基于双层模糊逻辑信任的OLSR安全路由协议
作者:

Secure OLSR Routing Protocol Based on Two-layer Fuzzy Logic Trust Model
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [22]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    由于移动自组网的开放性、分散性的特点, 导致传统的OLSR信任模型存在无法明确量化节点的信任指标和忽视节点的网络环境的问题. 针对上述问题, 本文提出一种基于环境自适应决策的双层模糊逻辑信任模型, 并与OLSR协议搭建了EFT-OLSR协议. 该模型划分为参数提取模块、双层模糊推理模块、决策模块. 首先选取节点剩余能量(P), 阻止隐式的自私攻击; 其次通过运用改进的双层模糊逻辑结构, 限制计算节点信任指标的复杂度; 最后根据网络环境动态调整路由协议中的信任阈值. 实验表明, EFT-OLSR协议在数据包传递率(PDR)、平均端到端延迟、丢包率方面优于现有的FT-OLSR信任模型.

    Abstract:

    Due to the open and decentralized characteristics of mobile ad hoc networks, the traditional optimized link state routing (OLSR) trust model cannot clearly quantify the trust indexes of nodes and ignores the network environments of nodes. To solve the above problems, this study proposes a two-layer fuzzy logic trust model based on environment-adaptive decision-making and constructs an EFT-OLSR protocol with the OLSR protocol. The model is divided into a parameter extraction module, a two-layer fuzzy reasoning module, and a decision-making module. To start with, the node residual energy (P) is selected to prevent implicit selfish attacks; then, the complexity of the trust indexes of the computing nodes is limited by using the improved two-layer fuzzy logic structure; finally, the trust threshold in the routing protocol is dynamically adjusted according to the network environment. Experiments show that the EFT-OLSR protocol is superior to the existing FT-OLSR trust model in packet delivery rate (PDR), average end-to-end delay, and packet loss rate.

    参考文献
    [1] Ramphull D, Mungur A, Armoogum S, et al. A review of mobile ad hoc network (MANET) protocols and their applications. Proceedings of the 5th International Conference on Intelligent Computing and Control Systems (ICICCS). Madurai: IEEE, 2021. 204–211.
    [2] Al-Shakarchi SJH, Alubady R. A survey of selfish nodes detection in MANET: Solutions and opportunities of research. Proceedings of the 1st Babylon International Conference on Information Technology and Science (BICITS). Babil: IEEE, 2021. 178–184.
    [3] Lakrami F, Kamoun NEL, Labouidya O, et al. Analysis and evaluation of cooperative trust models in ad hoc networks: Application to OLSR routing protocol. Proceedings of the Advanced Intelligent Systems for Sustainable Development. Marrakech: Springer, 2019. 38–48.
    [4] Dehkordi AN, Adibnia F. Securing the OLSR routing protocol. OIC-CERT Journal of Cyber Security, 2020, 2(1): 77–86
    [5] Sundaram BB, Elemo MTK. Node isolation attack on OLSR, reputation relied Mitigation. PalArch’s Journal of Archaeo-logy of Egypt/Egyptology, 2020, 17(9): 4549–4564
    [6] Oyakhire O, Gyoda K. Improved OLSR considering node density and residual energy of nodes in dense networks. Proceedings of the 35th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC). Nagoya: IEEE, 2020. 161–165.
    [7] Semchedine F, Moussaoui A, Zouaoui K, et al. CRY OLSR: Crypto optimized link state routing for MANET. Proceedings of the 5th International Conference on Multimedia Computing and Systems. Marrakech: IEEE, 2016. 290–293.
    [8] Baadache A, Belmehdi A. Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Computer Networks, 2014, 73: 173–184. [doi: 10.1016/j.comnet.2014.07.016
    [9] Shcherba EV, Litvinov GA, Shcherba MV. A novel reputation model for trusted path selection in the OLSR routing protocol. Proceedings of 2019 International Conference on Information Science and Communications Technologies (ICISCT). Tashkent: IEEE, 2019. 1–5.
    [10] Bhuvaneswari R, Ramachandran R. Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Computing, 2019, 22(S5): 12689–12699. [doi: 10.1007/s10586-018-1723-0
    [11] Tu JB, Tian DH, Wang Y. An active-routing authentication scheme in MANET. IEEE Access, 2021, 9: 34276–34286. [doi: 10.1109/ACCESS.2021.3054891
    [12] Khan MS, Midi D, Khan MI, et al. Adaptive trust threshold strategy for misbehaving node detection and isolation. Proceedings of 2015 IEEE Trustcom/BigDataSE/ISPA. Helsinki: IEEE, 2015. 718–725.
    [13] Paillassa B, Yawut C, Dhaou R. Network awareness and dynamic routing: The ad hoc network case. Computer Networks, 2011, 55(9): 2315–2328. [doi: 10.1016/j.comnet.2011.03.010
    [14] Inedjaren Y, Zeddini B, Maachaoui M, et al. Securing intelligent communications on the vehicular ad hoc networks using fuzzy logic based trust OLSR. Proceedings of the IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA). Abu Dhabi: IEEE, 2019. 1–6.
    [15] Ahmed A, Abu Bakar K, Channa MI, et al. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers of Computer Science, 2015, 9(2): 280–296. [doi: 10.1007/s11704-014-4212-5
    [16] Khan MS, Khan MI, Malik SUR, et al. MATF: A multi-attribute trust framework for MANETs. EURASIP Journal on Wireless Communications and Networking, 2016, 2016(1): 197. [doi: 10.1186/s13638-016-0691-4
    [17] Wang CH. A study of membership functions on mamdani-type fuzzy inference system for industrial decision-making [Master’s thesis]. Bethlehem: Lehigh University, 2015.
    [18] Wahengbam M, Marchang N. Intrusion Detection in MANET using fuzzy logic. Proceedings of the 3rd National Conference on Emerging Trends and Applications in Computer Science. Shillong: IEEE, 2012. 189–192.
    [19] Fathy C, El-Hadidi MT, El-Nasr MA. Fuzzy-based adaptive cross layer routing protocol for mobile ad hoc networks. Proceedings of the 30th IEEE International Performance Computing and Communications Conference. Orlando: IEEE, 2011. 1–10.
    [20] Sultana S, Ghinita G, Bertino E, et al. A lightweight secure provenance scheme for wireless sensor networks. Proceedings of the IEEE 18th International Conference on Parallel and Distributed Systems. Singapore: IEEE, 2012. 101–108.
    [21] Qin L, Kunz T. Mobility metrics to enable adaptive routing in MANET. Proceedings of 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. Montreal: IEEE, 2006. 1–8.
    [22] Samar P, Wicker SB. On the behavior of communication links of a node in a multi-hop mobile environment. Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Roppongi Hills: ACM, 2004. 145–156.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

刘杰,刘光杰.基于双层模糊逻辑信任的OLSR安全路由协议.计算机系统应用,2022,31(9):241-249

复制
分享
文章指标
  • 点击次数:650
  • 下载次数: 1529
  • HTML阅读次数: 1470
  • 引用次数: 0
历史
  • 收稿日期:2021-12-19
  • 最后修改日期:2022-01-18
  • 在线发布日期: 2022-06-24
文章二维码
您是第11336308位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号