Font Size: a A A

Research On Trusted Routings In Wireless Ad Hoc Networks

Posted on:2013-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2248330371982758Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network(WSN) developed quickly Since it has been proposed andapplied successfully in many fields, such as Vehicle Ad-hoc Network(VANET) and MANEThave been proposed respectively to solve the problem of vehicle communication andcommunication of mobile nodes, all of them belong to the Wireless Ad-hoc Networks.however, they have their own characteristics. Unlike traditional wired networks WSN whichbelonged to central network has no infrastructure support and the nodes can arbitrarily join orleave it. Therefore the routing applies to the wired network can no longer work when faceWireless Ad-hoc Networks. The classical routing protocols include AODV, DSR etc., the antcolony algorithm is one of important branch.The security issue has become a top priority of the current study with the development ofAd Hoc Networks. The nodes in Mobile Ad hoc network pass the packet to others whichbeyond its communication radius through a cooperative manner to complete thecommunication task, namely to rely on the multi-point collaboration. Usually we assume thatall of nodes are good, well intentioned and cooperative when the routing protocols aredesigned. Once malicious nodes intrude the network and behave maliciously such asmalicious packet loss, tampering control packet information will make the network’sperformance greatly decreased or even directly lead to network collapse. By a layer ofconfirmation, such as TCP acknowledgment packet can monitor end to end communicationfracture, but it can not accurately locate which node is the malicious one. The mechanism isnot valid if the transport layer can not connect. Therefore the basic operation of the reliablenetwork is the key point to build a trusted routing under packet loss of malicious environment.The route discovery stage and data transmission stage should be protected to make sure thesecurity of communication behavior. Trusted routing protocols is required to establish thetrusting relationship between nodes, but most of the trust routing model only pursues theconfidence of route whereas neglecting robustness.In this paper, we build a routing protocol with credibility and robustness which is based onANTHOCNET algorithm by following aspects:(1) Basing on ANTHOCNET algorithm, the TrANTHOCNET algorithm is designed whiletaking into account both routing confidence and routing robustness. We added the concept oftrust and describe the relationship between nodes with relationship of trust which is divided intodirect trust and indirect trust in the algorithm. In this paper we introduce Fuzzy Petri Netformalized reasoning process algorithm to deal with the uncertain relationship among nodeswhich is more accurate. By selecting the node whose trust value is max to join the path can promptly eliminate the interference of malicious node in the network and ensure the reliabilityof the route discovery process.(2)Node movement led to rapidly changing of network topology, The ant releasepheromones will consider the trend of node movement, we use the node’s current movementdirection and speed to estimate the imminent arrival of the location dynamically and base onlocation information to update pheromone in real time which enhances routing more robustnessand ensure the stability of the data transfer phase effectively.The expected result is verified by running the proposed algorithm on the simulate softwarewhich named Qualnet5.0. The experiment results show that the TrANTHOCNET behavesbetter than ANTHOCNET, AODV when facing malicious nodes. The route built by the routingalgorithm which is added the trust mechanism reflected stability and robustness in the routingperformance. It also has been proved effectively in routing performance by adjust theparameters that influence algorithm.
Keywords/Search Tags:Ad hoc Network, Fuzzy petri net, Ant colony algorithm, Trusted routing
PDF Full Text Request
Related items