信息网络安全 ›› 2019, Vol. 19 ›› Issue (1): 59-67.doi: 10.3969/j.issn.1671-1122.2019.01.008

• 技术研究 • 上一篇    下一篇

一种基于信任的组播路由协议

李本霞(), 夏辉, 张三顺   

  1. 青岛大学计算机科学技术学院,山东青岛 266001
  • 收稿日期:2018-10-14 出版日期:2019-01-20 发布日期:2020-05-11
  • 作者简介:

    作者简介:李本霞(1993—),女,山东,硕士研究生,主要研究方向为信息安全;夏辉(1986—),男,山东,副教授,博士,主要研究方向为网络与信息安全、可信计算;张三顺(1994—),男,河南,硕士研究生,主要研究方向为网络与信息安全。

  • 基金资助:
    国家自然科学基金[61402245];中国博士后科学基金[2015T80696];山东省自然科学基金[ZR2014FQ010];山东省高等学校科技计划项目[J16LN06]

A Trust-based Multicast Routing Protocol

Benxia LI(), Hui XIA, Sanshun ZHANG   

  1. Scholl of Computer Science and Technology, Qingdao University, Qingdao Shandong 266001, China
  • Received:2018-10-14 Online:2019-01-20 Published:2020-05-11

摘要:

Ad-hoc网络是一个无中心的对等式网络,网络中的节点地位平等,节点可以随时加入或离开,缺乏集中管理。这导致网络极易受到各种内部攻击,其中最常见的是路由攻击。目前学术界应对此类攻击的有效方法是提出合适的节点信任模型,并应用到各种路由协议中。现有信任模型中普遍存在的问题是不能合理整合计算节点信任值的各类决策因子。文章提出一种信任模型,运用模糊逻辑理论综合两个因子,并在反模糊化后得出节点信任值。文章将信任模型用于MAODV组播路由协议的路由建立与维护过程中,提出一种路由协议MTAODV。仿真实验证明,MTAODV以端到端延迟和路由开销略微增大为代价,有效提高了网络中数据包的传递率。

关键词: Ad-hoc网络, 路由攻击, 信任模型, 模糊逻辑

Abstract:

Ad-hoc network is a centerless peer-to-peer network. Nodes in the network have equal status. Nodes can join or leave the network at any time without centralized management. This makes the network vulnerable to various internal attacks, the most common of which is routing attack. At present, the effective way to deal with such attacks in academia is to propose a suitable trust model for nodes and apply it to various routing protocols. The common problem in existing trust models is that it is impossible to integrate reasonably all kinds of decision-making factors for calculating the trust values of nodes. This paper proposes a trust model, which synthesizes two factors by using the fuzzy logic theory, and obtains the trust values of nodes after de-fuzzification. This paper applies trust model to the routing establishment and maintenance of multicast routing protocol MAODV, and proposes a routing protocol MTAODV. The simulation results show that MTAODV can effectively improve the transmission rate of data packets in the network at the cost of end-to-end delay and slightly increased routing overhead.

Key words: Ad-hoc network, routing attack, trust model, fuzzy logic

中图分类号: