物理保护、拓扑结构动态变化、采用分布式协作、节点的带宽和计算能力有限等特点,导致传统的路由安全机制不再适合ad hoc网络路由协议的设计。最近当前研究热点之一的机会路由能够在链路不可靠的情况下充分利用无线广播和空间多样性的特性提高网络的吞吐量。因此,考虑在机会路由中引入信任相似性概念设计信任机会路由,建立了基于节点信任度和最小成本的信任机会转发模型,提出了最小成本的机会路由算法MCOR,并对算法进行了理论上的分析和证明。最后采用仿真实验对该算法进行验证,又与经典机会路由协议ExOR以及其他经典的信任路由协议TAODV和Watchdog-DSR进行性能对比。仿真结果表明,MCOR 算法能够防范恶意节点的攻击,在吞吐量、端到端时延、期望转发次数(ETX)和成本开销等方面都比其他3种协议表现出性能上的优势。

关键词: 信任相似性, 信任模型, 信任度, 机会路由, 机会路由成本

Abstract:

Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.

Key words: trust-based similarity, trust model, degree of trust, opportunistic routing, cost of opportunistic routing

[1] 李 颖,魏急波. 裁减自动球形译码算法与性能分析[J]. 通信学报, 2007, 28(5): 8 -54 .
[2] 包先雨,蒋建国,袁 炜,李 援. H.264/AVC标准中基于CABAC的数字视频加密研究[J]. 通信学报, 2007, 28(6): 5 -29 .
[3] 李方伟,李 晗,卢 晓. TD-SCDMA系统中多速率业务的接纳控制算法研究[J]. 通信学报, 2012, 33(4): 24 -182 .
[4] 胡玉鹏,罗昊,林亚平,秦拯,尹波. 社会网络中时空周期行为模式挖掘算法[J]. 通信学报, 2013, 34(1): 8 -18 .
[5] 陈晓华,李春芝,陈良育,曾振柄. 虚拟网络映射最小费用流模型及算法[J]. 电信科学, 2014, 30(6): 90 -94 .
[6] “基于大数据的互联网化存量经营”项目组,“基于用户感知的运维转型”项目组. 运营商存量经营大数据平台及其关键技术研究[J]. 电信科学, 2014, 30(6): 118 -125 .
[7] 沈成彬,王成巍,蒋铭,王波. 下一代PON技术的进展与应用[J]. 电信科学, 2010, 26(8): 1 -7 .
[8] 王晓鹏,王纯. 基于OSGi和RCP的融合通信客户端的设计与实现[J]. 电信科学, 2010, 26(8): 35 -41 .
[9] 刘军1,孙茜1,王英梅2,叶宁1,沙明博3. 支持网络编码的认知无线自组网拓扑控制算法[J]. 通信学报, 2013, 34(5): 16 -142 .
[10] 范 睿,鲍长春,李 锐. 基于ACELP的嵌入式语音编码算法[J]. 通信学报, 2007, 28(10): 8 -54 .