簡易檢索 / 詳目顯示

研究生: 陳昱仁
Chen, Yu-ren
論文名稱: 協同代理人:應用於行動隨意網路上之協同代理人名聲系統
Co-Agent: A Cooperation-Agent Reputation System over Mobile Ad Hoc Networks
指導教授: 林輝堂
Lin, Hui-Tang
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2009
畢業學年度: 97
語文別: 中文
論文頁數: 64
中文關鍵詞: 行動隨意網路名聲機制互助合作自私節點
外文關鍵詞: MANET, Reputation Mechanism, Cooperation, Selfish Nodes
相關次數: 點閱:154下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 行動隨意網路的運作需要依賴各個節點之間的互相配合以達到能夠彼此通訊的目的。然而,現實生活中的網路節點卻有可能為了保留行動裝置所需的電池能量、減少佔用的記憶體空間及降低處理器運算時所需消耗的週期時間等利已的理由而不願意正常執行遞送封包的任務,造成網路效能大幅地下降。為了減輕這些因為自私節點的存在所造成網路效能低落的缺點,本論文提出了一個以合作為導向的協同名聲機制,稱之為協同代理人名聲系統。此系統包含有三個主要的技術,第一,為了了解鄰近節點在封包傳輸上的行為表現而利用名聲機制來偵測自私行為的存在並作適當的回應。第二,相較於以往名聲機制的相關研究只能使用DSR,本論文提出指定代理人機制為資料封包的傳輸尋找另一條更穩定的替代路徑並使之能夠適用於AODV及DSR等在行動隨意網路上常見的路由協定。第三,由於無線傳輸可能因為地理環境或傳輸介質的差異而造成名聲機制在判斷上的失誤,因此為了能夠彌補這判斷上的缺失以及增進網路的互連性,名聲贖回機制允許適時地恢復原自私節點在網路上的使用權以期能夠增進網路上各節點之間的互連性並使得網路效能得以增加。本論文將使用Qualnet網路模擬器來加以驗證協同代理人機制的高效率及有效性。

    In a Mobile Ad hoc NETwork (MANET), node cooperation in routing and packet forwarding is essential for the network to operate properly. However, in order to save resources (e.g., energy, memory, CPU cycles and so forth), some misbehaving nodes might not intend to forward packets, which significantly degrade the network performance. To cope with such misbehavior phenomena in MANET, this thesis proposes a cooperation-agent reputation system, designated as Co-Agent, which consists of three schemes designed specifically to detect and avoid selfish nodes for mitigating the effect of routing misbehavior, to designate agents for finding an alternative route in the present of selfish nodes, and to allow misjudged nodes which have been isolated from the network to redeem their reputation and rejoin the network. Unlike current proposed schemes in the literature which only support the DSR routing, Co-Agent can be applied in both DSR and AODV routing mechanisms. The proposed mechanism is implemented in the Qualnet simulation environment. Simulation results confirm the proposed Co-Agent mechanism has improved the network throughput significantly.

    中文摘要………….i 英文摘要………..ii 誌謝 ............................. iii 目錄 ................... iv 圖目錄 ........................ vi 表目錄 ........................ viii 第一章 緒論 1 1.1 研究背景 1 1.2 研究動機 6 1.3 研究目的與論文架構 8 1.3.1 研究目的 8 1.3.2 論文架構 10 第二章 相關研究與文獻探討 11 2.1 名聲系統簡介 11 2.1.1 Watchdog and Pathrater 11 2.1.2 CONFIDANT 12 2.1.3 CORE 14 2.1.4 SORI 15 2.1.5 Anantvalee’s proposal 16 2.2 路由協定DSR及AODV簡介 17 2.2.1 Ad-hoc On-Demand Distance Vector (AODV) 18 2.2.2 Dynamic Source Routing (DSR) 20 第三章 協同代理人名聲系統 22 3.1 網路環境設定及假設 23 3.2 自私觀察者模組 25 3.3 名聲評估模組 26 3.4 代理人指定模組 30 3.4.1 單一代理人的劇本 30 3.4.2 多重代理人的劇本 35 3.5 名聲贖回模組 40 3.6 探討 42 第四章 模擬結果及效能評估 44 4.1 模擬環境及設定 44 4.2 模擬結果與分析 45 4.2.1 自私節點所佔比率對網路效能的影響 46 4.2.2 移動速度對網路效能的影響 49 4.2.3 節點停留時間對網路效能的影響 54 4.2.4 代理路徑的傳輸成功率 56 第五章 結論與未來工作 59 5.1結論 59 5.2 未來工作 60 參考文獻 62

    [1] "Ad hoc On-Demand Distance Vector Routing," 2003; Available from: http://tools.ietf.org/html/rfc3561.
    [2] "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks for IPv4," 2007; Available from: http://tools.ietf.org/html/rfc4728.
    [3] "QualNet Simulator," Available from: http://www.scalable-networks.com/.
    [4] "Dynamic MANET On-demand (DYMO) Routing," 2008; Available from: http://tools.ietf.org/wg/manet/draft-ietf-manet-dymo/.
    [5] "MANET Neighborhood Discovery Protocol (NHDP)," 2008; Available from: http://tools.ietf.org/wg/manet/draft-ietf-manet-nhdp/.
    [6] "The Optimized Link State Routing Protocol version 2," 2008; Available from: http://tools.ietf.org/wg/manet/draft-ietf-manet-olsrv2/.
    [7] Anantvalee, T. and J. Wu, "Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks," in ICC'07, 2007.
    [8] Bansal, S. and M. Baker, "Observation-based Cooperation Enforcement in Ad Hoc Networks," in Research Report, Stanford University, 2003.
    [9] Buchegger, S. and J.-Y.L. Boudec, "Performance Analysis of the CONFIDANT Protocol," in MobiHOC'02, Lausanne, Switzerland, 2002.
    [10] Buchegger, S. and J.-Y.L. Boudec, "A Robust Reputation System for Peer-to-Peer and Mobile Ad Hoc Networks," in P2PEcon, 2004.
    [11] Buchegger, S. and J.-Y.L. Boudec, "Self-policing mobile ad hoc networks by reputation systems," IEEE Communication Magazine, vol. 43, pp. 101 - 107, 2005.
    [12] Buchegger, S., C. Tissieres, and J.Y. Le Boudec, "A test-bed for misbehavior detection in mobile ad-hoc networks," in Mobile Computing Systems and Applications, 2004.
    [13] Buttyn, L. and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," in Mobile Networks and Applications, Hingham, MA, USA, 2003.
    [14] Buttyn, L. and J.-P. Hubaux, "Report on a working session on security in wireless ad hoc networks," in SIGMOBILE, New York, NY, USA, 2003.
    [15] Buttyan, L. and J.-P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs," in MobiHOC, Boston, MA, 2000.
    [16] He, Q., D. Wu, and P. Khosla, "SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks," in WCNC'04, 2004.
    [17] Hu, J. and M. Burmester, "LARS: a locally aware reputation system for mobile ad hoc networks," in ACM-SE 44th, Melbourne, Florida, 2006.
    [18] Hu, Y.-C., D.B. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," in WMCSA'02, 2002.
    [19] Hu, Y.-C., A. Perrig, and D.B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wireless Networks, vol. 11, pp. 21 - 38, 2005.
    [20] Kejun Liu, J.D., Pramod K. Varshney, and Kashyap Balakrishnan, "An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, pp. 488 - 502, 2007.
    [21] Ljubica Blazevic, L.B., Srdan Capkun, Silvia Giordano, Jean-Pierre Hubaux, Jean-Yves Le Boudec, "Self organization in mobile ad hoc networks: the approach of Terminodes," IEEE Communication Magazine, vol. 39, pp. 166 - 174, 2001.
    [22] Marti, S., T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in MobiCom'00, Boston, Massachusetts, United States, 2000.
    [23] Michiardi, P. and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Communications and Multimedia Security Conference, 2002.
    [24] Padmanabhan, V.N. and D.R. Simon, "Secure traceroute to detect faulty or malicious routing," in SIGCOMM Computer Communication Review, 2003.
    [25] Papadimitratos, P. and Z.J. Haas, "Secure Routing for Mobile Ad hoc Networks," in CNDS'02, 2002.
    [26] Perkins, C.E. and P. Bhagwat, "Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers," in SIGCOMM, London, United Kingdom, 1994.
    [27] Sanzgiri, K., B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," in ICNP'02, 2002.
    [28] Yang, H., J. Shu, X. Meng, and S. Lu, "SCAN: self-organized network-layer security in mobile ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, pp. 261 - 273, Feb. 2006.
    [29] Zapata, M.G. and N. Asokan, "Securing ad hoc routing protocols," in WiSE'02, 2002.
    [30] Zhong, S., J. Chen, and Y.R. Yang, "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks," in INFOCOM'03, 2003.

    下載圖示 校內:2014-01-21公開
    校外:2014-01-21公開
    QR CODE