Secure Routing Algorithm Based On Trust Value for Ad Hoc Networks

被引:0
作者
Wang, Li [1 ]
Wang, Qingwen [1 ]
Zhang, Haijing [1 ]
机构
[1] Xian Res Inst High Technol, Xian 710025, Peoples R China
来源
PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2016) | 2016年 / 56卷
关键词
Ad hoc networks; Secure routing algorithm; Trust value; Attack;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The malicious behavior seriously reduce the performance of ad hoc networks. To solve this problem, we propose a secure routing algorithm TLS-DSR. It applies improved the bayesian trust evaluation model to optimize the routing algorithm. The simulation results using network simulator NS-2 demonstrates the algorithm can efficiently resist the betrayed attack and the oscillation attack.
引用
收藏
页码:127 / 131
页数:5
相关论文
共 8 条
[1]  
Hu Y., 2002, PROC 8 ACM INT C MOB, P12
[2]   A secure routing protocol for ad hoc networks [J].
Sanzgiri, K ;
Dahill, B ;
Levine, BN ;
Shields, C ;
Belding-Royer, EM .
10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, :78-87
[3]   Defense of trust management vulnerabilities in distributed networks [J].
Sun, Yan ;
Han, Zhu ;
Liu, K. J. Ray .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (02) :112-119
[4]   Attacks on trust evaluation in distributed networks [J].
Sun, Yan Lindsay ;
Han, Zhu ;
Yu, Wei ;
Liu, K. J. Ray .
2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, :1461-1466
[5]  
Xu Zhi-jun, 2012, Journal on Communications, V33, P27
[6]  
Yih-Chun H., 2003, AD HOC NETW, V1, P175, DOI DOI 10.1016/S1570-8705(03)00019-2
[7]   Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1,1) model [J].
Zhang, Feng ;
Jia, Zhi-Ping ;
Xia, Hui ;
Li, Xin ;
Edwin, H. -M. Sha .
COMPUTER COMMUNICATIONS, 2012, 35 (05) :589-596
[8]  
Zhang XY, 2012, J GANSU LIANHE U, V26, P50