Journal on Communications ›› 2013, Vol. 34 ›› Issue (9): 92-104.doi: 10.3969/j.issn.1000-436x.2013.09.012
• Academic paper • Previous Articles Next Articles
Bo WANG,Xun-xun CHEN
Online:
2013-09-25
Published:
2017-07-05
Supported by:
Bo WANG,Xun-xun CHEN. Opportunistic routing algorithm based on trust model for ad hoc network[J]. Journal on Communications, 2013, 34(9): 92-104.
[1] | 田克, 张宝贤, 马建 ,等. 无线多跳网络中的机会路由[J]. 软件学报, 2010,21(10): 2542-2553. TIAN K , ZHANG BX , MA J ,et al. Opportunistic routing protocols for wireless multihop networks[J]. Journal of Software, 2010,21(10): 2542-2553. |
[2] | BISWAS S , MORRIS R . ExOR:opportunistic multi-hop routing for wireless networks[A]. Proceedings of ACM SIGCOMM[C]. Pennsylvania,USA, 2005. 133-144. |
[3] | LU M M , WU J . Opportunistic routing algebra and its applications[A]. Proceedings of INFOCOM[C]. Riode Janeiro,Brazil, 2009. 2374-2382. |
[4] | DUBOIS-FERRIERE H , GROSSGLAUSER M , VETTERLI M . Leastcost opportunistic routing[A]. Proceedings of 2007 Allerton Conference on Communication,Control,and Computing[C]. Monticello,USA, 2007. 1-8. |
[5] | ZENG K , LUO W , ZHAI H . On end-to-end throughput of opportunistic routing in multirate and multihop wireless networks[A]. Proceedings of IEEE INFOCOM’08 Conference[C]. Phoenix,USA, 2008. 1490-1498. |
[6] | ZHONG Z , NELAKUDITI S . On the efficacy of opportunistic routing[A]. Proceedings of SECON ’07[C]. San Diego,USA, 2007. 18-21. |
[7] | LU M , LI F , WU J . Efficient opportunistic routing in utility-based ad hoc networks[J]. IEEE Trans Reliability, 2009,58(3): 485-495. |
[8] | ZENG K , LOU W , ZHANG Y . Multi-rate geographic opportunistic routing in wireless ad hoc networks[A]. IEEE Milcom[C]. Orlando,USA, 2007. 1-7. |
[9] | YANG Z Y , ZENG K , LOU W J . FSA:a fast coordination scheme for opportunistic routing[A]. Proceedings IEEE ICC 2009[C]. Dresden,Germany, 2009. 1-5. |
[10] | CHACHULSKI S , JENNINGS M , KATTI S ,et al. Trading structure for randomness in wireless opportunistic routing[A]. Proceedings of ACM SIGCOMM[C]. Kyoto,Japan, 2007. 169-180. |
[11] | CUI T , CHEN L , HO T ,et al. Opportunistic source coding for data gathering in wireless sensor networks[A]. Proceedings of MASS[C]. Pisa,Italy, 2007. 1-10. |
[12] | ZUBOW A , KURTH M , REDLICH J P . Multi-channel opportunistic routing[A]. Proceedings of IEEE European Wireless[C]. Paris,France, 2007. 1-7. |
[13] | LI Y H , CHEN W , ZHANG Z L . Optimal forwarder list selection in opportunistic routing[A]. Proceedings of MASS[C]. Pisa,Italy, 2007. 670-675. |
[14] | ZHANG C , ZHOU M C , YU M . ad hoc network security:a review[J]. Int J Commun Syst, 2007,20(8): 909-925. |
[15] | LI X Q , LYU M R . A trust model based routing protocol for secure ad hoc networks[A]. Proc of IEEE Aerospace Conference[C]. Big Sky,Montana,USA, 2004. 1266-1295. |
[16] | MARTI S , GIULI T , LAI K ,et al. Mitigating routing misbehavior in mobile ad hoc networks[A]. Proc of MobiCom’00[C]. New York:ACM,USA, 2000. 255-265. |
[17] | COUTO D D , AGUAYO D , BICKET J ,et al. A high-throughput path metric for multi-hop wireless routing[A]. Proc of IEEE/ACM MOBICOM[C]. San Diego,USA, 2003. 134-146. |
[18] | LUO J H , LIU X , FAN M Y . A trust model based on fuzzy recommendation for mobile ad-hoc networks[J]. Computer Networks, 2009,53(14): 2396-2407. |
[19] | LUO J,LIU X , ZHANG Y , et a l . Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks[A]. Proc of the 33rd IEEE Conference on Local Computer Networks (LCN 2008)[C]. Montreal,Canada, 2008. 305-311. |
[20] | GONG W , YOU Z Y , CHEN D N ,et al. Trust based routing for misbehavior detection in ad hoc networks[J]. Journal of Networks, 2010,5(5): 551-558. |
[21] | DAI H J , JIA Z P , QIN Z W . Trust evaluation and dynamic routing decision based on fuzzy theory for MANETs[J]. Journal f Software, 2009,4(10): 1091-1101. |
[22] | LI J , LI R , KATO J . Future trust management framework for mobile ad hoc networks[J]. IEEE Communications Magazine, 2008,46(4): 108-114. |
[23] | OMAR M , CHALLAL Y , BOUABDALLAH A . Reliable and fully distributed trust model for mobile ad hoc networks[J]. Computer Security, 2009,28(3): 199-214. |
[24] | MILLAN G L , PEREZ M G , PEREZ G M ,et al. PKI-based trust management in inter-domain scenarios[J]. Computer Security, 2010,29(2): 278-290. |
[25] | LI F , WU J . Uncertainty modeling and reduction in MANETs[J]. IEEE Transaction on Mobile Computing, 2010,9(7): 1035-1048. |
[26] | 陈深龙, 张玉清 . 增强ad hoc网络可生存性的健壮多维信任模型[J]. 通信学报, 2010,31(5): 1-9. CHEN S L , ZHANG Y Q . Robust multi-dimensional trust model for improving the survivability of ad hoc networks[J]. Journal on Communications, 2010,31(5): 1-9. |
[27] | PENG S C , JIA W J , WANG G J ,et al. Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks[J]. IEICE Trans on Information and Systems, 2010,E93-D(3): 510-517. |
[28] | ESCH J . A survey of trust and reputation management systems in wireless communications[A]. Proceedings of the IEEE[C]. 2010.98(10): 1755-1772. |
[29] | RAZA I , HUSSAIN S A . Identification of malicious nodes in an AODV pure ad hoc network through guard nodes[J]. Computer Communications, 2008,31(9): 1796-1802. |
[30] | LI X , JIA Z , ZHANG P ,et al. Trust-based on-demand multipath routing in mobile ad hoc networks[J]. IET Information Security, 2010,41(4): 212-232. |
[31] | WANG F , WANG F R , HUANG B X ,et al. COSR:a reputation-based secure route protocol in MANET[J]. EURASIP Journal on reless Communications and Networking, 2010,2010: 1-10. |
[32] | PIRZADA A A , MCDONALD C , DATTA A . Performance comparison of trust-based reactive routing protocols[J]. IEEE Transactions on Mobile Computing, 2006,5(6): 695-710. |
[33] | LETOR N , CLEYN P D , BLONDIA C . Enabling cross layer de:adding the mad Wi-Fi extensions to nsclick[A]. Proc the First International Workshop on Network Simulation Tools 2007[C]. Nantes,France, 2007. 1-10. |
[34] | KOHLER E,MORRIS R , CHEN B , et a l . The click modular router[J]. ACM Trans on Computer Systems, 2000,18(3): 263-297. |
[35] | The network simulator-ns-2[EB/OL]. , 2012. |
[36] | WAXMAN BERNARD M . Routing of multipoint connections[J]. IEEE Journal on Selected Areas in Communications, 1988,6(9): 1617-1622. |
[37] | WANG B , CHEN X X . An efficient trust-based opportunistic routing for ad hoc networks[A]. Proc of WCSP 2012,IEEE Communications Society[C]. Huangshan,China, 2012. 1-7. |
[38] | WANG B , HUANG C H . Trust-based minimum cost opportunistic routing for ad hoc networks[J]. Journal of Systems and Software, 2011,84(12): 2107-2122. |
[1] | Lin ZHANG,Huan XING,Ru-chuan WANG,Chao-jie WU. Dynamic trust model based on recommendation chain classification in complex network environment [J]. Journal on Communications, 2015, 36(9): 55-64. |
[2] | Xing-mao WANG,Xing-ming ZHANG,Jiang-xing WU. Collaborative filtering recommendation algorithm based on one-jump trust model [J]. Journal on Communications, 2015, 36(6): 193-200. |
[3] | Li-ming JIANG,Zhi-ming LIU,Kun ZHANG,Jian XU,Hong ZHANG. Research on trust measure and management for open distributed systems based on dynamic grouping [J]. Journal on Communications, 2015, 36(1): 100-110. |
[4] | . Research on content distribution mechanism of MP2P networks [J]. Journal on Communications, 2013, 34(5): 19-175. |
[5] | Guo-yin ZHANG,Lu LI,Jian-guo SUN,Xiang-hui WANG. Research on content distribution mechanism of MP2P networks [J]. Journal on Communications, 2013, 34(5): 168-175. |
[6] | . Distributed trust model based on parameter modeling [J]. Journal on Communications, 2013, 34(4): 6-59. |
[7] | Jing-pei WANG,Bin SUN,Xin-xin NIU,Yi-xian YANG. Distributed trust model based on parameter modeling [J]. Journal on Communications, 2013, 34(4): 47-59. |
[8] | Yan-lin QIN,Xiao-ping WU,Jian-xin GAO. Research on selective trust-path search and aggregation in distributed environment [J]. Journal on Communications, 2012, 33(Z1): 148-156. |
[9] | Jiang-tao WANG,Zhi-gang CHEN,Xiao-heng DENG. Context-aware and self-adaptive trust model for pervasive computing [J]. Journal on Communications, 2012, 33(11): 41-48. |
[10] | Lin ZHANG,Ru-chuan WANG,Hai-yan WANG. Trust transitivity algorithm based on multiple influencing factors for grid environment [J]. Journal on Communications, 2011, 32(7): 161-168. |
[11] | Xin GU,Zheng-quan XU,Jin LIU. Review of cloud based trust model [J]. Journal on Communications, 2011, 32(7): 176-181. |
[12] | Mo YANG,Li-na WANG. Research of Web service reliability enhancement method based on trust fault tolerant [J]. Journal on Communications, 2010, 31(9): 133-140. |
[13] | Shen-long CHEN,Yu-qing ZHANG. [J]. Journal on Communications, 2010, 31(5): 1-9. |
[14] | Zhi-guo SHI,Ji-wei LIU,Zhi-liang WANG. Dynamic P2P trust model based on time-window feedback mechanism [J]. Journal on Communications, 2010, 31(2): 120-129. |
[15] | Liang-min WANG,Yuan-bo GUO,Yong-zhao ZHAN. Fuzzy trust model for wireless sensor networks with intrusion tolerance [J]. Journal on Communications, 2010, 31(12): 37-44. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|