计算机工程
計算機工程
계산궤공정
COMPUTER ENGINEERING
2015年
2期
100-106
,共7页
陆小玲%仲红%林群峰%石润华
陸小玲%仲紅%林群峰%石潤華
륙소령%중홍%림군봉%석윤화
移动自组织网络%信任模型%分簇%代理%多角色节点%NS2仿真
移動自組織網絡%信任模型%分簇%代理%多角色節點%NS2倣真
이동자조직망락%신임모형%분족%대리%다각색절점%NS2방진
Mobile Ad hoc Network( MANET)%trust model%clustering%agent%multi-role node%NS2 simulation
针对现有信任评估模型中簇头选择标准单一、不同角色节点信任值难以分配与更新的问题,提出一种多角色的信任评估模型。将节点分成簇头、簇成员、网关和代理4种角色,引入节点信任值、移动性、相关度等多影响因子作为簇头、网关和代理的选择标准,采用新颖簇头节点的信任值计算方式。在簇内簇头节点的信任值由代理节点监督计算。在簇间利用由簇头、代理以及网关节点形成简化网络,根据社会网中人际关系的特点分配不同关系节点的可信度。 NS2仿真实验结果表明,该模型能有效检测出恶意节点并将其隔离,保证网络的安全性。
針對現有信任評估模型中簇頭選擇標準單一、不同角色節點信任值難以分配與更新的問題,提齣一種多角色的信任評估模型。將節點分成簇頭、簇成員、網關和代理4種角色,引入節點信任值、移動性、相關度等多影響因子作為簇頭、網關和代理的選擇標準,採用新穎簇頭節點的信任值計算方式。在簇內簇頭節點的信任值由代理節點鑑督計算。在簇間利用由簇頭、代理以及網關節點形成簡化網絡,根據社會網中人際關繫的特點分配不同關繫節點的可信度。 NS2倣真實驗結果錶明,該模型能有效檢測齣噁意節點併將其隔離,保證網絡的安全性。
침대현유신임평고모형중족두선택표준단일、불동각색절점신임치난이분배여경신적문제,제출일충다각색적신임평고모형。장절점분성족두、족성원、망관화대리4충각색,인입절점신임치、이동성、상관도등다영향인자작위족두、망관화대리적선택표준,채용신영족두절점적신임치계산방식。재족내족두절점적신임치유대리절점감독계산。재족간이용유족두、대리이급망관절점형성간화망락,근거사회망중인제관계적특점분배불동관계절점적가신도。 NS2방진실험결과표명,해모형능유효검측출악의절점병장기격리,보증망락적안전성。
With the development of Mobile Ad hoc Network ( MANET ) , the study of trust evaluation in clustering structure becomes more popular nowadays. Most existing models use single criterion for head node selection,and have difficulties with assigning and updating trust value of the different roles. This paper proposes a new multi-role trust evaluation model. The node has four roles:cluster head,cluster members,gateways and agent. Thus,to compute the trust of cluster head,a new way comes out by using trust value,mobility and correlation degree of node as selecting criteria of cluster heads,gateways and agent. Inside each cluster,the trust of cluster head is computed by the agent node,for the trust between the clusters, a simplified network, which consists of cluster heads, gateways and agents, according to the characteristics of the social network relationships,assigns credit to different nodes,the agent’ s recommends is taken into calculating the trust. NS2 simulation results show that the model can effectively detect and isolate the malicious nodes, thus ensure the security of the network.