作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (20): 76-80. doi: 10.3969/j.issn.1000-3428.2012.20.020

• 网络与通信 • 上一篇    下一篇

基于信任评估的Ad hoc网络安全路由协议

孙 苏,仲 红,石润华,刘亚峰   

  1. (安徽大学计算智能与信号处理教育部重点实验室,合肥 230039)
  • 收稿日期:2011-12-20 修回日期:2012-01-31 出版日期:2012-10-20 发布日期:2012-10-17
  • 作者简介:孙 苏(1988-),女,硕士研究生,主研方向:网络与信息安全;仲 红,教授、博士;石润华,副教授、博士;刘亚峰,硕士研究生
  • 基金资助:
    国家自然科学基金资助项目(61173188, 61173187);安徽省自然科学基金资助项目(11040606M141);安徽大学“211”工程基金资助项目

Secure Routing Protocol Based on Trust Evaluation in Ad hoc Network

SUN Su, ZHONG Hong, SHI Run-hua, LIU Ya-feng   

  1. (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230039, China)
  • Received:2011-12-20 Revised:2012-01-31 Online:2012-10-20 Published:2012-10-17

摘要: 针对Ad hoc网络的路由安全问题,提出一种基于信任评估的Ad hoc网络安全路由协议,采用改进的信任评估模型,每个节点维护一张信任表,在路由过程中结合信任表并通过路由请求和路由回复,双向判断上一跳和下一跳节点的可信性,并且在路径选择时综合路径信任值和跳数值2个因素,使得信任评估和路由协议紧密地结合。通过NS2仿真实验进行验证,结果表明,该协议可以较好地避开自私节点,保证路由安全,提高路由性能。

关键词: Ad hoc网络, 安全路由, 信任评估, 自私节点, 信任表, NS2仿真

Abstract: Aiming at the security problem on routing in Ad hoc network, this paper presents a secure routing protocol based on trust evaluation in Ad hoc network. It uses the modified trust evaluation model, every node maintains a table of trust value. In the process of routing, it judges credibility of the previous hop and next hop in RREQ and RREP according to that table, and chooses the route considering both the value of route trust and hop count. The scheme makes trust evaluation and routing protocol have more connection with each other. Through NS2 simulation experiment, result shows that the protocol can avoid selfish node well, and it not only enhances the security, but also increases the routing efficiency.

Key words: Ad hoc network, secure routing, trust evaluation, selfish node, trust table, NS2 simulation

中图分类号: