天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

移動自組網(wǎng)可信策略及應用結合研究

發(fā)布時間:2018-09-03 13:44
【摘要】:移動自組織網(wǎng)絡(Mobile Ad Hoc Network,MANET)是一種由多個具有對等關系的移動無線節(jié)點組成的自組織網(wǎng)絡,該網(wǎng)絡旨在不依賴于任何基礎設施的前提下提供網(wǎng)絡無線服務。網(wǎng)絡中的節(jié)點可以充任網(wǎng)絡路由器的角色,數(shù)據(jù)包經(jīng)由網(wǎng)絡中多跳中間節(jié)點轉(zhuǎn)發(fā)而到達其指定的目的節(jié)點。鑒于該網(wǎng)絡這種自組織和快速反應部署的能力,MANET網(wǎng)絡可以被應用到不同的場合,如戰(zhàn)場通信、緊急營救、法庭審訊、公開會議、虛擬教室和其他一些較為安全、敏感的計算場合中。該網(wǎng)絡因其潛在的應用遠景吸引了眾多的研究團隊。隨著移動自組網(wǎng)對可靠性和安全性的依賴不斷增強,可信計算逐步進入到了人們的研究視野。目前,海內(nèi)外就可信計算探究中已經(jīng)有了很大的突破,然而移動自組網(wǎng)在設計可信協(xié)議、建立可信軟件方面只是處于初步階段。這當中非常有代表的就是移動自組網(wǎng)的安全路由協(xié)議,因為移動自組網(wǎng)其本身具備著開放性以及移動平臺不是很可靠,所以有關惡意攻擊現(xiàn)象還一直存在,例如自私節(jié)點攻擊以及隧道攻擊等。由此,本文對移動自組網(wǎng)下的可信策略及其相關技術進行研究:首先,綜合考慮對移動自組網(wǎng)下影響信任關系的多種可能要素,引入模糊反饋評價理論對移動自組網(wǎng)的節(jié)點信息進行處理,重點剖析處理單個節(jié)點的可信評估問題。根據(jù)節(jié)點屬性權重信息的不確定性和屬性加權綜合值劃分的模糊性,并給出了相關分析和度量算法。其次,結合灰色理論和馬爾可夫理論的特點,根據(jù)移動自組網(wǎng)中節(jié)點動態(tài)性、臨時性的特性,對節(jié)點中的信任利用模型進行預測評估,結合灰色理論和馬爾可夫理論的特點,用灰色SCGM(1,1)模型預測曲線來反映網(wǎng)絡宏觀發(fā)展規(guī)律,并以此預測曲線為基準,利用馬爾可夫概率矩陣來尋找自組網(wǎng)的微觀波動規(guī)律,因而對隨機波動較大的數(shù)據(jù)列的預測具有較高的精度預測值與實際值較為接近,較好的反應了節(jié)點的變化關系,所得到的預測值是可信的。同時依據(jù)節(jié)點的信任預測提出了一種新型的可信源路由協(xié)議。在移動自組網(wǎng)中,由于節(jié)點設備能量有限,如何構造最小能耗多播樹是一個重要問題。由于構造最小能耗多播樹受到選擇不同的中繼節(jié)點集的影響,論文提出了一種優(yōu)化最小能耗多播樹構造的可信離散粒子群算法。實驗結果表明改進后的可信離散粒子群算法具有較強的優(yōu)化能力,有效地提高了最小能耗多播樹的構造。最后,針對移動自組網(wǎng)中的信任機制和調(diào)度算法相分離,從而在實際環(huán)境中難以應用的缺陷,論文引入了多目標遺傳算法來刻畫網(wǎng)絡任務調(diào)度的多目標遺傳模型,提出了一種基于信任機制與改進的遺傳任務調(diào)度算法,并對算法進行改進以保證算法的收斂性。
[Abstract]:Mobile Ad Hoc Network (Mobile Ad Hoc Network,MANET) is an ad hoc network composed of multiple peer-to-peer mobile wireless nodes, which is designed to provide network wireless services without relying on any infrastructure. The nodes in the network can act as network routers, and the packets are forwarded to the designated destination nodes by the multi-hop intermediate nodes in the network. In view of the network's self-organizing and rapid response deployment capability, Manet networks can be applied to different situations, such as battlefield communications, emergency rescue, court hearings, public meetings, virtual classrooms and others, In sensitive computing situations. The network has attracted a large number of research teams for its potential application prospects. With the increasing dependence of Manet on reliability and security, trusted computing has gradually entered the field of study. At present, there has been a great breakthrough in the research of trusted computing at home and abroad. However, the design of trusted protocols and the establishment of trusted software in Manet are only in the initial stage. This is very representative of the mobile ad hoc network security routing protocol, because the mobile ad hoc network itself is open and mobile platform is not very reliable, so malicious attacks have always existed. Such as selfish node attack and tunnel attack. Therefore, this paper studies the trusted strategy and its related technologies in Manet. Firstly, we consider a variety of possible factors that affect the trust relationship under Manet. The fuzzy feedback evaluation theory is introduced to deal with the node information of mobile ad hoc network, and the trust evaluation problem of a single node is analyzed and dealt with. According to the uncertainty of attribute weight information and the fuzziness of attribute weighted comprehensive value partition, the correlation analysis and measurement algorithm are given. Secondly, combining the characteristics of grey theory and Markov theory, according to the dynamic and temporary characteristics of nodes in mobile ad hoc networks, the trust utilization model in nodes is forecasted and evaluated, and the characteristics of grey theory and Markov theory are combined. The prediction curve of grey SCGM (1K1) model is used to reflect the macroscopic development law of the network. Based on the prediction curve, the microscopic fluctuation law of the ad hoc network is found by using Markov probability matrix. Therefore, the prediction of the random fluctuating data series has higher accuracy and close to the actual value, which reflects the change of the node, and the predicted value is credible. At the same time, based on the trust prediction of nodes, a new source routing protocol is proposed. Due to the limited energy of node devices in mobile ad hoc networks, how to construct the minimum energy consumption multicast tree is an important problem. Because the minimum energy consumption multicast tree is affected by the selection of different relay node sets, a trusted discrete particle swarm optimization algorithm is proposed to optimize the construction of the minimum energy consumption multicast tree. Experimental results show that the improved trusted discrete particle swarm optimization algorithm has a strong ability to optimize and effectively improve the construction of the minimum energy consumption multicast tree. Finally, aiming at the shortcomings of the separation of trust mechanism and scheduling algorithm in Manet, which is difficult to apply in real environment, this paper introduces a multi-objective genetic algorithm to describe the multi-objective genetic model of network task scheduling. A genetic task scheduling algorithm based on trust mechanism and improved genetic algorithm is proposed and improved to ensure the convergence of the algorithm.
【學位授予單位】:山東大學
【學位級別】:博士
【學位授予年份】:2016
【分類號】:TN929.5

【相似文獻】

相關期刊論文 前10條

1 宦娟;鞠時光;;移動自組網(wǎng)入侵檢測綜述[J];計算機工程與設計;2007年13期

2 周進怡;;移動自組網(wǎng)中可用性分析研究[J];湖南科技大學學報(自然科學版);2007年03期

3 程鈴;;移動自組網(wǎng)的單播地址自動分配方案[J];通信技術;2009年05期

4 劉瑋瑋;;移動自組網(wǎng)流量仿真及特征分析[J];價值工程;2010年11期

5 譚龍文;王國才;;一種基于權值的移動自組網(wǎng)門限證書更新方案[J];微計算機信息;2011年02期

6 陳超;;移動自組網(wǎng)技術在消防部隊搶險救援通信保障中的應用[J];消防技術與產(chǎn)品信息;2012年10期

7 蘆鴻雁;;移動自組網(wǎng)安全技術綜述[J];黑龍江科技信息;2013年05期

8 陳曦,張霞,梁興強;移動自組網(wǎng)測試平臺設計研究[J];計算機工程與應用;2004年12期

9 王建新,拉米;移動自組網(wǎng)安全的性研究[J];電信快報;2004年05期

10 鄭源,陳建二,王建新;移動自組網(wǎng)中泛播技術研究綜述[J];計算技術與自動化;2004年02期

相關會議論文 前10條

1 楊樂;;移動自組網(wǎng)中廣播算法綜述[A];第三屆全國軟件測試會議與移動計算、柵格、智能化高級論壇論文集[C];2009年

2 石川;高婧怡;朱培棟;張楊;;基于移動自組網(wǎng)的分布式設備故障感知和實時宣告系統(tǒng)的研究與實現(xiàn)[A];2010年第16屆全國信息存儲技術大會(IST2010)論文集[C];2010年

3 王敏;經(jīng)繼松;楊s,

本文編號:2220141


資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/shoufeilunwen/xxkjbs/2220141.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權申明:資料由用戶9415b***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com