Dynamical credibility aware data forwarding mechanism for intermittently connected wireless networks

被引:0
作者
Wu, Da-Peng [1 ]
Zhang, Hong-Pei [1 ]
Wang, Ru-Yan [1 ]
Liu, Qiao-Shou [1 ]
机构
[1] Key Laboratory of Optical Communication and Networks, Chongqing University of Posts and Telecommunications, Chongqing
来源
Tongxin Xuebao/Journal on Communications | 2015年 / 36卷 / 08期
基金
中国国家自然科学基金;
关键词
Data forwarding; Intermittently connected wireless networks; Non-cooperative behavior; Trust management;
D O I
10.11959/j.issn.1000-436x.2015159
中图分类号
学科分类号
摘要
A novel dynamic credibility aware packet forwarding mechanism for intermittently connected wireless networks is proposed. According to the network state information obtained locally by a moving node, the malicious degrees and collaboration degrees of nodes can be obtained in a distributed manner. Meanwhile, based on the node connectivity, the credibility of a node is estimated, furthermore, the relay node can be selected reasonably. Results show that the proposed mechanism can effectively enhance the reliability of data transmission while reducing the network load rate significantly. Thus, the utilization of network resources is improved. ©, 2015, Tongxin Xuebao/Journal on Communications. All right reserved.
引用
收藏
页数:10
相关论文
共 21 条
  • [1] Darshana P., Vandana V., Security enhancement of AODV protocol for mobile ad hoc network, International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2, 1, pp. 317-321, (2013)
  • [2] Zhu Y., Xu B., Shi X.H., Et al., A Survey of social-based routing in delay tolerant networks: Positive and negative social effects, IEEE Communications Surveys & Tutorials, 15, 1, pp. 387-401, (2013)
  • [3] Manam V.K.C., Mahendran V., Murthy C.S.R., Performance modeling of DTN routing with heterogeneous and selfish nodes, Wireless Networks, 20, 1, pp. 25-40, (2014)
  • [4] Li Y., Su G., Wang Z., Evaluating the effects of node cooperation on DTN routing, AEU-International Journal of Electronics and Communications, 66, 1, pp. 62-67, (2012)
  • [5] Resta G., Santi P., A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks, IEEE Transactions on Parallel and Distributed Systems, 23, 1, pp. 2-10, (2012)
  • [6] Zhu H., Du S., Gao Z., Et al., A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks, IEEE Transactions on Parallel and Distributed Systems, 25, 1, pp. 22-32, (2014)
  • [7] Anusha T., Rao N.S., Improving the trust and adversary detection process for delay-tolerant networks, International Journal of Computer Science and Mobile Applications, 1, 5, pp. 44-50, (2013)
  • [8] Govindan K., Mohapatra P., Trust computations and trust dynamics in mobile adhoc networks: A survey, IEEE Communications Surveys & Tutorials, 14, 2, pp. 279-298, (2012)
  • [9] Wang X., Liu L., Su J., Rlm: A general model for trust representation and aggregation, IEEE Transactions on Services Computing, 5, 1, pp. 131-143, (2012)
  • [10] Li F., Wu J., Srinivasan A., Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets, IEEE INFOCOM 2009, pp. 2428-2436, (2009)