Reputation mechanism based on multi-path routing protocol in ad hoc networks

Based on the multi-routing protocols and the reed-solomon error-correcting coding scheme,a data transmission method was presented,in which,round-encryption and round-signature were not needed. Data packets were all encoded by RS codes and cut into pieces before sending in different paths. After rece...

Full description

Saved in:
Bibliographic Details
Main Authors: CUI Guo-hua, LU She-jie, LIU Zhi-yuan, GENG Yong-jun
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74656176/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537572402102272
author CUI Guo-hua
LU She-jie
LIU Zhi-yuan
GENG Yong-jun
author_facet CUI Guo-hua
LU She-jie
LIU Zhi-yuan
GENG Yong-jun
author_sort CUI Guo-hua
collection DOAJ
description Based on the multi-routing protocols and the reed-solomon error-correcting coding scheme,a data transmission method was presented,in which,round-encryption and round-signature were not needed. Data packets were all encoded by RS codes and cut into pieces before sending in different paths. After receive all the pieces of a data packet,the destina-tion node could judge whether a malicious modification had been occurred,if so,the malicious node would be found out or be located in a malicious-node-group by a detecting process. Then by fully using the information gotten from detecting process,a reputation mechanism was proposed to resist the modification attacks. When implement it,the Bayesian ap-proach was used to evaluate a node’s reputation. The simulation results show that it can react to the attacks more quickly and accurately.
format Article
id doaj-art-cb70c379993a45e09163f74540f0aa20
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-cb70c379993a45e09163f74540f0aa202025-01-14T08:32:56ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01566474656176Reputation mechanism based on multi-path routing protocol in ad hoc networksCUI Guo-huaLU She-jieLIU Zhi-yuanGENG Yong-junBased on the multi-routing protocols and the reed-solomon error-correcting coding scheme,a data transmission method was presented,in which,round-encryption and round-signature were not needed. Data packets were all encoded by RS codes and cut into pieces before sending in different paths. After receive all the pieces of a data packet,the destina-tion node could judge whether a malicious modification had been occurred,if so,the malicious node would be found out or be located in a malicious-node-group by a detecting process. Then by fully using the information gotten from detecting process,a reputation mechanism was proposed to resist the modification attacks. When implement it,the Bayesian ap-proach was used to evaluate a node’s reputation. The simulation results show that it can react to the attacks more quickly and accurately.http://www.joconline.com.cn/zh/article/74656176/ad hoc networksreputation mechanisminternal attacksmalicious-node-group
spellingShingle CUI Guo-hua
LU She-jie
LIU Zhi-yuan
GENG Yong-jun
Reputation mechanism based on multi-path routing protocol in ad hoc networks
Tongxin xuebao
ad hoc networks
reputation mechanism
internal attacks
malicious-node-group
title Reputation mechanism based on multi-path routing protocol in ad hoc networks
title_full Reputation mechanism based on multi-path routing protocol in ad hoc networks
title_fullStr Reputation mechanism based on multi-path routing protocol in ad hoc networks
title_full_unstemmed Reputation mechanism based on multi-path routing protocol in ad hoc networks
title_short Reputation mechanism based on multi-path routing protocol in ad hoc networks
title_sort reputation mechanism based on multi path routing protocol in ad hoc networks
topic ad hoc networks
reputation mechanism
internal attacks
malicious-node-group
url http://www.joconline.com.cn/zh/article/74656176/
work_keys_str_mv AT cuiguohua reputationmechanismbasedonmultipathroutingprotocolinadhocnetworks
AT lushejie reputationmechanismbasedonmultipathroutingprotocolinadhocnetworks
AT liuzhiyuan reputationmechanismbasedonmultipathroutingprotocolinadhocnetworks
AT gengyongjun reputationmechanismbasedonmultipathroutingprotocolinadhocnetworks