首页> 外文会议>2017 International Conference on Recent Innovations in Signal processing and Embedded Systems >WCA based re-clustering approach in DSR and OLSR routing protocols in MANET
【24h】

WCA based re-clustering approach in DSR and OLSR routing protocols in MANET

机译:MANET中DSR和OLSR路由协议中基于WCA的重新群集方法

获取原文
获取原文并翻译 | 示例

摘要

This is a weighted cluster algorithm based on re-clustering approach for OLSR and DSR protocols in MANET. In this protocol, all the nodes of the networks are clustered into a single cluster; we have analyzed the way how to compute the trusting values according to their interaction performances between the nodes. Based on the trusting value, we can decide and check whether the connection between the two nodes is reliable or not. On the basis of no. of reliable connections, we can choose the cluster head in the cluster, and the nodes which hold solid association with cluster head will be the base nodes, base nodes and the cluster head can work together for being the service providing congregation (group) for the cluster. Each member will circulate a secret share mechanism which will be a part of secret key for itself, and come into being the parameter of authentication in the processing of investigation about the up to date requirement in the next cluster, and the obscure and secret share mechanism can also be authenticated by the node itself. One node has been confirmed as a malicious node at a time; cluster head broadcasts the information to all the cluster members and refuse to provide updating service for the particular malicious node. The protocol has absolute forward confidentiality and backward confidentiality. The keys of nodes and cluster are generated after discussion among the service group members, Man-in-the-middle attack can be resisted by this way. At the same time, the cluster can achieve the periodic update, the cluster head will be reelected, service group will be reformed, subsequently, the key of cluster and nodes will be updated as well.
机译:这是MANET中针对OLSR和DSR协议的基于重聚类方法的加权聚类算法。在该协议中,网络的所有节点都被群集到一个群集中。我们已经分析了如何根据节点之间的交互性能来计算信任值。根据信任值,我们可以决定并检查两个节点之间的连接是否可靠。在没有的基础上。在可靠连接的基础上,我们可以选择集群中的集群头,并且与集群头保持牢固关联的节点将成为基础节点,基础节点和集群头可以协同工作,成为为集群提供聚合(组)的服务簇。每个成员都将传播一个秘密共享机制,该机制将成为其自身密钥的一部分,并成为有关下一个集群中最新需求的调查处理过程中身份验证的参数,以及晦涩而秘密的共享机制也可以由节点本身进行身份验证。一次确认一个节点为恶意节点;群集头将信息广播给所有群集成员,并拒绝为特定恶意节点提供更新服务。该协议具有绝对前向机密性和后向机密性。节点和集群的密钥是在服务组成员之间讨论之后生成的,因此可以抵御中间人攻击。同时,集群可以实现定期更新,重新选择集群头,对服务组进行改造,随后,集群和节点的密钥也将更新。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号