Font Size: a A A

Design And Implementation Of Routing Security In Mobile Opportunistic Networks

Posted on:2018-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:J X DouFull Text:PDF
GTID:2348330518495403Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, with the increasing popularity of portable handheld mobile devices and the continuous development of network communication technology, the application of mobile opportunistic networks has laid an important basis for the realization of pervasive computing. Nodes in mobile opportunistic networks are more autonomous, some nodes behave to be selfish or malicious which caused huge threats on routing security. In order to solve these problems, we propose a credibility evaluation method based on social trust to distinguish misbehaving nodes, based on this method we design and implement a trust forwarding algorithm with low complexity. The simulation results verified the effectiveness of this algorithm in improving routing security.The main work is as follows:Firstly, the routing security threats in mobile opportunistic networks and trust relationships are studied. Based on analysis of the typical routing protocols in mobile opportunistic networks, we summarize threats on routing security; by analyzing trust relationships and trust models we propose to build credibility evaluation method to solve routing security problems.Secondly, we propose the node credibility evaluation method named STCEM. Due to the influence of human social behaviors, nodes in mobile opportunistic networks have certain social attributes the same as people in real society. Active degree, intimate degree and contribution degree of social trust is used in STCEM to quantify the credibility of nodes. By means of weighted sum, three social attributes are combined to compute the comprehensive credibility of nodes.Thirdly, we design and implement the ST-E algorithm based on STCEM. By setting different proportion of misbehaving nodes, the ST-E?Epidemic Forwarding and Spray and Wait algorithm are simulated on the ONE simulator to test the success rate of message delivery and the average latency of delay. The simulation results show that the ST-E algorithm can effectively reduce the performance downgrade of mobile opportunistic networks when the network is facing security threats. The results verified the effectiveness of algorithm in improving the routing security of mobile opportunistic networks.Finally, we design and implement the dustbin alarm system based on opportunistic networks. Based on the situation that rubbish cleaning in mountain scenic spots takes a lot of time, we design the dustbin alarm system. When the dustbin is full, sensors on dustbin create alarm messages and tourists help the dustbin delivery alarm messages to the sanitation workers during their tours. The tests proved that the dustbin alarm system can transmit alarm information successfully.
Keywords/Search Tags:Mobile Opportunistic Networks, Routing Security, Social Trust, Trust Forwarding
PDF Full Text Request
Related items