当前位置:主页 > 管理论文 > 移动网络论文 >

机会网络数据转发中的灰色关联与协同计算信任模型

发布时间:2018-04-09 09:35

  本文选题:机会网络 切入点:信任模型 出处:《湖南科技大学》2017年硕士论文


【摘要】:机会网络是一种不需要源节点和目的节点之间存在完整路径,利用节点移动带来的相遇机会实现网络通信的自组织网络。而机会网络中如果存在自私节点或恶意节点,将对网络的性能和安全构成重大威胁。考虑上述恶劣环境,为了提高节点的传输成功率、减少传输延迟、提高网络的安全性,本文提出了一种基于灰色关联和协同计算的数据转发信任模型GCTM(Gray correlation and Collaborative computing Trust Model)。相关的工作主要有以下两个方面:第一,本文针对复杂环境下的机会网络特性,提出了基于灰色关联分析的直接信任值的计算。此模块通过分析节点的移动特性以及普通节点与自私、恶意节点间的差异,选取接触亲密度、投递可信度和位置亲密度作为模型的多维信任参数,计算节点的直接信任值,并采用灰色关联算法调节直接信任值的权重系数。此举将静态的权重系数改进为可根据信任参数间的内在联系自动调节各信任参数的动态权重系数,该方法提高了机会网络信任模型直接信任值计算的精确度。第二,本文针对机会网络中自私与恶意节点的攻击特性以及机会网络中节点的稀疏性,提出了一种基于协同计算的过滤算法来计算推荐信任值。该算法利用数据发送节点与邻居节点合作进行协同计算。采用接触亲密度、投递可信度作为计算推荐信任的参数。推荐信任模块运行时,评价节点向其周围邻居节点发送协同计算请求,邻居节点收到请求后将推荐信息发送给评价节点,考虑到网络中存在部分自私与恶意节点,所以需对推荐信息进行过滤。本文中采用KNN算法对推荐信息进行过滤处理。KNN算法可有效识别自私节点和恶意节点所发送的虚假推荐信任,并进行滤除,该方法减轻了自私与恶意节点对机会网络的干扰。采用协同计算技术,多节点联合计算推荐信任值,使计算结果更具可靠性。为了检验GCTM信任值计算模型的有效性,本文使用ONE仿真器进行仿真实验。实验中,通过在机会网络中设置不同的自私与恶意节点个数来验证模型的安全性。实验结果表明,本文提出的GCTM模型下的数据转发算法与经典的Epidemic、MaxProp、Direct Delivery算法以及MDT信任模型相比,其传输成功率、传输延迟、路由开销具有较好的改进。
[Abstract]:Opportunistic network is an ad hoc network which does not need a complete path between the source node and the destination node and uses the encounter opportunity brought by the node movement to realize the network communication.However, if there are selfish or malicious nodes in opportunistic networks, they will pose a serious threat to the performance and security of the networks.Considering the bad environment mentioned above, in order to improve the transmission success rate, reduce the transmission delay and improve the security of the network, this paper presents a data forwarding trust model GCTM(Gray correlation and Collaborative computing Trust model based on gray correlation and cooperative computing.The main work of this paper is as follows: first, aiming at the characteristics of opportunistic networks in complex environments, this paper presents the calculation of direct trust values based on grey correlation analysis.By analyzing the mobility characteristics of nodes and the differences between common nodes and selfish and malicious nodes, this module selects contact affinity, delivery credibility and location affinity as the multidimensional trust parameters of the model, and calculates the direct trust value of the nodes.Grey correlation algorithm is used to adjust the weight coefficient of direct trust value.In this way, the static weight coefficient is improved to automatically adjust the dynamic weight coefficients of each trust parameter according to the inherent relationship between trust parameters. This method improves the accuracy of direct trust value calculation in the trust model of opportunistic network.Secondly, aiming at the attacks of selfish and malicious nodes in opportunistic networks and the sparsity of nodes in opportunistic networks, a filtering algorithm based on cooperative computing is proposed to calculate the recommended trust values.The algorithm uses the data sending node to cooperate with the neighbor node for collaborative computation.Contact affinity and delivery reliability are used as parameters to calculate recommendation trust.When the recommendation trust module is running, the evaluation node sends the cooperative computing request to the neighboring node, and the neighbor node sends the recommendation information to the evaluation node after receiving the request, considering that there are some selfish and malicious nodes in the network.So it is necessary to filter the recommendation information.In this paper, the KNN algorithm is used to filter the recommendation information. KNN algorithm can effectively identify the false recommendation trust sent by the selfish node and the malicious node, and filter the false recommendation trust. This method reduces the interference of the selfish and malicious nodes to the opportunity network.The cooperative computing technique is used to calculate the recommended trust value jointly, which makes the calculation results more reliable.In order to verify the validity of the GCTM trust value calculation model, this paper uses the ONE simulator to carry on the simulation experiment.In the experiment, the security of the model is verified by setting different numbers of selfish and malicious nodes in the opportunistic network.Experimental results show that compared with the classical Epidemicus MaxPropDirect Delivery algorithm and the MDT trust model, the proposed data forwarding algorithm based on the GCTM model has a better improvement on the transmission success rate, transmission delay and routing overhead than that of the classical Epidemicus MaxPropDirect Delivery algorithm and the MDT trust model.
【学位授予单位】:湖南科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08

【参考文献】

相关期刊论文 前10条

1 刘春蕊;张书奎;贾俊铖;林政宽;;机会网络中基于摆渡节点与簇节点相互协作的路由机制[J];电子学报;2016年11期

2 李文治;张钢;郑莉;;基于NS2的无线地下网络信道模型仿真[J];计算机与现代化;2016年01期

3 谭紫逸;陈志刚;吴嘉;张魏斌;;机会网络多跳节点最小传输延迟算法设计[J];计算机应用研究;2016年08期

4 申利民;王立华;李峰;;机会网络中基于时间序列分析的自适应信任模型[J];小型微型计算机系统;2015年07期

5 文永革;何红洲;李海洋;;一种改进的Roberts和灰色关联分析的边缘检测算法[J];图学学报;2014年04期

6 冯运卿;李雪梅;李学伟;;基于熵权法与灰色关联分析的铁路安全综合评价[J];安全与环境学报;2014年02期

7 陈松林;秦燕;;自私节点下无线多跳网的节能博弈拓扑研究[J];计算机科学;2013年12期

8 曾东;;普适计算环境下无线传感器网络研究[J];数字通信;2012年06期

9 付雅芳;杨任农;刘晓东;王琳;;基于灰色关联分析的软件工作量估算方法[J];系统工程与电子技术;2012年11期

10 王格玲;陆迁;王昕;;社会资本对农户收入及收入差距影响的灰色关联度分析[J];广东农业科学;2012年16期

相关博士学位论文 前1条

1 赵慧;机会网络的数据传输与应用研究[D];电子科技大学;2013年

相关硕士学位论文 前2条

1 杨丽;灾难场景下基于数据持久性的无线传感器网络数据收集协议研究[D];杭州电子科技大学;2016年

2 熊飞;移动Ad Hoc网络中面向服务的多维信任模型研究[D];华中科技大学;2012年



本文编号:1725854

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1725854.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户1ec4b***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com