Reputation mechanism based on multi-path routing protocol in ad hoc networks
Based on the multi-routing protocols and the reed-solomon error-correcting coding scheme,a data transmission method was presented,in which,round-encryption and round-signature were not needed. Data packets were all encoded by RS codes and cut into pieces before sending in different paths. After rece...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74656176/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537572402102272 |
---|---|
author | CUI Guo-hua LU She-jie LIU Zhi-yuan GENG Yong-jun |
author_facet | CUI Guo-hua LU She-jie LIU Zhi-yuan GENG Yong-jun |
author_sort | CUI Guo-hua |
collection | DOAJ |
description | Based on the multi-routing protocols and the reed-solomon error-correcting coding scheme,a data transmission method was presented,in which,round-encryption and round-signature were not needed. Data packets were all encoded by RS codes and cut into pieces before sending in different paths. After receive all the pieces of a data packet,the destina-tion node could judge whether a malicious modification had been occurred,if so,the malicious node would be found out or be located in a malicious-node-group by a detecting process. Then by fully using the information gotten from detecting process,a reputation mechanism was proposed to resist the modification attacks. When implement it,the Bayesian ap-proach was used to evaluate a node’s reputation. The simulation results show that it can react to the attacks more quickly and accurately. |
format | Article |
id | doaj-art-cb70c379993a45e09163f74540f0aa20 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-cb70c379993a45e09163f74540f0aa202025-01-14T08:32:56ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01566474656176Reputation mechanism based on multi-path routing protocol in ad hoc networksCUI Guo-huaLU She-jieLIU Zhi-yuanGENG Yong-junBased on the multi-routing protocols and the reed-solomon error-correcting coding scheme,a data transmission method was presented,in which,round-encryption and round-signature were not needed. Data packets were all encoded by RS codes and cut into pieces before sending in different paths. After receive all the pieces of a data packet,the destina-tion node could judge whether a malicious modification had been occurred,if so,the malicious node would be found out or be located in a malicious-node-group by a detecting process. Then by fully using the information gotten from detecting process,a reputation mechanism was proposed to resist the modification attacks. When implement it,the Bayesian ap-proach was used to evaluate a node’s reputation. The simulation results show that it can react to the attacks more quickly and accurately.http://www.joconline.com.cn/zh/article/74656176/ad hoc networksreputation mechanisminternal attacksmalicious-node-group |
spellingShingle | CUI Guo-hua LU She-jie LIU Zhi-yuan GENG Yong-jun Reputation mechanism based on multi-path routing protocol in ad hoc networks Tongxin xuebao ad hoc networks reputation mechanism internal attacks malicious-node-group |
title | Reputation mechanism based on multi-path routing protocol in ad hoc networks |
title_full | Reputation mechanism based on multi-path routing protocol in ad hoc networks |
title_fullStr | Reputation mechanism based on multi-path routing protocol in ad hoc networks |
title_full_unstemmed | Reputation mechanism based on multi-path routing protocol in ad hoc networks |
title_short | Reputation mechanism based on multi-path routing protocol in ad hoc networks |
title_sort | reputation mechanism based on multi path routing protocol in ad hoc networks |
topic | ad hoc networks reputation mechanism internal attacks malicious-node-group |
url | http://www.joconline.com.cn/zh/article/74656176/ |
work_keys_str_mv | AT cuiguohua reputationmechanismbasedonmultipathroutingprotocolinadhocnetworks AT lushejie reputationmechanismbasedonmultipathroutingprotocolinadhocnetworks AT liuzhiyuan reputationmechanismbasedonmultipathroutingprotocolinadhocnetworks AT gengyongjun reputationmechanismbasedonmultipathroutingprotocolinadhocnetworks |