首页 | 本学科首页   官方微博 | 高级检索  
     检索      

串谋行为识别的间断连接无线网络数据转发机制
引用本文:杨静,李无忧,闫俊杰,华磊.串谋行为识别的间断连接无线网络数据转发机制[J].系统工程与电子技术,2017,39(11):2571-2579.
作者姓名:杨静  李无忧  闫俊杰  华磊
作者单位:1. 重庆邮电大学通信与信息工程学院, 重庆 400065;; 2. 重庆高校市级光通信与网络重点实验室, 重庆 400065
摘    要:针对现有间断连接无线网络恶意节点检测机制缺乏对串谋恶意节点的有效识别和抵御方案,提出了一种串谋行为识别的间断连接无线网络数据转发机制。在认证节点历史状态信息的基础上,通过分析节点行为特征有效地识别串谋的恶意节点。在排除串谋节点干扰的情况下设计以信用度、协作度、连接度为联合指标的数据转发机制。仿真结果表明,所提出的机制在串谋节点的识别及抵御方面效果显著,提高了中继选择在面对恶意攻击时的健壮性,实现可靠高效的数据传输。


Collusion behavior recognizing data forwarding for intermittently connected wireless network
YANG Jing,LI Wuyou,YAN Junjie,HUA Lei.Collusion behavior recognizing data forwarding for intermittently connected wireless network[J].System Engineering and Electronics,2017,39(11):2571-2579.
Authors:YANG Jing  LI Wuyou  YAN Junjie  HUA Lei
Institution:1. School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications,Chongqing 400065, China; 2. Key Laboratory of Optical Communication and Network, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Abstract:For existing malicious node detection proposals failed to resist the malicious collusion node, a collusion behavior recognizing(CBR) data forwarding for intermittently connected wireless network is proposed which effectively identifies the malicious nodes collusion by nodes’ behavior analysis based on the gained historical status information of nodes. Furthermore, creditworthiness, cooperativeness and connectedness are selected as major parameters, after excluding interference with malicious nodes. Results show that CBR can effectively recognize collusion behavior, as well as robustness against collusion attack, and the proposed scheme may achieve efficient and robust data transmission, even with collusion attack.
Keywords:
点击此处可从《系统工程与电子技术》浏览原始摘要信息
点击此处可从《系统工程与电子技术》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号