Suppr超能文献

利用信任在认知无线电网络中建立安全路由模型。

Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

作者信息

Zhang Guanghua, Chen Zhenguo, Tian Liqin, Zhang Dongwen

机构信息

State Key Lab of Integrated Service Networks, Xidian University, Xi'an, Shannxi, China; College of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, Hebei, China.

School of Information Science & Engineering,Northeastern University,Shenyang, Liaoning, China; College of Computer Science and Technology, North China Institute of Science and Technology, East Yanjiao,Beijing, China.

出版信息

PLoS One. 2015 Sep 30;10(9):e0139326. doi: 10.1371/journal.pone.0139326. eCollection 2015.

Abstract

Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

摘要

针对认知无线电网络中路由的选择性转发攻击,本文提出了一种基于信任的安全路由模型。通过监测节点的转发行为,构建节点信任以识别恶意节点。考虑到基于路由选择的模型必须与频谱分配紧密协作,将携带可用频谱机会的路由请求发送给非恶意节点。在路由决策阶段,利用节点信任构建可用路径信任,并结合延迟测量来做出路由决策。同时,根据信任分类,针对其服务请求做出不同响应。通过对来自不可信节点的恶意行为采取更严厉的惩罚措施,可以激发节点在路由中的合作。仿真结果与分析表明,该模型在选择性转发攻击下,在网络吞吐量和端到端延迟方面具有良好的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bec8/4589414/f2758dabee63/pone.0139326.g001.jpg

相似文献

1
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.
PLoS One. 2015 Sep 30;10(9):e0139326. doi: 10.1371/journal.pone.0139326. eCollection 2015.
2
Using trust to secure geographic and energy aware routing against multiple attacks.
PLoS One. 2013 Oct 21;8(10):e77488. doi: 10.1371/journal.pone.0077488. eCollection 2013.
4
GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks.
Sensors (Basel). 2024 Jul 27;24(15):4879. doi: 10.3390/s24154879.
5
Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks.
Sensors (Basel). 2022 Jan 6;22(2):411. doi: 10.3390/s22020411.
6
Information-Aware Secure Routing in Wireless Sensor Networks.
Sensors (Basel). 2019 Dec 26;20(1):165. doi: 10.3390/s20010165.
7
TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain.
PLoS One. 2020 Mar 10;15(3):e0228844. doi: 10.1371/journal.pone.0228844. eCollection 2020.
10
Attack and flee: game-theory-based analysis on interactions among nodes in MANETs.
IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):612-22. doi: 10.1109/TSMCB.2009.2035929. Epub 2009 Dec 22.

引用本文的文献

1
History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network.
PLoS One. 2017 Aug 18;12(8):e0183387. doi: 10.1371/journal.pone.0183387. eCollection 2017.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验