移動自組網(wǎng)可信策略及應用結合研究
[Abstract]:Mobile Ad Hoc Network (Mobile Ad Hoc Network,MANET) is an ad hoc network composed of multiple peer-to-peer mobile wireless nodes, which is designed to provide network wireless services without relying on any infrastructure. The nodes in the network can act as network routers, and the packets are forwarded to the designated destination nodes by the multi-hop intermediate nodes in the network. In view of the network's self-organizing and rapid response deployment capability, Manet networks can be applied to different situations, such as battlefield communications, emergency rescue, court hearings, public meetings, virtual classrooms and others, In sensitive computing situations. The network has attracted a large number of research teams for its potential application prospects. With the increasing dependence of Manet on reliability and security, trusted computing has gradually entered the field of study. At present, there has been a great breakthrough in the research of trusted computing at home and abroad. However, the design of trusted protocols and the establishment of trusted software in Manet are only in the initial stage. This is very representative of the mobile ad hoc network security routing protocol, because the mobile ad hoc network itself is open and mobile platform is not very reliable, so malicious attacks have always existed. Such as selfish node attack and tunnel attack. Therefore, this paper studies the trusted strategy and its related technologies in Manet. Firstly, we consider a variety of possible factors that affect the trust relationship under Manet. The fuzzy feedback evaluation theory is introduced to deal with the node information of mobile ad hoc network, and the trust evaluation problem of a single node is analyzed and dealt with. According to the uncertainty of attribute weight information and the fuzziness of attribute weighted comprehensive value partition, the correlation analysis and measurement algorithm are given. Secondly, combining the characteristics of grey theory and Markov theory, according to the dynamic and temporary characteristics of nodes in mobile ad hoc networks, the trust utilization model in nodes is forecasted and evaluated, and the characteristics of grey theory and Markov theory are combined. The prediction curve of grey SCGM (1K1) model is used to reflect the macroscopic development law of the network. Based on the prediction curve, the microscopic fluctuation law of the ad hoc network is found by using Markov probability matrix. Therefore, the prediction of the random fluctuating data series has higher accuracy and close to the actual value, which reflects the change of the node, and the predicted value is credible. At the same time, based on the trust prediction of nodes, a new source routing protocol is proposed. Due to the limited energy of node devices in mobile ad hoc networks, how to construct the minimum energy consumption multicast tree is an important problem. Because the minimum energy consumption multicast tree is affected by the selection of different relay node sets, a trusted discrete particle swarm optimization algorithm is proposed to optimize the construction of the minimum energy consumption multicast tree. Experimental results show that the improved trusted discrete particle swarm optimization algorithm has a strong ability to optimize and effectively improve the construction of the minimum energy consumption multicast tree. Finally, aiming at the shortcomings of the separation of trust mechanism and scheduling algorithm in Manet, which is difficult to apply in real environment, this paper introduces a multi-objective genetic algorithm to describe the multi-objective genetic model of network task scheduling. A genetic task scheduling algorithm based on trust mechanism and improved genetic algorithm is proposed and improved to ensure the convergence of the algorithm.
【學位授予單位】:山東大學
【學位級別】:博士
【學位授予年份】:2016
【分類號】:TN929.5
【相似文獻】
相關期刊論文 前10條
1 宦娟;鞠時光;;移動自組網(wǎng)入侵檢測綜述[J];計算機工程與設計;2007年13期
2 周進怡;;移動自組網(wǎng)中可用性分析研究[J];湖南科技大學學報(自然科學版);2007年03期
3 程鈴;;移動自組網(wǎng)的單播地址自動分配方案[J];通信技術;2009年05期
4 劉瑋瑋;;移動自組網(wǎng)流量仿真及特征分析[J];價值工程;2010年11期
5 譚龍文;王國才;;一種基于權值的移動自組網(wǎng)門限證書更新方案[J];微計算機信息;2011年02期
6 陳超;;移動自組網(wǎng)技術在消防部隊搶險救援通信保障中的應用[J];消防技術與產(chǎn)品信息;2012年10期
7 蘆鴻雁;;移動自組網(wǎng)安全技術綜述[J];黑龍江科技信息;2013年05期
8 陳曦,張霞,梁興強;移動自組網(wǎng)測試平臺設計研究[J];計算機工程與應用;2004年12期
9 王建新,拉米;移動自組網(wǎng)安全的性研究[J];電信快報;2004年05期
10 鄭源,陳建二,王建新;移動自組網(wǎng)中泛播技術研究綜述[J];計算技術與自動化;2004年02期
相關會議論文 前10條
1 楊樂;;移動自組網(wǎng)中廣播算法綜述[A];第三屆全國軟件測試會議與移動計算、柵格、智能化高級論壇論文集[C];2009年
2 石川;高婧怡;朱培棟;張楊;;基于移動自組網(wǎng)的分布式設備故障感知和實時宣告系統(tǒng)的研究與實現(xiàn)[A];2010年第16屆全國信息存儲技術大會(IST2010)論文集[C];2010年
3 王敏;經(jīng)繼松;楊s,
本文編號:2220141
本文鏈接:http://sikaile.net/shoufeilunwen/xxkjbs/2220141.html