| 研究生: |
陳昱仁 Chen, Yu-ren |
|---|---|
| 論文名稱: |
協同代理人:應用於行動隨意網路上之協同代理人名聲系統 Co-Agent: A Cooperation-Agent Reputation System over Mobile Ad Hoc Networks |
| 指導教授: |
林輝堂
Lin, Hui-Tang |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2009 |
| 畢業學年度: | 97 |
| 語文別: | 中文 |
| 論文頁數: | 64 |
| 中文關鍵詞: | 行動隨意網路 、名聲機制 、互助合作 、自私節點 |
| 外文關鍵詞: | MANET, Reputation Mechanism, Cooperation, Selfish Nodes |
| 相關次數: | 點閱:154 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
行動隨意網路的運作需要依賴各個節點之間的互相配合以達到能夠彼此通訊的目的。然而,現實生活中的網路節點卻有可能為了保留行動裝置所需的電池能量、減少佔用的記憶體空間及降低處理器運算時所需消耗的週期時間等利已的理由而不願意正常執行遞送封包的任務,造成網路效能大幅地下降。為了減輕這些因為自私節點的存在所造成網路效能低落的缺點,本論文提出了一個以合作為導向的協同名聲機制,稱之為協同代理人名聲系統。此系統包含有三個主要的技術,第一,為了了解鄰近節點在封包傳輸上的行為表現而利用名聲機制來偵測自私行為的存在並作適當的回應。第二,相較於以往名聲機制的相關研究只能使用DSR,本論文提出指定代理人機制為資料封包的傳輸尋找另一條更穩定的替代路徑並使之能夠適用於AODV及DSR等在行動隨意網路上常見的路由協定。第三,由於無線傳輸可能因為地理環境或傳輸介質的差異而造成名聲機制在判斷上的失誤,因此為了能夠彌補這判斷上的缺失以及增進網路的互連性,名聲贖回機制允許適時地恢復原自私節點在網路上的使用權以期能夠增進網路上各節點之間的互連性並使得網路效能得以增加。本論文將使用Qualnet網路模擬器來加以驗證協同代理人機制的高效率及有效性。
In a Mobile Ad hoc NETwork (MANET), node cooperation in routing and packet forwarding is essential for the network to operate properly. However, in order to save resources (e.g., energy, memory, CPU cycles and so forth), some misbehaving nodes might not intend to forward packets, which significantly degrade the network performance. To cope with such misbehavior phenomena in MANET, this thesis proposes a cooperation-agent reputation system, designated as Co-Agent, which consists of three schemes designed specifically to detect and avoid selfish nodes for mitigating the effect of routing misbehavior, to designate agents for finding an alternative route in the present of selfish nodes, and to allow misjudged nodes which have been isolated from the network to redeem their reputation and rejoin the network. Unlike current proposed schemes in the literature which only support the DSR routing, Co-Agent can be applied in both DSR and AODV routing mechanisms. The proposed mechanism is implemented in the Qualnet simulation environment. Simulation results confirm the proposed Co-Agent mechanism has improved the network throughput significantly.
[1] "Ad hoc On-Demand Distance Vector Routing," 2003; Available from: http://tools.ietf.org/html/rfc3561.
[2] "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks for IPv4," 2007; Available from: http://tools.ietf.org/html/rfc4728.
[3] "QualNet Simulator," Available from: http://www.scalable-networks.com/.
[4] "Dynamic MANET On-demand (DYMO) Routing," 2008; Available from: http://tools.ietf.org/wg/manet/draft-ietf-manet-dymo/.
[5] "MANET Neighborhood Discovery Protocol (NHDP)," 2008; Available from: http://tools.ietf.org/wg/manet/draft-ietf-manet-nhdp/.
[6] "The Optimized Link State Routing Protocol version 2," 2008; Available from: http://tools.ietf.org/wg/manet/draft-ietf-manet-olsrv2/.
[7] Anantvalee, T. and J. Wu, "Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks," in ICC'07, 2007.
[8] Bansal, S. and M. Baker, "Observation-based Cooperation Enforcement in Ad Hoc Networks," in Research Report, Stanford University, 2003.
[9] Buchegger, S. and J.-Y.L. Boudec, "Performance Analysis of the CONFIDANT Protocol," in MobiHOC'02, Lausanne, Switzerland, 2002.
[10] Buchegger, S. and J.-Y.L. Boudec, "A Robust Reputation System for Peer-to-Peer and Mobile Ad Hoc Networks," in P2PEcon, 2004.
[11] Buchegger, S. and J.-Y.L. Boudec, "Self-policing mobile ad hoc networks by reputation systems," IEEE Communication Magazine, vol. 43, pp. 101 - 107, 2005.
[12] Buchegger, S., C. Tissieres, and J.Y. Le Boudec, "A test-bed for misbehavior detection in mobile ad-hoc networks," in Mobile Computing Systems and Applications, 2004.
[13] Buttyn, L. and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," in Mobile Networks and Applications, Hingham, MA, USA, 2003.
[14] Buttyn, L. and J.-P. Hubaux, "Report on a working session on security in wireless ad hoc networks," in SIGMOBILE, New York, NY, USA, 2003.
[15] Buttyan, L. and J.-P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs," in MobiHOC, Boston, MA, 2000.
[16] He, Q., D. Wu, and P. Khosla, "SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks," in WCNC'04, 2004.
[17] Hu, J. and M. Burmester, "LARS: a locally aware reputation system for mobile ad hoc networks," in ACM-SE 44th, Melbourne, Florida, 2006.
[18] Hu, Y.-C., D.B. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," in WMCSA'02, 2002.
[19] Hu, Y.-C., A. Perrig, and D.B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wireless Networks, vol. 11, pp. 21 - 38, 2005.
[20] Kejun Liu, J.D., Pramod K. Varshney, and Kashyap Balakrishnan, "An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, pp. 488 - 502, 2007.
[21] Ljubica Blazevic, L.B., Srdan Capkun, Silvia Giordano, Jean-Pierre Hubaux, Jean-Yves Le Boudec, "Self organization in mobile ad hoc networks: the approach of Terminodes," IEEE Communication Magazine, vol. 39, pp. 166 - 174, 2001.
[22] Marti, S., T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in MobiCom'00, Boston, Massachusetts, United States, 2000.
[23] Michiardi, P. and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Communications and Multimedia Security Conference, 2002.
[24] Padmanabhan, V.N. and D.R. Simon, "Secure traceroute to detect faulty or malicious routing," in SIGCOMM Computer Communication Review, 2003.
[25] Papadimitratos, P. and Z.J. Haas, "Secure Routing for Mobile Ad hoc Networks," in CNDS'02, 2002.
[26] Perkins, C.E. and P. Bhagwat, "Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers," in SIGCOMM, London, United Kingdom, 1994.
[27] Sanzgiri, K., B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," in ICNP'02, 2002.
[28] Yang, H., J. Shu, X. Meng, and S. Lu, "SCAN: self-organized network-layer security in mobile ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, pp. 261 - 273, Feb. 2006.
[29] Zapata, M.G. and N. Asokan, "Securing ad hoc routing protocols," in WiSE'02, 2002.
[30] Zhong, S., J. Chen, and Y.R. Yang, "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks," in INFOCOM'03, 2003.