一种基于D-S证据理论的Ad Hoc网络安全路由协议  被引量:9

A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks

在线阅读下载全文

作  者:李小青[1] 李晖[1] 杨凯[1] 马建峰[1] 

机构地区:[1]计算机网络与信息安全教育部重点实验室(西安电子科技大学),西安710071

出  处:《计算机研究与发展》2011年第8期1406-1413,共8页Journal of Computer Research and Development

基  金:国家自然科学基金项目(60772136;61003300);国家"111"计划基金项目(B08038);中央高校基本科研业务费专项基金项目(JY10000901032;JY10000901025;JY10000901034)

摘  要:基于D-S证据理论,设计了一个MANET信任评估模型,为路由建立提供安全的网络环境.改进ARAN协议,提出安全的路由协议AE-ARAN.协议根据信任评估结果选择可信节点建立路由,并提出在路由表中存储节点匿名身份的Hash路由登记表,保证ARAN协议认证安全,实现匿名安全和提高路由查找效率,同时协议在路由建立过程中,完成会话密钥协商.理论分析和仿真结果表明,所提出的协议能有效地检测和隔离恶意节点,抵御攻击.协议可实现路由匿名性,提高网络的效率及安全性.We present an anonymous and efficiently routing protocol AE-ARAN for MANET based on Dempster-Shafer(D S) evidence theory. A trust evaluation model which is a system of trust valuation is given. It could discover malicious actions in networks dynamically and timely and isolate them efficiently, and resist attacks to some extent and improve the reliability, robustness and security of the over all network effectively. So it could provide a secure network environment for routing establishment. Meanwhile, the ARAN is modified and we present the anonymous identity of nodes by the way of the Hash routing, which stored in routing table. It can effectively ensure the anonymous of the networks and avoid launching a routing request repeatedly. Based on the Diffie-Hellman key agreement arithmetic, the protocol set up the key agreement at the time of routing. Theoritical analysis and simulation results show that the proposed scheme can detect and isolate malicious nodes efficiently and resist attacks. The protocol can achieve the anonymous and improve the efficiency and security of the all network.

关 键 词:密码学 路由协议 D-S证据理论 信任评估模型 移动自组织网络 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象