• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

T2AR:用于移动自组网的信任感知自组织路由协议。

T2AR: trust-aware ad-hoc routing protocol for MANET.

作者信息

Dhananjayan Gayathri, Subbiah Janakiraman

机构信息

Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu 641046 India.

Department of Banking Technology, Pondicherry University, Pondicherry, India.

出版信息

Springerplus. 2016 Jul 7;5(1):995. doi: 10.1186/s40064-016-2667-6. eCollection 2016.

DOI:10.1186/s40064-016-2667-6
PMID:27441127
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC4937011/
Abstract

Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

摘要

针对恶意攻击的安全数据传输是移动自组织网络(MANET)这种无基础设施的独立网络中的一个重要问题。MANET节点之间的信任保证是在动态拓扑变化和开放无线约束下提供高安全性的关键参数。但是,节点的恶意行为会降低节点的信任级别,从而导致数据传递不安全。恶意攻击的增加会导致过度的能量消耗,进而缩短网络寿命。在连接建立过程中,自组织按需距离向量(AODV)协议中节点位置信息更新的缺失使得节点之间的信任级别较低。因此,使用能量和移动性模型进行信任率计算及其更新是安全数据传递的基本任务。本文提出了一种信任感知自组织路由(T2AR)协议,以提高MANET中节点之间的信任级别。所提出的方法在信任率、能量、基于移动性的恶意行为预测的约束下修改了传统的AODV路由协议。通过对邻居节点日志报告中的数据包序列ID进行匹配来确定信任率,从而避免恶意报告的产生。此外,直接和间接信任观察方案的使用提高了信任级别。此外,利用接收信号强度指示符来确定受信任节点是否在通信范围内。将所提出的T2AR与现有方法(如TRUNCMAN、RBT、GR、FBR和DICOTIDS)在平均端到端延迟、吞吐量、误报率、数据包交付率方面进行的对比分析表明了T2AR在安全MANET环境设计中的有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/f3ea3cac37e0/40064_2016_2667_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/ca6670a6a029/40064_2016_2667_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/f45fd9bd4103/40064_2016_2667_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/183c2f70cc09/40064_2016_2667_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/028187131214/40064_2016_2667_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/3f193cb1acd3/40064_2016_2667_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/59c3db8c7368/40064_2016_2667_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/f3ea3cac37e0/40064_2016_2667_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/ca6670a6a029/40064_2016_2667_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/f45fd9bd4103/40064_2016_2667_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/183c2f70cc09/40064_2016_2667_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/028187131214/40064_2016_2667_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/3f193cb1acd3/40064_2016_2667_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/59c3db8c7368/40064_2016_2667_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3fd8/4937011/f3ea3cac37e0/40064_2016_2667_Fig7_HTML.jpg

相似文献

1
T2AR: trust-aware ad-hoc routing protocol for MANET.T2AR:用于移动自组网的信任感知自组织路由协议。
Springerplus. 2016 Jul 7;5(1):995. doi: 10.1186/s40064-016-2667-6. eCollection 2016.
2
Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm.使用增强型AODV算法在无线自组织网络中进行安全恶意节点检测。
Sci Rep. 2024 Apr 3;14(1):7818. doi: 10.1038/s41598-024-57480-6.
3
Systematic review on modification to the on-demand distance vector routing discovery mechanics.关于对按需距离向量路由发现机制进行修改的系统评价。
PeerJ Comput Sci. 2022 Sep 5;8:e1079. doi: 10.7717/peerj-cs.1079. eCollection 2022.
4
Networked control system with MANET communication and AODV routing.采用移动自组织网络(MANET)通信和自组织按需距离向量路由协议(AODV)的网络控制系统。
Heliyon. 2022 Nov 18;8(11):e11678. doi: 10.1016/j.heliyon.2022.e11678. eCollection 2022 Nov.
5
Highly Reliable Fuzzy-Logic-Assisted AODV Routing Algorithm for Mobile Ad Hoc Networks.用于移动自组织网络的高度可靠的模糊逻辑辅助AODV路由算法
Sensors (Basel). 2021 Sep 6;21(17):5965. doi: 10.3390/s21175965.
6
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.一种基于源匿名性的轻量级安全AODV协议,用于基于雾的移动自组网。
Sensors (Basel). 2017 Jun 17;17(6):1421. doi: 10.3390/s17061421.
7
Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks.移动自组织网络中基于区块链的轻量级信任管理
Sensors (Basel). 2020 Jan 27;20(3):698. doi: 10.3390/s20030698.
8
3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.3VSR:在对抗环境中使用传感逻辑的车载自组织网络的三值安全路由
Sensors (Basel). 2018 Mar 14;18(3):856. doi: 10.3390/s18030856.
9
Fuzzy-based optimization of AODV routing for efficient route in wireless mesh networks.基于模糊算法的无线网状网络中AODV路由优化以实现高效路由
PeerJ Comput Sci. 2023 Oct 18;9:e1508. doi: 10.7717/peerj-cs.1508. eCollection 2023.
10
A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things.基于信任的物联网移动自组网预测模型。
Sensors (Basel). 2019 Mar 26;19(6):1467. doi: 10.3390/s19061467.