删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

防御诽谤攻击的间断连接无线网络数据转发机制

本站小编 Free考研考试/2022-02-12

杨鹏1,2,经尚琪1,3,闫俊杰1,3,杨志刚4
1. 重庆邮电大学 通信与信息工程学院, 重庆 400065; 2. 中国信息通信研究院, 北京 100191;3. 重庆高校市级光通信与网络重点实验室, 重庆 400065; 4. 重庆文理学院 软件工程学院,重庆 402160
出版日期:2018-07-28发布日期:2018-07-28


基金资助:国家自然科学基金(61371097,61271261),重庆市青年科学人才培养计划(CSTC2014KJRC-QNRC40001),重庆高校创新团队建设计划(CXTDX201601020),重庆市教委科学技术研究(KJ1401126)

Defending Bad Mouthing Attack Data Forwarding Mechanism for Intermittently Connected Wireless Networks

YANG Peng,JING Shangqi,YAN Junjie,YANG Zhigang
1. School of Telecommunication and Information, Chongqing University of Posts and Telecommunications, Chongqing 400065, China; 2. China Information and Communication Research Institute, Beijing 100191, China;3. Optical Communication and Network Key Laboratory of Chongqing, Chongqing 400065, China; 4. School of Computer Science and Technology, Chongqing University of Arts and Sciences, Chongqing 402160, China
Online:2018-07-28Published:2018-07-28
Contact:经尚琪,女,硕士生,E-mail:jsqcqupt@sina.com.






摘要/Abstract


摘要: 针对推荐信息的不确定性,提出一种可防御诽谤攻击的数据转发机制.利用交互列表的一致性探测出恶意推荐节点的数据伪造行为,进而针对推荐信息之间的差异性,利用离群点检测方法过滤错误推荐信息,以准确地评估节点之间的信任关系;同时,根据相遇节点与目的节点的相似度准确地选择中继节点实现数据高效转发.通过仿真对比分析可知,所提出的数据转发机制相比于其他典型算法能够有效抵御节点的恶意推荐信息,同时提升数据投递率.
关键词: 间断连接无线网络, 信任评估, 诽谤攻击, 推荐信息
Abstract: Data forwarding in intermittently connected wireless networks requires multiple nodes to complete in a collaborative manner. However, malicious nodes can spread false recommendation information, which is able to seriously affect the choice of relay nodes. To address this issue, this paper proposes a data forwarding mechanism that can detect the forged data produced by malicious recommendation nodes by using the consistency of interactive list. Furthermore, to aim at differences of the recommendation information, this paper filters the error recommendation information to accurately evaluate the trust relationship between two nodes by the outlier detection method. Meanwhile, this paper also achieves the efficient data forwarding by selecting the relay nodes accurately based on similarities between a meeting node and a destination node. At last, the simulation contrastive analysis shows that the proposed mechanism can resist the malicious recommendation information effectively and improve the data delivery rate compared with other typical algorithms.
Key words: intermittently connected wireless networks, trust evaluation, bad mouthing attack, recommendation information


PDF全文下载地址:

点我下载PDF
相关话题/推荐 信息 数据 重庆 通信