...
首页> 外文期刊>Wireless personal communications: An Internaional Journal >A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET
【24h】

A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET

机译:基于首选项的群集MANET信任和首部选择协议

获取原文
获取原文并翻译 | 示例

摘要

Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for trust and head selection (2PTH) algorithm is proposed for communication privacy from intermediate malicious nodes. A 2PTH algorithm is a combination of preference-based trust selection algorithm (PTA) and preference-based head election algorithm (PHA). To discover routes with trusted nodes, PTA is proposed for determining a route without malevolent nodes for forwarding packets based on Weight assignment to trust parameters. The work also proposes a PHA, based on internal and external factors of a node, aiming at finding quick response during the routing process. Simulations are performed using NS2 simulator. We compare the proposed 2PTH algorithm with other clustering algorithms, which are cluster-based trust-aware routing protocol, 2ACK model and low energy adaptive clustering hierarchy. Our analysis and simulation results show that, the proposed 2PTH algorithm efficiently detects and isolates malicious nodes, and it outperforms the other algorithms.
机译:隐私对于大型且不透明的临时网络至关重要。针对来自中间恶意节点的通信隐私,提出了一种基于偏好的信任与头部选择协议(2PTH)。 2PTH算法是基于首选项的信任选择算法(PTA)和基于首选项的头部选举算法(PHA)的组合。为了发现具有受信任节点的路由,提出了PTA,用于基于对信任参数的权重确定无恶意节点的路由以转发数据包。该工作还提出了基于节点的内部和外部因素的PHA,旨在在路由过程中快速找到响应。使用NS2仿真器执行仿真。我们将提出的2PTH算法与其他基于群集的信任感知路由协议,2ACK模型和低能耗自适应群集层次结构的群集算法进行了比较。我们的分析和仿真结果表明,所提出的2PTH算法能够有效地检测和隔离恶意节点,并且性能优于其他算法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号