期刊文献+

移动自组织网络环境下信任模型的研究 被引量:2

Study of Trust Model for Mobile Ad Hoc Networks
在线阅读 下载PDF
导出
摘要 移动自组织网是一种可移动、无中心、自组织、可快速展开的特殊对等式网络。由于无线链路的不可靠性和拓扑结构的多变性等原因,它在安全上面临着许多威胁和挑战。为了保证路由安全和网络的可靠运行,利用临近节点间的信任关系,提出了一种基于移动自组织网络环境的信任模型,并给出了该模型的数学描述和实现方法。最后,将模型应用于移动自组织网的一种路由协议。仿真分析表明,网络存在攻击时,基于该模型的路由协议有更好的包传递率和路由安全性能。 Mobile ad hoc network is a special peer-to-peer network that is infrastrucure-less,self-organizing and dynamical reconfiguration and mobile.Due to the unreliable character of wireless link and the fast changes of topology,MANET is faced to various security threats and challenges.In order to ensure security and reliability of MANET,present a novel global trust model and give a mathematical description and a distributed implementaiton method.As example apply the model in a routing protocol.Mathematic analyses and simulations show that the routing protocol based on the proposed trust model gets better performance in terms of packets delivery ratio and routing security in unsafe networks.
作者 宋杨 周井泉
出处 《计算机技术与发展》 2010年第5期142-145,共4页 Computer Technology and Development
基金 国家863计划项目(2009AA01Z202) 江苏省科技支撑项目(BE2008134)
关键词 移动自组织网 信任模型 路由 ad hoc networks trust model routing
  • 相关文献

参考文献10

  • 1Argyroudis P G,O'Mahony D.Secure routing for mobile ad hoc networks[J].Communications Surveys & Tuorials,IEEE,2005,7(3):2-21.
  • 2Sanzgiri K,Dahill B,Levine B N,et al.A secure routing protocol for ad hoc networks[C]∥Proceedings of the 10th IEEE International Conference on Network Protocols.Paris,France:IEEE Computer Society,2002.
  • 3Marti S,Giuli T,Lai K,et al.Mitigating routing misbehavor in mobile ad hoc networks[C]∥Proceedings of MOBICOM 2000.New York,USA:ACM,2000:255-265.
  • 4Buttyan L,Hubaux J P.Enforcing service availability in mobile ad-hoc wans[C]∥Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC).Boston,MA,USA:[s.n.],2000.
  • 5王小英,赵海,林涛,张文波,尹震宇.基于信任的普适计算服务选择模型[J].通信学报,2005,26(5):1-8. 被引量:17
  • 6Guha R,Kumar R,Raghavan P.Propagation of trust and distrust[C]∥Proceedings of the 13th International World Wide Web Conference Proceedings (WWW2004).New York:[s.n.],2004:403-412.
  • 7Beth T,Borcherding M,Klein B.Valuation of trust in open networks[C]∥Proceedings of the 3rd European Symposium on Research in Computer Security.Berlin:Springer-Verlag,1994:3-18.
  • 8Wang Y,Vassileva J.Bayesian network trust model in Peer-to-Peer networks[C]∥Proceedings of the 2nd International Workshop on Agents and Peer-to-Peer Computing.Melbourne,Australia:[s.n.],2004:23-34.
  • 9Yu B,Munindar P.An evidential of distributed reputation management[C]∥Proceedings of the 1st International Joint Conference on:Autonomous Agents and Multiagent Sys-tems,AAMAS02.Bologna,Italy:[s.n.],2002:294-301.
  • 10Josong A.Trust-Based decision making for electronic transactions[C]∥Proceedings of the 4th Nordic Workshop on Secure Computer Systems.Kista:Stockholm University Press,1999:1-21.

二级参考文献16

  • 1KINDBERG T, FOX A. System software for ubiquitous computing[J].IEEE Pervasive Computing, 2002, 1(1): 70-81.
  • 2VOIDA S, MYNATT E D, MACINTYRE B. Integrating virtual and physical context to support knowledge workers[J]. IEEE Pervasive Computing, 2002,1(3): 73-79.
  • 3JOHANSON B, FOX A, WIINOGRAD T. The interactive workspaces project: experiences with ubiquitous computing rooms[J]. IEEE Pervasive Computing, 2002, 1(2): 67-74.
  • 4GELLERSEN H W, SCHMIDT A, BEIGL M. Adding some smartness to devices and everyday things [A]. Third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'00) Monterey,California: IEEE Computer Society[C]. 2000. 3-10.
  • 5MICHAEL J, JACK W. UPnP Design by Example[M]. Santa Clara USA:Intel Press.
  • 6WEISER M. The computer of the 21st century[J]. Scientific American,1991, 265(3):66-75.
  • 7GARLAN D, SIEWIOREK D P, SMAILAGIC A. Project aura: toward distraction-free pervasive computing[J]. IEEE Pervasive Computing,2002, 1(4):22-31.
  • 8王化文,叶郁,李劲.Jini分布嵌入式网络体系研究[J].计算机应用研究,1999,16(8):5-7. 被引量:4
  • 9宫秀军,刘少辉,史忠植.一种增量贝叶斯分类模型[J].计算机学报,2002,25(6):645-650. 被引量:56
  • 10宫秀军,史忠植.基于Bayes潜在语义模型的半监督Web挖掘[J].软件学报,2002,13(8):1508-1514. 被引量:28

共引文献16

同被引文献16

  • 1陈友华.组合预测方法有效性理论及其应用[M].北京:科学出版社,2008.
  • 2金光,江先亮.无线网络技术教程——原理、应用与仿真实验[M].北京:清华大学出版社,2011.
  • 3Blaze M F J. Decentralized trust management [ C ]//Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA:IEEE Comput- er Society Press, 1996 ! 164 - 173.
  • 4Beth T, Borcherding M, Klein B. Valuation of trust in open network [ C ]//Proceedings of the European Symposium on Research in Securi- ty ( ESORICS). Brighton : Springer-Verlag, 1994:3 - 18.
  • 5Rao Shen W Y. The Comprehensive Trust Model in P2P Based on Im- proved Eigen Trust Algorithm [ C ]//2010 International Conference on Measuring Technology and Mechanics Automation ,2010:3076 - 3079.
  • 6Xiaoyong Li, Feng Zhou, Xudong Yang. Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management [ J ]. IEEE Trans- actions on Parallel and Distributed Systems, 2012, 23 ( 10 ) : 1944 - 1957.
  • 7Hung K S. A trust-based geographical routing scheme in sensor net- works[ C ]//Proc of IEEE Wireless Communications and Networking Conference,2007 : 3123 - 3127.
  • 8Crosby G V. Cluster-based reputation and trust for wireless sensor net- works[ C]//Proc of IEEE Consumer Communications and Networking Conference,2007 : 604 - 618.
  • 9Ye J. Multicriteria fuzzy decision-making method based on a novel ac- curacy function under interval-valued intuitionistic fuzzy environment [J]. Expert Systems with Applications,2009,36(3) :6899 -6902.
  • 10蔡红云,杜瑞忠,田俊峰.基于多维信任云的信任模型研究[J].计算机应用,2012,32(1):5-7. 被引量:13

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部