Abstract
AbstractAd hoc network is a special network with centerless and dynamic topology. Due to the free mobility of the nodes, routing security has been a bottleneck problem that plagues its development. Therefore, a multi-path QoS (quality of service) routing security algorithm based on blockchain by improving the traditional AODV (ad hoc on-demand distance vector) protocol (AODV-MQS) is proposed. Firstly, a chain of nodes is established in the network and the states of all nodes by making the intermediate nodes on the chain are saved. Secondly, the smart contract in the blockchain is set to filter out the nodes that meet the QoS constraints. Finally, two largest unrelated communication paths are found in the blockchain network through smart contract, one of which is the main path and the other is the standby path. Simulation experiments show that the performance of the proposed algorithm is better than other algorithms, especially in an unsafe environment.
Funder
Department of Education of Hebei Province
Bureau of Science and Technology of Hebei Province
the Teaching Reform Project of Jiangxi Provincial Department of Education
the National Social Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference31 articles.
1. A. Pal, P. Dutta, A. Chakrabarti, An efficient load balanced stable multi-path routing for mobile ad-hoc network. Microsyst. Technol. 2020(1), 101–112 (2020)
2. A.M. Shantaf, S. Kurnaz, A.H. Mohammed, Performance evaluation of three mobile ad-hoc network routing protocols in different environments. 2020 International Congress on Human–Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–6 (2020)
3. K. Lei, Q. Zhang, J. Lou, B. Bai, K. Xu, Securing ICN-based UAV ad hoc networks with blockchain. IEEE Commun. Mag. 57(6), 26–32 (2019)
4. A.S. Al Hasan, M.S. Hossain, M. Atiquzzaman, Security threats in vehicular ad hoc networks. In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 404–411 (2016)
5. N. Nishanth, A. Mujeeb, Modeling and detection of flooding-based denial-of-service attack in wireless ad hoc network using Bayesian inference. IEEE Syst. J. 2020(3), 1–10 (2020)
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献