4.7 Article

A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks

期刊

APPLIED SOFT COMPUTING
卷 38, 期 -, 页码 469-476

出版社

ELSEVIER SCIENCE BV
DOI: 10.1016/j.asoc.2015.10.019

关键词

Delay Tolerant Networks; Evolutionary game; Routing attack; Routing security; Evolutionary strategy stable

资金

  1. National Science Foundation for Distinguished Young Scholars of China [61225012, 71325002]
  2. National Natural Science Foundation of China [61572123]
  3. Specialized Research Fund of the Doctoral Program of Higher Education for the Priority Development Areas [20120042130003]

向作者/读者索取更多资源

Delay Tolerant Networks (DTNs) often suffer from intermittent disruption due to factors such as mobility and energy. Though lots of routing algorithms in DTNs have been proposed in the last few years, the routing security problems have not attracted enough attention. DTNs are still facing the threats from different kinds of routing attacks. In this paper, a general purpose defense mechanism is proposed against various routing attacks on DTNs. The defense mechanism is based on the routing path information acquired from the forwarded messages and the acknowledgment (ACK), and it is suitable for different routing schemes. Evolutionary game theory is applied with the defense mechanism to analyze and facilitate the strategy changes of the nodes in the networks. Simulation results show that the proposed evolutionary game theory based defense scheme can achieve high average delivery ratio, low network overhead and low average transmission delay in various routing attack scenarios. By introducing the game theory, the networks can avoid being attacked and provide normal transmission service. The networks can reach evolutionary strategy stable (ESS) under special conditions after evolution. The initial parameters will affect the convergence speed and the final ESS, but the initial ratio of the nodes choosing different strategies can only affect the game process. (C) 2015 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据