期刊文献+

移动Ad Hoc网络中基于模糊逻辑的信任预测模型 被引量:1

Trust prediction model based on fuzzy logic in mobile Ad Hoc networks
下载PDF
导出
摘要 为了增强Ad Hoc网络的安全性,提出了一种动态信任预测模型。该模型综合考虑了影响信任的两个因素:节点的历史行为和节点提供服务的能力,引入了时间衰减函数来精确地估计节点的直接信任值,并通过模糊逻辑规则预测方法来评估节点的当前信任值。最后,为了验证该模型的有效性,将该模型应用于AODV路由协议中,定义为FTAODV路由协议,并利用NS-2仿真软件对两种协议进行比较。仿真结果表明:FTAODV路由协议能够有效地监测恶意节点,从而提高了分组投递率,降低了平均端到端时延和路由包开销。 In order to enhance the security of Ad Hoc networks,a dynamic trust prediction model was presented in this paper.This model took the account of two factors that affect trust: the node's historical behaviors and capacity of providing services.A time decay function was introduced to estimate the node's direct trust value accurately,and the node's current trust value was assessed by using fuzzy logic rules prediction methods.Finally,this model was applied into AODV routing protocol to verify the validity of the model,which was defined as FTAODV routing protocol,and the two protocol were compared by using NS-2 simulator.The simulation results show that FTAODV routing protocol can effectively detect malicious nodes,thus improving packet delivery ratio,and decreasing average end-to-end delay and routing packet overhead.
出处 《计算机应用》 CSCD 北大核心 2012年第12期3435-3438,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61163038) 甘肃省教育厅科研项目(1001B-01)
关键词 AD HOC网络 信任预测 模糊逻辑 隶属函数 恶意节点 Ad Hoc network trust prediction fuzzy logic membership function malicious node
  • 相关文献

参考文献12

二级参考文献78

共引文献48

同被引文献13

  • 1宋建华,洪帆,何晓冰.移动Ad Hoc网的典型网络攻击与防范[J].微计算机应用,2007,28(5):454-459. 被引量:9
  • 2Yu B,Singh M P Singh.An evidential model of distributed reputation management[C]//Proceedings of the first international joint conference on autonomous agents and multi-agent systems,[S.1.]:ACM,2002:294-301.
  • 3Josang A.A logic for uncertain probabilities[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2001,9(3):279-311.
  • 4Mui L.Computational models of trust and reputation:agents,evolutionary games,and social networks[D].Massachusetts:Massachusetts Institute of Technology,2003.
  • 5Durad M H,Cao Yuanda,Zhu Liehuang.Two novel trust evaluation algorithm[C].Communications Circuits and Systems Proceedings,GUILIN:IEEE,2006:1641-1646.
  • 6Sun Y L,Yu Wei,Han Zhu,et al.Trust Modeling and Evaluation in Ad Hoc Networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):305-319.
  • 7Yi Jiazi,Cizeron E,Hamma S,et al.Simulation and Performance analysis of MP-OLSR for mobile ad hoc networks[C]//Wireless Communications and Networking Conference.Lasvegas:IEEE,2008.
  • 8Saaty T L.Decision making with the analytic hierarchy process[J].International Journal of Services Sciences,2008,1(1):83-98.
  • 9NS-2:Network Simulator(version2.29)[EB/OL].[2012-03-20].http://www.isi.edu/nsnam/ns/.
  • 10罗俊海,范明钰.基于置信度的MANETs主观信任管理模型[J].计算机研究与发展,2010,47(3):515-523. 被引量:7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部