浏览全部资源
扫码关注微信
[ "殷安生(1982-),男,博士,南京邮电大学讲师,主要研究方向为可信网络。" ]
[ "张顺颐(1944-),男,博士,南京邮电大学教授、博士生导师、原副校长,中国通信学会学士、理事,IP应用与增值电信技术委员会主任,中国电子学会通信学分会副主任,主要研究方向为计算机通信网络和电信业务及其管理。多次承担国家和省部级科研项目,12次获得省部级科技进步奖。目前的研究方向是计算机通信网络、电信业务和信息系统建设。" ]
网络出版日期:2016-04,
纸质出版日期:2016-04-20
移动端阅览
殷安生, 张顺颐. 基于终端可信度的路由策略设计与实现[J]. 电信科学, 2016,32(4):1-8.
Ansheng YIN, Shunyi ZHANG. Design and implementation of routing strategy based on terminal trust[J]. Telecommunication science, 2016, 32(4): 1-8.
殷安生, 张顺颐. 基于终端可信度的路由策略设计与实现[J]. 电信科学, 2016,32(4):1-8. DOI: 10.11959/j.issn.1000-0801.2016084.
Ansheng YIN, Shunyi ZHANG. Design and implementation of routing strategy based on terminal trust[J]. Telecommunication science, 2016, 32(4): 1-8. DOI: 10.11959/j.issn.1000-0801.2016084.
可信路由随着可信网络的发展而兴起,目前的研究主要集中在轻量化网络的路由策略方面,存在的问题主要有路由算法开销大、应用范围小,且主要以IPv4为基础。提出了一种基于IPv6流标签定制的可信路由方案,在终端的可信评估基础上,通过流识别和流标记实现可信路由策略。利用前驱ARP代理机制设计了一种基于代理的虚拟链路协议,并设计了原型系统。实验证明,该协议实现了IPv6的流标记路由,提高了信息传输的安全性和效率。
With the development of trusted networks,trusted routing emerges. Currently,the research focuses on the routing strategies of lightweight network. The routing algorithm has the large overhead and small applications,which is mainly based on IPv4. A trusted routing scheme was presented based on the flow label of IPv6,which was achieved by adding a flow identification module to TNC(trusted network connection)module. Drawing on previous proxy ARP,a proxy-based virtual link protocol and prototype system was designed. Experiments show that this protocol can achieve IPv6 routing based on flow label and improve the security and efficiency of information transmission.
崔莹 . 基于信任度模型的Ad Hoc网络安全路由 [D ] . 南京:南京航空航天大学 , 2007 .
CUI Y . Secure routing algorithm based on trust model for Ad Hoc network [D ] . Nanjing:Nanjing University of Aeronautics and Astronautics , 2007 .
HU Y C , PERRIG A , JOHNSON D B . Ariadne:a secure on-demand routing protocol for ad hoc Networks [J ] . Wireless Networks , 2002 , 11 ( 1-2 ): 21 - 38 .
, ZAPATA M G . Secure ad hoc on-demand distance vector routing [J ] . ACM Mobile Computing and Communications Review , 2006 , 6 ( 3 ): 106 - 107 .
PIRZADA A A , DATTA A , MCDONALD C . Propagating trust in ad-hoc networks for reliable routing [C ] // 2004 International Workshop on Wireless Ad-Hoc Networks,May 31-June 3,2004,Oulu,Finland . New Jersey : IEEE Press , 2004 : 58 - 62 .
MANICKAM J M L , SHANMUGAVEL S . Fuzzy based trusted Ad hoc on-demand distance vector routing protocol for MANET [C ] // Third IEEE International Conference on Wireless and Mobile Computing,Networking and Communications,October 8-10,2007,White Plains,NY,USA . New Jersey : IEEE Press , 2007 : 39 .
LINDSAY S Y , WEI Y , ZHU H , et al . Information theoretic framework of trust modeling and evaluation for ad hoc networks [J ] . Selected Areas in Communications , 2006 ( 24 ): 305 - 317 .
CHEN Y X , BU T M , ZHANG M , et al . Max-minimum algorithm for trust transitivity in trustworthy networks [C ] // IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies,September 15-18,2009,Milan,Italy . New Jersey : IEEE Press , 2009 : 62 - 64 .
LEMESHKO O V , YEVSEYEVA O Y , GARKUSHA S V . A tensor model of multipath routing based on multiple QoS metrics [C ] // International Siberian Conference on Control and Communications(SIBCON),September 12-13,2013,Tomsk,Russia . New Jersey : IEEE Press , 2013 : 1 - 4 .
XIA H , JIA Z , LI X , et al . Trust prediction and trust-based source routing in mobile ad hoc networks [J ] . Ad Hoc Networks , 2013 , 11 ( 7 ): 2096 - 2114 .
DUAN J Q , YANG D , ZHU H Q , et al . TSRF:a trust-aware secure routing framework in wireless sensor networks [J ] . International Journal of Distributed Sensor Networks , 2014 ( 1 ): 1 - 14 .
ABUSALAH L , KHOKHAR A , GUIZANI M . Trust aware routing in mobile ad hoc networks [C ] // The IEEE Telecommunications Conference(GLOBECOM’06),November 27-December 1,2006,San Francisco,USA . New Jersey : IEEE Press , 2006 : 1 - 5 .
PARIS S , NITA-ROTARU C , MARTIGNON C , et al . EFW:a cross-layer metric for reliable routing in wireless mesh networks with selfish participant [C ] // The IEEE INFOCOM 2011,April 10-15,2011,Shanghai,China . New Jersey : IEEE Press , 2011 : 576 - 580 .
SUN Y L , YU W , HAN Z . Information theoretic framework of trust modeling and evaluation for ad hoc networks [J ] . IEEE Journal on Selected Areas in Communications , 2006 , 24 ( 2 ): 305 - 315 .
0
浏览量
545
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构