高级检索
    李小青 李 晖 杨 凯 马建峰. 一种基于D-S证据理论的Ad Hoc网络安全路由协议[J]. 计算机研究与发展, 2011, 48(8): 1406-1413.
    引用本文: 李小青 李 晖 杨 凯 马建峰. 一种基于D-S证据理论的Ad Hoc网络安全路由协议[J]. 计算机研究与发展, 2011, 48(8): 1406-1413.
    Li Xiaoqing, Li Hui, Yang Kai, and Ma Jianfeng. A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(8): 1406-1413.
    Citation: Li Xiaoqing, Li Hui, Yang Kai, and Ma Jianfeng. A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(8): 1406-1413.

    一种基于D-S证据理论的Ad Hoc网络安全路由协议

    A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks

    • 摘要: 基于D-S证据理论,设计了一个MANET信任评估模型,为路由建立提供安全的网络环境.改进ARAN协议,提出安全的路由协议AE-ARAN.协议根据信任评估结果选择可信节点建立路由,并提出在路由表中存储节点匿名身份的Hash路由登记表,保证ARAN协议认证安全,实现匿名安全和提高路由查找效率,同时协议在路由建立过程中,完成会话密钥协商.理论分析和仿真结果表明,所提出的协议能有效地检测和隔离恶意节点,抵御攻击.协议可实现路由匿名性,提高网络的效率及安全性.

       

      Abstract: We present an anonymous and efficiently routing protocol AE-ARAN for MANET based on Dempster-Shafer(D-S) evidence theory. A trust evaluation model which is a system of trust valuation is given. It could discover malicious actions in networks dynamically and timely and isolate them efficiently, and resist attacks to some extent and improve the reliability, robustness and security of the over all network effectively. So it could provide a secure network environment for routing establishment. Meanwhile, the ARAN is modified and we present the anonymous identity of nodes by the way of the Hash routing, which stored in routing table. It can effectively ensure the anonymous of the networks and avoid launching a routing request repeatedly. Based on the Diffie-Hellman key agreement arithmetic, the protocol set up the key agreement at the time of routing. Theoritical analysis and simulation results show that the proposed scheme can detect and isolate malicious nodes efficiently and resist attacks. The protocol can achieve the anonymous and improve the efficiency and security of the all network.

       

    /

    返回文章
    返回