用户名: 密码: 验证码:
无线自组织网络信任系统若干问题的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线自组织网络由于没有固定网络基本设施,具有组网灵活、移动性好等优点,在军事、交通、救援等多种场合有很好应用前景,然而,其所具备的特性增加了安全防御的难度。虽然,适用于无线自组织网络的传统安全技术取得一定进展,但仅依赖传统安全技术难以为无线自组织网络提供完整安全解决方案。信任系统因其在安全性分析与设计、指导决策等方面的重要作用成为无线自组织网络建立预安全重要手段。
     信任系统在为无线自组织网络提供安全保护的同时,也成为恶意攻击的目标。本文在全面分析了针对信任系统的特有攻击行为以及适于无线自组织网络具备一定抵御能力的信任系统能力的基础之上,对如何有效抵御这些特有攻击行为,如何防御信任信息共享过程中的节点自私行为,从而保证信任系统信任评价的准确性正确性和稳定性进行了研究;也对扩展信任系统在无线自组织网络的可靠路由方面的应用进行了研究。其主要贡献如下:
     1)推荐信任度修正机制。本文提出了基于贝叶斯决策理论推荐修正机制的信任模型,该修正机制使用贝塔分布描述推荐偏差度的分布情况,根据其后验分布遵循损失最小化原则,达到修正对该推荐信息信任度的目的,进而减少错误推荐信息对信任评价结果的影响。为了弥补无线组织网络信任系统信息获取方式局限性,提高修正机制可实施性,针对评价报文转发行为的问题,提出一种基于确认的从非邻居节点获取直接信息的方法。该修正机制加速了信任评估达到稳定状态,使得信任系统在面临错误推荐攻击、偏见式攻击以及多种攻击联合攻击时,仍保持良好的评估准确、正确性与稳定性。
     2)间接推荐激励机制。无线自组织网络中的信任系统易遭受拒绝共享信任信息自私行为的影响,并且无法依赖信任系统本身来确保信任推荐协作实施。为了激励所有节点都积极参与信任信息共享,提高对间接推荐请求响应率,本文采用重复概率博弈模型抽象信任信息共享行为,针对信任推荐服务提出激励策略实施方案,并分析比较其均衡边界条件以及各参数对提升协作性和达到均衡条件的影响。分析与仿真表明GTFT策略具有灵活的参数调节机制,在高突发间接推荐自私行为情况下,具有很强协作恢复能力,能有效提高对有效推荐率,进而保证信任系统评估正确性与稳定性。
     3)基于信任系统的移动自组织网络可靠路由。本文分析了移动自组织网络路由协议可靠性问题以及现有可靠路由算法局限性,在DSR协议基础上,提出了具有激励机制的局部信任系统的可靠路由协议TR-DSR,该协议提供GTFT策略实现方案。TR-DSR协议选择路由时,综合考虑路由上各节点和各链路可靠信任度,并在路由建立过程中利用这些信息,确保找到可靠路由基础上,降低寻路开销。仿真实验表明,与DSR-EXT、DSR协议相比,该协议在减少移动以及链路质量不稳定造成的路由不可靠的同时,也能缓解节点自私行为和拥塞对路由稳定性的影响。
Benefit from absence of fixed infrastructure, wireless ad hoc network is flexible to build up and has good mobility. Hence it is widely applied in the fields of environmental and military and traffic monitoring, rescue, etc. However, these features of wireless ad hoc network increase the difficulty of security defenses. In recent years, advanced research on traditional security technology for wireless ad hoc networks has been made, but it is difficult to provide complete security solutions only depending on traditional security technology. Trust system becomes an essential means in pre-security of wireless ad hoc network because of its important role in security analysis, safety design and guidance to decision-making.
     Trust system provides security for wireless ad hoc networks, and meanwhile it is a target of malicious attacks. In this dissertation, based on a comprehensive analysis of specific attack behaviors to trust system and trust systems for wireless ad hoc networks with some resilience to specific attacks, a research on resisting specific attack and selfish behavior of nodes is carried out to improve accuracy and stability of trust evaluation in wireless ad hoc network. Trust system is expanded in application for reliable route of wireless ad hoc networks. The main contributions of this dissertation are given as follows.
     1) A Recommendation Trust Revision Model. Based on Bayesian Decision-Making theory, a novel mechanism for revising the trustworthiness of recommendations of entities is proposed, where deviation of recommendation is characterized by beta distribution. In the model, recommendation trust is revised according to the posteriori distribution of deviation of recommendation and the loss function L. Thereby impact on trust system from the false recommendation caused by liars is reduced. During to limits of ways for getting information in trust system in wireless ad hoc networks, a new scheme of gathering first-hand trust information from non-neighbor nodes based on confirmations is presented. The revision model is fully distributed, no centralized control, and suited to the features of wireless ad hoc network. It enhances the ability of exiting trust systems to resist false recommendation attacks, conflicting behavior attacks and collusion attacks etc., and maintain accuracy and stability of assessment.
     2) Incentive Strategies for Trust Recommendations. Trust system is completely undefended and vulnerable to selfish refusal to trust recommendation. Meanwhile, trust system itself cannot provide trust evaluations for cooperation of trust-recommended behaviors. To motivate the cooperation, in this dissertation, we propose a repeated probability game model to facilitate the study of the interaction process for trust-recommended behaviors between nodes. Based on the model, we analyze the INFLUENCE of incentive strategies to motivate the trust-recommended behaviors between nodes, as well as the DIFFERENCE of the equilibrium boundary conditions of the four incentives strategies. Both theoretical analysis and simulation results show that, in the high rate of sudden selfish behaviors, GTFT strategy has flexible parameters adjustment mechanism and keeps Efficient Recommendation Ratio at a higher level, motivates the cooperation of trust-recommended behaviors and then helps the trust system to make timely and accurately trust evaluations.
     3) A Reliable Route Protocol in MANET based on Trust System. First a thorough analysis on the causes of poor reliability of route in MANETs is made and the limits of existing reliable route protocol are reviewed in this dissertation. Then according to DSR protocol, a reliable routing protocol based on local trust system with incentive strategy (TR-DSR) is proposed, which provides specific implementation of GTFT incentive strategy. TR-DSR completely considers and uses the reliability of each node and each link to find reliable routes. Moreover it reduces overhead routing during this process. Extensive simulations are performed to evaluate the proposed scheme. Results indicate that TR-DSR reduces unreliable routes caused by movement of nodes and instability of links and it lessens an impaction on stability of routes due to selfish nodes and congestion compared with existing DSR-EXT, DSR protocol.
引文
[1]S. Corson, J. Macker. Mobile Ad hoc Networking (MANET):Routing Protocol Performance Issues and Evaluation Considerations[Z].1999. http://www.ietf.org/rfc/rfc2501.txt.
    [2]Yongguang Zhang, Wenke Lee. Intrusion Detection in Wireless Ad-Hoc Networks[C]. Sixth Annual International Conference on Mobile Computing and Networking (MobiCom'2000). Boston, MA, USA:2000.
    [3]Lidong Zhou, Zygmunt J. Haas. Securing Ad Hoc Networks[J]. IEEE Network Journal. 1999,13(6):24-30.
    [4]Amitabh Mishra, Ketan M. Nadkar. Security in Wireless Ad Hoc Networks[M]. The Handbook of Ad Hoc Wireless Networks, Mohammad Ilyas,2003,478-528.
    [5]Wenjia Li, Anupam Joshi. Security Issues in Mobile Ad Hoc Networks-A Survey[Z].2003. http://www.cs.umbc.edu/-wenjial/699_report.pdf.
    [6]Data Integrity[Z]. from Wikipedia, the free encyclopedia,2009. http://en.wikipedia.org/wiki/Data_integrity.
    [7]Hongmei Deng, Wei Li, Dharma P. Agrawal. Routing Security in Wireless Ad Hoc Networks[J]. IEEE Communications Magazine.2002,40(10):70-75.
    [8]A. Barbir, S. Murphy, Y. Yang. Generic Threats to Routing Protocols[Z].2004. http://tools.ietf.org/html/draft-ietf-rpsec-routing-threats-07.
    [9]Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, et al. A specification-based intrusion detection system for AODV[C]. Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA:2003:125-134.
    [10]Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, et al. an intrustion detection tool for aodv-based ad hoc wireless networks[C].20th Annual Computer Security Applications Conference (ACSAC'04). Tucson,AZ:2004:16-27.
    [11]Peng Ning, Kun Sun. How to misuse AODV:a case study of insider attacks against mobile ad-hoc routing protocols[C]. Proceedings of the 2003 IEEE Workshop on Information Assurance. United States Military Academy,West Point, NY, June 2003:2003.
    [12]Zheng Yan, Peng Zhang, Teemupekka Virtanen. Trust Evaluation Based Security Solution in Ad Hoc Networks[C]. Proceedings of the Seventh Nordic Workshop on Secure IT Systems. Gjovik, Norway:2003.
    [13]Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing[Z]. 2006. http://potaroo.net/ietf/idref/draft-guerrero-manet-saodv/.
    [14]Manel Guerrero Zapata, N. Asokan. Securing Ad hoc Routing Protocols[C]. Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002). Atlanta, GA, USA:1-10.
    [15]Seung Yi, Prasad Naldurg, Robin Kravets. Security-aware ad hoc routing for wireless networks[C]. Proceeding MobiHoc'01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. NY, USA:2001:299-302.
    [16]Panagiotis Papadimitratos, Zygmunt J. Haas. Secure Routing for Mobile Ad hoc Networks[C]. Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002). San Antonio, TX:2002.
    [17]Levente Butty An, Istv An Vajda. Towards Provable Security for Ad Hoc Routing Protocols[C].2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04). Washington, DC, USA:2004.
    [18]Yih-Chun Hu, David B. Johnson, Adrian Perrig. SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks[C]. Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'02). Callicoon, NY, USA:2002.
    [19]Tao Wan, Evangelos Kranakis, P. C. van Oorschot. Securing the Destination Sequenced Distance Vector Routing Protocol(S-DSDV)[C]. Proceedings of Sixth International Conference on Information and Communications Security (ICICS'2004).358-374.
    [20]Wojciech Galuba, Panos Papadimitratos, Marcin Poturalski, et al. Castor:Scalable Secure Routing for Ad Hoc Networks[C]. Proceeding INFOCOM'10 Proceedings of the 29th conference on Information communications. San Diego, CA, USA:2010:2829-2837.
    [21]Jiejun Kong, Petros Zerfos, Haiyun Luo, et al. Providing robust and ubiquitous security support for mobile ad-hoc networks[C]. Proceedings Ninth International Conference on Network Protocols(ICNP'2001). Riverside, CA, USA:2001.
    [22]Haiyun Luo, Jiejun Kong, Petros Zerfos, et al. URSA:Ubiquitous and Robust Access Control for Mobile Ad-Hoc Networks[J]. IEEE/ACM Transactions on Networking.2004, 12(6):1049-1063.
    [23]Srdjan Capkun, Levente Buttya N, Jean-Pierre Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks[J]. IEEE Transactions on Mobile Computing. 2003,2(1):52-64.
    [24]Jean-Pierre Hubaux, Levente Butty An, Srdan capkun. The Quest for Security in Mobile Ad Hoc Networks[C]. Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing(MobiHoc'01). Long Beach, CA, USA:2001:146-155.
    [25]Yi-An Huang, Wenke Lee. A cooperative intrusion detection system for ad hoc networks[C]. Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks. Fairfax, Virginia:2003:135-147.
    [26]Jim Parker, Anand Patwardhan, Anupam Joshi. Detecting Wireless Misbehavior through Cross-layer Analysis[C]. Proceedings of the IEEE Consumer Communications and Networking Conference Special Sessions (CCNC'2006). Las Vegas, Nevada:2006:6-9.
    [27]Wang Yufeng, Hori Yoshiaki, Sakurai Kouichi. On securing open networks through trust and reputation-architecture, challenges and solutions[J]. IEIC Technical Report.2006, 106(340):1-6.
    [28]Zoe Diamadi, Michael J. Fischer. A simple game for the study of trust in distributed systems[J]. WUHAN UNIVERSITY JOURNAL OF NATURAL SCIENCES.2001,6(1-2): 72-82.
    [29]Michael Schillo, Petra Funk, Michael Rovatsos. Using trust for detecting deceitful agents in artificial societies[J]. Applied Artificial Intelligence.2000,14(8):825-848.
    [30]D. Warne, C. P. Holland. Exploring trust in flexible working using a new model[J]. BT Technology Journal.1999,17(1):111-119.
    [31]Laurent Eschenauer, Virgil D. Gligor, John Baras. On Trust Establishment in Mobile Ad-Hoc Networks[C]. Proc. Security Protocols 10th International Workshop. Cambridge, U.K.:2002:47-66.
    [32]Licia Capra. Towards a Human Trust Model for Mobile Ad-hoc Networks[C].2nd UK-UbiNet Workshop. Cambridge, UK:2004.
    [33]Pradip Lamsal. Understanding Trust and Security[Z].2001. http://www.cs.Helsinki.FI/u/lamsal/papers/.
    [34]Jennifer Golbeck. Computing with Trust:Definition, Properties, and Algorithms[C]. Securecomm and Workshops-Security and Privacy for Emerging Areas in Communications Networks. Baltimore,MD:2006:1-7.
    [35]李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521.(In Chinese)
    [36]Sergio Marti, Hector Garcia-Molina. Identity Crisis:Anonymity vs. Reputation in P2P Systems[C]. IEEE 3rd International Conference on Peer-to-Peer Computing (P2P'2003). Linkoping, Sweden:2003:134-141.
    [37]Alice Cheng, Eric Friedman. Sybilproof reputation mechanisms[C].Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peertopeer systems(P2PECON'2005).2005: 128-132.
    [38]Roger Dingledin, Nick Mathewson, Paul Syverson. Reputation in P2P Anonymity Systems[C]. Workshop on economics of p2p systems. Harvard University:2003.
    [39]James Newsome, Elaine Shi, Dawn Song, et al. The sybil attack in sensor networks:analysis & defenses[C]. Proceedings of the 3rd international symposium on Information processing in sensor networks(IPSN'04). Berkeley, CA, USA:2004:259-268.
    [40]Qinghua Zhang, Pan Wang, Douglas S. Reeves, et al. Defending against Sybil attacks in sensor networks[C]. Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05).2005:185-191.
    [41]Li Xiong, Ling Liu. PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering.2004,16(7): 843-857.
    [42]Dominik Grolimund, Luzius Meisser, Stefan Schmid, et al. Havelaar:A Robust and Efficient Reputation System for Active Peer-to-Peer [C]. First Workshop on the Economics of Networked Systems(NetEcon'06). Ann Arbor, Michigan:2006.
    [43]Michal Feldman, Kevin Lai, Ion Stoica, et al. Robust Incentive Techniques for Peer-to-Peer Networks[C]. ACM Conference on Electronic Commerce (EC'04). New York, USA:2004: 102-111.
    [44]Tim Moreton, Andrew Twigg. Enforcing Collaboration in Peer-to-Peer Routing Services[C]. First International Conference on Trust Management. Heraklion, Crete, Greece:2003.
    [45]Audun Josang, Claudia Keser, Theo Dimitrakos. Can We Manage Trust?[C]. Proceedings of the Third International Conference on Trust Management (iTrust) 2005. Springer-Verlag, Heidelberg:2005:93-107.
    [46]Audun Jesang, Elizabeth Gray, Michael Kinateder. Simplification and Analysis of Transitive Trust Networks[J]. Web Intelligence and Agent Systems.2006,4(2):139-161.
    [47]P. Dewan, P. Dasgupta. Securing P2P networks using peer reputations:is there a silver bullet?[C]. Proc. IEEE consumer communications and networking conference (CCNC 2005). Las Vegas, US:2005.
    [48]Asad Amir Pirzada, Chris Mcdonald. Establishing trust in pure ad-hoc networks[C]. Proceedings of the 27th Australasian conference on Computer science (ACSC'2004). Australia:2004:47-54.
    [49]Boukerche, Y. Ren. A Security Management Scheme using a Novel Computational Reputation Model for Wireless and Mobile Ad Hoc Networks[C]. Proc. Int'1 Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems. Vancouver, British Columbia:2008:88-95.
    [50]Beulah Kurian Alunkal, Ivana Veljkovic, Gregor von Laszewski, et al. Reputation-Based Grid Resource Selection[C]. Workshop on Adaptive Grid Middleware. New Orleans, Louisiana:2003.
    [51]Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina. The Eigentrust algorithm for reputation management in P2P networks[C].12th Int'l World Wide Web Conference (WWW 2003). Budapest, Hungary:2003:640-651.
    [52]Qi He, Dapeng Wu, P. Khosla. SORI:A secure and objective reputation-based incentive scheme for ad-hoc networks[C]. Proceedings of IEEE Wireless Communications and Networking Conference 2004. Atlanta, GA:2004.
    [53]Pietro Michiardi, Refik Molva. Core:a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[C]. Communications and Multimedia Security. Portoroz, Slovenia:2002:107-121.
    [54]Thanasis G. Papaioannou, George D. Stamoulis. Effective use of reputation of peer-to-peer environments[C]. Proceedings of IEEE/ACM CCGRID 2004. GP2PC workshop, Chicago, U.S.:2004.
    [55]Zouridaki, B. L. Mark, M. Hejmo, et al. Robust Cooperative Trust Establishment for MANETs[C]. Proc.4th ACM Workshop on Security of Ad Hoc and Sensor Networks. Alexandria, VA:2006.
    [56]William J. Adams, Nathaniel J. Davis. Toward a Decentralized Trust-based Access Control System for Dynamic Collaboration[C]. Proc.6th Annual IEEE SMC Information Assurance Workshop (IAW'05). West Point, NY:2005:317-324.
    [57]Ruidong Li, Jie Li, Peng Liu, et al. An Objective Trust Management Framework for Mobile Ad Hoc Networks[C]. Proc. IEEE 65th Vehicular Technology Conference (VTC'07). Celtic Tiger, Dublin:2007:56-60.
    [58]Yan Lindsay Sun, Wei Yu, Zhu Han, et al. Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks[J]. IEEE Journal on Selected Areas in Communications.2006,24(2):305-317.
    [59]George Danezis, Stefan Schi Ner. On Network formation,(Sybil attacks and Reputation systems)[Z].2006. http://dimacs.rutgers.edu/Workshops/InformationSecurity/slides/gamesandreputation.pdf.
    [60]Sonja Buchegger, Jean-Yves Le Boudec. Performance analysis of CONFIDANT protocol[C]. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc '02). New York, NY:2002:226-236.
    [61]Sergio Marti, T. J. Giuli, Kevin Lai. Mitigating routing misbehavior in mobile ad hoc networks[C]. Proceedings of the 6th annual international conference on Mobile computing and networking. Boston, Massachusetts, United States:2000:255-265.
    [62]S. Bansal, M. Baker. Observation-based Cooperation Enforcement in Ad Hoc Networks[Z]. 2003. http://arxiv.org/pdf/cs.NI/0307012.
    [63]Audun Josang, Roslan Ismail, Colin Boyd. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems.2007,43(2):618-644.
    [64]Glenn R. Mahoney. A generalized trust model using network reliability[D]. University of Victoria,2004.
    [65]George Theodorakopoulos, John S. Baras. On Trust models and trust evaluation metrics for ad-hoc networks[J]. IEEE Journal on Selected Areas in Communications.2006,24(2): 318-328.
    [66]Georgios E. Theodorakopoulos. Distributed trust evaluation in ad-hoc networks[D]. University of Maryland,2004.
    [67]Junhai Luo, Xue Liu, Mingyu Fan. A trust model based on fuzzy recommendation for mobile ad-hoc networks[J]. Computer Networks:The International Journal of Computer and Telecommunications Networking.2009,53(14):2396-2407.
    [68]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.(In Chinese)
    [69]Sonja Buchegger, Jean-Yves Le Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks[C]. Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems.2004.
    [70]Saurabh Ganeriwal, Mani B. Srivastava. Reputation-based Framework for High Integrity Sensor Networks[Z]. Washington DC:200466-77.
    [71]Tao Jiang, John S. Baras. Trust Evaluation in Anarchy:A Case Study on Autonomous Networks[C]. Proceedings 25th IEEE International Conference on Computer Communications (INFOCOM'2006). Barcelona, Spain:2006:1-12.
    [72]Pietro Michiardi, Refik Molva. Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks[C]. European Wireless Conference 2002. Florence, Italy:2002.
    [73]Virgil D. Gligor, Shyh-Wei Luan, Joseph N. Pato. On Inter-RealmAuthentication in Large Distributed Systems[C]. Proceedings 25th Annual IEEE International Carnahan Conference on Security Technology,1991. Taipei, Taiwan:1999.
    [74]Reto Kohlas, Ueli Maurer. Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence[C]. Proceedings of the International Workshop on Practice and Theory in Public-Key Cryptography 2000. Melbourne, Victoria, Australia:2000.
    [75]Ross Anderson, Haowen Chan, Adrian Perrig. Key Infection:Smart Trust for Smart Dust[C]. International Conference on Network Problem. Berlin,Germany:2004.
    [76]M. Blaze, J. Feigenbaum, J. Ioannidis. The KeyNote Trust-Management System Version 2[Z].1999. http://www.apps.ietf.org/rfc/rfc2704.html.
    [77]Sonja Buchegger, Jean-Yves Le Boudec. Self-policing mobile ad hoc networks by reputation systems[J]. IEEE Communications Magazine.2005,43(7):101-107.
    [78]窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件 学报,2004,15(4)(In Chinese)
    [79]Yan Lindsay Sun, Zhu Han, K. J. Ray Liu. Defense trust management vulnerabilities in distributed networks[J]. IEEE Communications Magazine.2008,46(2):112-119.
    [80]Attacks on trust evaluation in distributed networks[C].40th Annual Conference on Information Sciences and Systems(2006). Princeton, New Jersey:2006.
    [81]常俊胜,王怀民,尹刚DyTrust一种P2P系统中基于时间帧的动态信任模型[J].软件学报,2006,29(8).(In Chinese)
    [82]James O. Berger. Statistical Decision Theory and Bayesian Analysis[M]. SpringerVerlag, 2004.
    [83]茆诗松.贝叶斯统计[M].北京:中国统计出版社,1999.(In Chinese)
    [84]Sheldon M. Ross. A First Course in Probability[M]. Prentice Hall,2005.
    [85]Charles E. Perkins, Pravin Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers[C]. SIGCOMM. U.K.:1994.
    [86]T. Clausen, P. Jacquet. Optimized Link State Routing Protocol (OLSR)[Z].2003. http://hipercom.inria.fr/olsr/rfc3626.txt.
    [87]R. Ogier, F. Templin, M. Lewis. Topology Dissemination Based on Reverse-Path Forwarding (TBRPF)[Z].2004. http://www.networksorcery.com/enp/rfc/rfc3684.txt.
    [88]D. Johnson, Y. Hu, D. Maltz. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4[Z].2007. http://tools.ietf.org/html/rfc4728.
    [89]C. Perkins, E. Belding-Royer, S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing[Z].2003. http://www.ietf.org/rfc/rfc3561.txt.
    [90]V. Park, S. Corson. Temporally-Ordered Routing Algorithm (TORA) Version 1[Z].2001. http://www.ietf.org/proceedings/53/I-D/draft-ietf-manet-tora-spec-04.txt.
    [91]Rohit Dube, Cynthia D. Rais, Kuang-Yeh Wang, et al. Signal Stability based Adaptive Routing (SSA) for Ad-Hoc Mobile Networks[J]. IEEE Personal Communications.1997, 4(1):36-45.
    [92]Mohit Virendra, Arunn Krishnamurthy, Krishnan Narayanan, et al. Environment-Aware Trusted Data Delivery in Multipath Wireless Protocols[C]. Communications in Computer and Information Science(CCIS'2007). Berlin Heidelberg:2007:396-401.
    [93]Marianne A. Azer, Sherif M. El-Kassas, Abdel Wahab F. Hassan, et al. A Survey on Trust and Reputation Schemes in Ad Hoc Networks[C]. Proc. of the 2008 3rd Int'l Conf. on Availability, Reliability and Security. Barcelona:881-886,2008.
    [94]Y. George J. Mailath, Splarry Samuelson. Repeated games and reputations:long-run relationships[M]. USA:Oxford University Press,2006.
    [95]Zygmunt J. Haas, Marc R. Pearlman, Prince Samar. The Zone Routing Protocol (ZRP) for Ad Hoc Networks[Z].2002. http://people.ece.cornell.edu/~haas/wnl/Publications/draft-ietf-manet-zone-zrp-04.txt.
    [96]Jyoti Raju, J. J. Garcia-Luna-Aceves. A Comparison of On-demand and Table-driven Routing for Ad Hoc Wireless Networks[C]. Proceedings of IEEE ICC.2000.
    [97]Andrea J. Goldsmith, Stephen B. Wicker. Design challenges for energy-constrained ad hoc wireless networks [J]. IEEE Wireless Communications.2002,9(4):8-27.
    [98]K. Paul, S. Bandyopadhyay, D. Saha, et al. Communication-Aware Mobile Hosts in Ad-hoc Wireless Network[C]. Proc. of the IEEE International Conference on Personal Wireless Communication. Jaipur, India:1999.
    [99]A. Bruce Mcdonald, Taieb Znati. A Path Availability Model forWireless Ad-Hoc Networks[C]. Proc. of the IEEE WCNC. IEEE.1999:35-40.
    [100]Zhao Chun-Xiao, Wang Guang-Xing. Fuzzy-control-based clustering strategy in MANET[C]. Fifth World Congress on Intelligent Control and Automation. Hongzhou,China:2004:1456-1460.
    [101]Yi-Chen Yan, De-Min Li, Dan Xue. Slot assignment of spatial TDMA in ad hoc radio networks using fuzzy set theory[C]. Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies:Frontiers of Mobile and Wireless Communication. 2004:497-500.
    [102]高雪梅,张信明,史栋,等.移动Ad Hoc网络模糊逻辑移动预测路由算法[J].软件学报,2009,20(12):3205-3212(In Chinese)
    [103]William Su, Sung-Ju Lee, Mario Gerla. Mobility prediction and routing in ad hoc wireless networks[J]. International Journal of Network Management.2001,11(1):3-30.
    [104]Natarajan Meghanathan. Comparison of Stable Path Selection Strategies for Mobile Ad Hoc Network[C]. Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies.2006:67.
    [105]Douglas S. J. De Couto, Daniel Aguayo, John Bicket, et al. A High-Throughput Path Metric for Multi-Hop Wireless Routing[C]. Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom'03). San Diego, California: 2003.
    [106]John Bicket, Daniel Aguayo, Sanjit Biswas, et al. Architecture and Evaluation of an Unplanned 802.11b mesh Network[C]. Proceedings of the 11th annual international conference on Mobile computing and networking(MobiCom'05). historic Cologne, Germany:2005:31-42.
    [107]Richard Draves, Jitendra Padhye, Brian Zill. Routing in Multi-radio, Multi-hop Wireless Mesh Networks[C]. In MobiCom '04:Proceedings of the 10th annual international conference on Mobile computing and networking (2004).2004.
    [108]Kwan-Wu Chin, John Judge, Aidan Williams, et al. Implementation experience with MANET routing protocols[J]. ACM SIGCOMM Computer Communication Review.2002, 32(5).
    [109]A. Keshavarzian, E. Uysal-Biyikoglu, F. Herrmann, et al. Energy efficient link assessment in wireless sensor networks[C]. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. Hong Kong:1751-1761.
    [110]张霞,周刚,于宏毅.一种WSN虚拟多路径可靠路由协议[J].北京航空航天大学学报,2009,35(4):403-406.(In Chinese)
    [111]Christian Bettstetter, Giovanni Resta, Paolo Santi. The node distribution of the random waypoint mobility model for wireless ad hoc networks[J]. IEEE Transactions on Mobile Computing.2003,2(3):257-269.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700