DocumentCode :
131113
Title :
A trust-based opportunistic routing algorithm in Ad hoc network
Author :
Dan Feng ; Ma Yajie ; Zhou Fengxing ; Lu Shaowu
Author_Institution :
Sch. of Inf. Sci. & Eng., Wuhan Univ. of Sci. & Technol., Wuhan, China
fYear :
2014
fDate :
27-29 June 2014
Firstpage :
1150
Lastpage :
1153
Abstract :
By making the best of the wireless channel´s broadcasting property, opportunistic routing can greatly improve the performance of wireless multi-hop networks. Traditional routing security mechanism is no longer suitable for the design of routing protocol in Ad hoc network. So this thesis introduces trust, i.e. the concept of security and credibility into opportunistic routing, and put forward an opportunistic routing algorithm based on trust. According to the simulation result, compared with ExOR algorithm of traditional opportunistic routing, TOR algorithm can prevent attacks of malicious node, improve the robustness of network and has an advantage in aspects such as handling capacity and end-to-end time delay.
Keywords :
ad hoc networks; telecommunication network reliability; telecommunication network routing; trusted computing; TOR algorithm; ad hoc network; malicious node; traditional routing security mechanism; trust-based opportunistic routing algorithm; wireless channel; wireless multihop networks; Ad hoc networks; Reliability; Routing; Security; Throughput; Wireless communication; Wireless sensor networks; Opportunistic routing; reliability; security; trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on
Conference_Location :
Beijing
ISSN :
2327-0586
Print_ISBN :
978-1-4799-3278-8
Type :
conf
DOI :
10.1109/ICSESS.2014.6933770
Filename :
6933770
Link To Document :
بازگشت