• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (06): 1087-1092.

• 论文 • 上一篇    下一篇

降低Ad hoc网络信息泄露的路由算法

刘玉军,汪明辉,蔡猛,陈坤   

  1. (装甲兵工程学院信息工程系,北京 100072)
  • 收稿日期:2014-05-19 修回日期:2014-09-26 出版日期:2015-06-25 发布日期:2015-06-25
  • 基金资助:

    军内科研计划资助项目

A routing algorithm for information
leakage reduction in Ad-hoc networks

LIU Yujun,WANG Minghui,CAI Meng,CHEN Kun   

  1. (Department of Information Engineering,Academy of Armored Force Engineering,Beijing 100072,China)
  • Received:2014-05-19 Revised:2014-09-26 Online:2015-06-25 Published:2015-06-25

摘要:

分析了Adhoc网络信息传输过程中信息泄露的途径和原因,提出了Adhoc网络信息泄露模型,设计了一种降低信息泄露的路由算法RARIL。该算法在加权图模型的基础上,加入节点位置信息和身份认证,减少组外节点和组内非信任节点窃听信息,优先信任节点转发信息,降低信息泄露概率。通过计算非信任节点信息泄露概率,选择信息泄露概率最小的节点作为转发节点,组建可控转发节点集合,保证集合中转发节点的信息泄露概率最小。最后,根据算法设计约束条件,以算法性能的主要影响因素设定算法评估指标,通过仿真比较路由算法在降低信息泄露方面的优越性。

关键词: 信息泄露, 加权图, 位置路由, 身份认证, 非信任节点

Abstract:

We analyze the approaches and causes of information leakage during information transmission in Adhoc networks, design an Adhoc network model based on the leaked information, and propose a routing algorithm for information leakage reduction. Based on the weighted graph model, we add the node location information and authentication in order to reduce information eavesdropping by external users and un-trusted users within the group, and to make the information forwarding of trusted users the priority, thus reducing the probability of information leakage. After calculating the leakage probability of the un-trusted nodes, we select the node with minimum probability of information leakage as the forwarding node, and we build a controllable forwarding node set  to ensure the minimum probability of information leakage. Finally, according to the constraints of algorithm design, we take the main factors that impact the algorithm performance as the performance evaluation indicators, and the simulation results prove the superiority of the proposed route algorithm in information leakage.

Key words: information leakage;weighted graph;location routing;authentication;un-trusted user