期刊文献+

基于邻接信任的路由安全评估 被引量:3

Adjoining trust based routing security assessment
下载PDF
导出
摘要 针对路由黑洞等路由攻击问题提出了融合邻接信息和信任信息的邻接信任概念,利用邻接信任有效抑制了中间节点在路由信息传递中的欺骗行为,并以此为基础建立了网络邻接信任评估模型。给出了该模型的数学描述和基于移动代理信息采集平台的实现方案,并设计了贪婪评估算法对模型中节点以及相邻节点间邻接路径的信任安全程度进行量化分析。与其他算法相比,本文提出的贪婪评估算法具有敏锐感知网络中的路由攻击行为的优势。仿真结果表明,评估产生的威胁警报和节点攻击概率不仅能够检测MANET网络中外部非法节点的路由攻击,而且能够感知网络内部具有合法身份节点的路由攻击行为,有效提高了MANET网络系统的安全性。 To solve the problem of routing attacks,the concept of adjoining trust is presented.The adjoining trust is used to effectively inhibit deceptions from middle nodes when transferring routing information.An adjoining trust assessment model is also constructed based on this concept.A mathematical description of this model and a mobile agent based implementation are given.Using this model,a greed algorithm is designed to quantitatively assess the security of the MANET and to sense attacks at the same time.Compa...
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2009年第2期440-445,共6页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金重点项目(60633020) 国家自然科学基金项目(60573036,60702059,60503012,60803150,60743005) 河北省科技攻关项目(07215601D-3)
关键词 计算机应用 MANET 邻接信任 路由攻击 量化评估 内部威胁 computer application MANET adjoining trust routing attacks quantitative assessment insider threat
  • 相关文献

参考文献3

二级参考文献35

共引文献87

同被引文献31

  • 1傅翀,王娟,秦志光,钱伟中.宏观网络安全预警与应急响应系统[J].电子科技大学学报,2006,35(S1):702-705. 被引量:7
  • 2宋申民,宋卓异,陈兴林,段广仁.卫星光通信粗瞄系统非线性摩擦的神经网络补偿[J].航空学报,2007,28(2):358-364. 被引量:10
  • 3蒋维勇,吴文传,张伯明,王刚,孙宏斌.在线安全预警系统中的网络模型重建[J].电力系统自动化,2007,31(21):5-9. 被引量:28
  • 4Jhaveri R H,Patel S J,Jinwala D C.A novel approach for grayhole and blackhole attacks in mobile ad hoc networks.Advanced Computing & Communication Technologies (ACCT),2012 Second International Conference on.IEEE,2012:556-560.
  • 5Wang S S,Yan K Q,Wang S C.An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network.Computers & electrical Engineering,2010; 36 (1):100-113.
  • 6Bohara B,Sharma V.Analysis and prevention of effects of gray hole attacks on routing protocol in mobile ad-hoc networks.Analysis,2013; 2(6):2468-2472.
  • 7钱聪.移动自组织网络中基于信任和能量综合评价的路由机制研究.武汉:华中科技大学,2012.
  • 8Su M Y.Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems.Computer Communications,2011; 34(1):107-117.
  • 9Su M Y.A study of deploying intrusion detection systems in mobile ad hoc networks.Proceedings of the World Congress on Engineering,2012; 2(7):978-988.
  • 10Wang W,Zeng G,Yao J,et al.Towards reliable self-clustering mobile ad hoc networks.Computers & Electrical Engineering,2012; 38(3):551-562.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部