Font Size: a A A

The Research Of Trust Evaluation And Routing Algorithm For MAENT

Posted on:2018-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:Z MaFull Text:PDF
GTID:2348330536957351Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The routing algorithm and trust evaluation are the core technologies of Mobile Ad Hoc Network.The traditional center security control strategy is difficult to be applied to the distributed network,so the researches have proposed many technologies like digital signatures,authentication technology and key management technology.It can achieve the access control of network and the verification of data confidentiality,integrity,effectiveness,non-repudiation by applying these proposed technologies.Due to the limitation of priority trust,the traditional security mechanism based on authentication and access control cannot solve the internal attacks of network.It is necessary to adopt the mutual trust and cooperation between nodes to detect and isolate the illegal nodes.By establishing the hierarchical hybrid architecture,the internal attacks of network can be solved by applying many technologies like the token-based cooperative enhancement mechanism,the universal robustness service mechanism based on polynomial secret sharing,the strategy between nodes based on the trust value.It is important to improve the efficiency of transmission of the routing algorithm under the premise of lower cost of physical mechanism.Mobile Ad Hoc Network has the characteristics of wireless,multi-hop,etc.So it is more vulnerable to all sorts of malicious attacks,which affects the reliability of data transmission.The existing related researches propose many methods to calculate the trust value between nodes,which makes sure the data interaction more reliable.But many of the existing methods do not consider the distributed nature of MANET.And with the characteristics of highly dynamic of MANET,the routing algorithms have to adapt to the rapidly changes of network structure,and the algorithms also have to make sure the network resources being saved at most.For the problem of trust evaluation,this paper proposes a distributed and adaptive trust evaluation algorithm(DATEA).It calculates the communication trust value by using the number of data packets between nodes and predicts the communication trust based on the trend of its history value.It combines the history trust with the predict value to calculate comprehensive trust value which is more real-time;It calculates the energy trust based on the residual energy of nodes;When the distance between nodes is smaller than the communication radius of nodes,it considers the value of recommendation to the destinations from the common neighbors,and it assesses the recommendation reliability and recommendation familiarity;Adaptively weighting method is put forward,and it calculates the integrate trust value with the scope of one hop based on adaptively adjusts the proportion of the direct trust and the recommendation trust.The algorithm also considers the factor of trust propagation distance.According to the direct trust and recommendation trust,then the indirect trust among nodes within the scope of multi-hop is calculated.Simulation experiments show that this algorithm can effectively avoid the attacks of malicious nodes,besides the calculated trust value about normal nodes are more conform the actual situation.For the problem of routing,this paper studies the technique of Multi-Point Relay of Optimized Link State Routing,improves the quantum genetic algorithm,and proposes a new routing algorithm named QG-OLSR by combining the characteristics of OLSR.It optimizes the selection of MPR,overcomes the shortage of the traditional algorithms,and proves the property of convergence and global optimization.The new routing algorithm improves the performance of transmission.The simulaton results show that the new algorithm is feasible and applicable,and performs a better experimental result.
Keywords/Search Tags:MANET, Trust Evaluation, OLSR, Quantum Computation, Genetic Algorithm
PDF Full Text Request
Related items