移动自组网可信策略及应用结合研究
[Abstract]:Mobile Ad Hoc Network (Mobile Ad Hoc Network,MANET) is an ad hoc network composed of multiple peer-to-peer mobile wireless nodes, which is designed to provide network wireless services without relying on any infrastructure. The nodes in the network can act as network routers, and the packets are forwarded to the designated destination nodes by the multi-hop intermediate nodes in the network. In view of the network's self-organizing and rapid response deployment capability, Manet networks can be applied to different situations, such as battlefield communications, emergency rescue, court hearings, public meetings, virtual classrooms and others, In sensitive computing situations. The network has attracted a large number of research teams for its potential application prospects. With the increasing dependence of Manet on reliability and security, trusted computing has gradually entered the field of study. At present, there has been a great breakthrough in the research of trusted computing at home and abroad. However, the design of trusted protocols and the establishment of trusted software in Manet are only in the initial stage. This is very representative of the mobile ad hoc network security routing protocol, because the mobile ad hoc network itself is open and mobile platform is not very reliable, so malicious attacks have always existed. Such as selfish node attack and tunnel attack. Therefore, this paper studies the trusted strategy and its related technologies in Manet. Firstly, we consider a variety of possible factors that affect the trust relationship under Manet. The fuzzy feedback evaluation theory is introduced to deal with the node information of mobile ad hoc network, and the trust evaluation problem of a single node is analyzed and dealt with. According to the uncertainty of attribute weight information and the fuzziness of attribute weighted comprehensive value partition, the correlation analysis and measurement algorithm are given. Secondly, combining the characteristics of grey theory and Markov theory, according to the dynamic and temporary characteristics of nodes in mobile ad hoc networks, the trust utilization model in nodes is forecasted and evaluated, and the characteristics of grey theory and Markov theory are combined. The prediction curve of grey SCGM (1K1) model is used to reflect the macroscopic development law of the network. Based on the prediction curve, the microscopic fluctuation law of the ad hoc network is found by using Markov probability matrix. Therefore, the prediction of the random fluctuating data series has higher accuracy and close to the actual value, which reflects the change of the node, and the predicted value is credible. At the same time, based on the trust prediction of nodes, a new source routing protocol is proposed. Due to the limited energy of node devices in mobile ad hoc networks, how to construct the minimum energy consumption multicast tree is an important problem. Because the minimum energy consumption multicast tree is affected by the selection of different relay node sets, a trusted discrete particle swarm optimization algorithm is proposed to optimize the construction of the minimum energy consumption multicast tree. Experimental results show that the improved trusted discrete particle swarm optimization algorithm has a strong ability to optimize and effectively improve the construction of the minimum energy consumption multicast tree. Finally, aiming at the shortcomings of the separation of trust mechanism and scheduling algorithm in Manet, which is difficult to apply in real environment, this paper introduces a multi-objective genetic algorithm to describe the multi-objective genetic model of network task scheduling. A genetic task scheduling algorithm based on trust mechanism and improved genetic algorithm is proposed and improved to ensure the convergence of the algorithm.
【学位授予单位】:山东大学
【学位级别】:博士
【学位授予年份】:2016
【分类号】:TN929.5
【相似文献】
相关期刊论文 前10条
1 宦娟;鞠时光;;移动自组网入侵检测综述[J];计算机工程与设计;2007年13期
2 周进怡;;移动自组网中可用性分析研究[J];湖南科技大学学报(自然科学版);2007年03期
3 程铃;;移动自组网的单播地址自动分配方案[J];通信技术;2009年05期
4 刘玮玮;;移动自组网流量仿真及特征分析[J];价值工程;2010年11期
5 谭龙文;王国才;;一种基于权值的移动自组网门限证书更新方案[J];微计算机信息;2011年02期
6 陈超;;移动自组网技术在消防部队抢险救援通信保障中的应用[J];消防技术与产品信息;2012年10期
7 芦鸿雁;;移动自组网安全技术综述[J];黑龙江科技信息;2013年05期
8 陈曦,张霞,梁兴强;移动自组网测试平台设计研究[J];计算机工程与应用;2004年12期
9 王建新,拉米;移动自组网安全的性研究[J];电信快报;2004年05期
10 郑源,陈建二,王建新;移动自组网中泛播技术研究综述[J];计算技术与自动化;2004年02期
相关会议论文 前10条
1 杨乐;;移动自组网中广播算法综述[A];第三届全国软件测试会议与移动计算、栅格、智能化高级论坛论文集[C];2009年
2 石川;高婧怡;朱培栋;张杨;;基于移动自组网的分布式设备故障感知和实时宣告系统的研究与实现[A];2010年第16届全国信息存储技术大会(IST2010)论文集[C];2010年
3 王敏;经继松;杨s,
本文编号:2220141
本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/2220141.html