Font Size: a A A

Research On Security Issues Of Data Forwarding For Opportunistic Network

Posted on:2020-09-22Degree:MasterType:Thesis
Country:ChinaCandidate:S FengFull Text:PDF
GTID:2428330620954830Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The opportunistic network is a mobile ad hoc network that intermittently connects,and uses node mobility to meet opportunities to complete data transmission.If there are malicious nodes or self-serving nodes in the network,it will not only seriously affect the overall performance of the network,but also pose a threat to the security of data transmission.In order to solve this problem,we propose a Data Security Forwarding Algorithm based on Identity Authentication Mechanism between communication nodes and Direct Trust Model(IDDF)for the opportunity network with selfish nodes and malicious nodes.The main work of this paper are as follows:(1)Based on the characteristics of the opportunistic network,we propose an identity-based authentication scheme for malicious nodes in the opportunistic network based on the research of relevant researchers.The program is divided into four stages: initialization,registration,authentication,and connection establishment.In this scheme,before the data transmission,the lightweight identity authentication protocol is adopted to ensure that the communication parties are not malicious nodes,thereby ensuring the security of data transmission;in addition,the scheme uses asymmetric key encryption,hash operation and marking.Time stamps and other technologies effectively defend against security threats such as eavesdropping attacks,forgery attacks,resend attacks,and man-in-the-middle attacks.(2)Considering that the nodes in the network show selfishness due to insufficient resources,a direct trust model is proposed.The network attributes such as buffer free space,contact intimacy,and delivery credibility are selected as the trust parameters of the trust model.Grey relation analysis is used to assign weights to the trust parameters and dynamically update to calculate the direct trust value.The data carrying node carrier authenticates its neighbor node,and the authenticated neighbor node is recorded as a legal node.The Carrier node selects the node with the highest trust value as the next hop forwarding node from the legal node.(3)In order to verify the effectiveness of the IDDF algorithm,this paper uses the ONE simulation platform for simulation experiments.The experimental results show that compared with Epidemic algorithm,Spray and Wait algorithm and ProPHET algorithm,the IDDF algorithm proposed has certain advantages in transmission success rate and routing overhead in the presence of malicious nodes and selfish nodes.
Keywords/Search Tags:Opportunistic network, Data security, Identity authentication, Trust model
PDF Full Text Request
Related items