Proceedings of the 2nd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS 20 2017
DOI: 10.2991/eeeis-16.2017.82
|View full text |Cite
|
Sign up to set email alerts
|

A trusted routing algorithm based on D-S evidence theory combined with physical layer security

Abstract: With the rapid development of the communication technology, the traditional routing algorithms which only consider functional QoS metrics are difficult to meet the needs of applications. In this paper, we propose a trusted routing algorithm to overcome this problem. First, we propose a trust evaluation model of service instances based on the Dempster-Shafer theory combined with physical layer security, and then the trusted routing algorithm is proposed by using this model to improve the traditional routing alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 12 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?