期刊文献+

基于行为的Ad Hoc网络分布式CA推荐信任模型 被引量:2

Recommending Trust Model Based on Behavior for Distributed CA in MANET
下载PDF
导出
摘要 移动Ad Hoc网络是一组带有无线收发装置的移动节点组成的一个多跳的临时性自治系统,根据其通信具有局部性这一特点,可以建立移动Ad Hoc网络的多域全分布式CA系统.在研究如何建立不同域间的CA信任关系时,提出了基于行为的扩展推荐信任模型.它通过网络运行中的反馈信息,动态管理信任路径,提高了系统的安全性、可伸缩性和鲁棒性. Mobile Ad Hoc Networks (MANET) is a multi-ho Pand instant serf-organized autonomous system of a collection of wireless mobile nodes. A multi-domain full-distributed Certification Authorities system model was proposed founding on its trait of territorial communication. The thesis researched this model and proposes a new model for the interoperability between virtual Certification Authorities named extended recommending trust model based on behavior. It can improve the system' s security, retractility and robustness by dynamic trust chain maintenance with feedback information in the actual course.
出处 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第1期81-85,共5页 Journal of Chongqing University
关键词 移动AD HOC网络 互操作模型 推荐信任 mobile Ad Hoc etworks model for interoperability recommending trust
  • 相关文献

参考文献9

  • 1IETF. Mobile Ad Hoc networks charter [ EB/OL ].[ 1999-10-20]. http: // www. ietf. org/html. charters/manet- charter, html.
  • 2英春,史美林.自组网体系结构研究[J].通信学报,1999,20(9):47-54. 被引量:59
  • 3SANTIS A. How to share a function securely [C]//STOC'94. Montreal, Canada:[s.n.] , 1994.
  • 4ZHOU L, HAAS Z. Securing Ad Hoe networks [ J ]. IEEE Network Magazine, 1999, 13 (6) : 79-82.
  • 5YI S, KRAVETS R. MOCA: Mobile certificate authority for wireless Ad Hoc networks [ C] //The 2nd Annual PIG Research Worksho P( PIG 03). NIST Gaithersburg MD, USA:[ s. n. ], 2003.
  • 6LOU H, ZERFOS P, KONG J, et al. Self-securing Ad Hoc wireless networks [ C ]//IEEE ISCC 2002. Taormina, Italy: [s. n. ] ,2002.
  • 7沈颖.基于移动Ad Hoc网络的PKI/CA系统互操作模型[J].情报杂志,2005,24(5):58-61. 被引量:2
  • 8DESMEDT Y. Threshold cryptography [ J]. European Transactions on Telecommunications, 1994, 5 (4) : 35- 37.
  • 9SRDJAN CAPKUN, LEVENTE BUTTYAN JEAN-PIERRE HUBAUX. Self-organized public-key management for mobile Ad Hoc networks [ J ]. IEEE Transactions on Mobile Computing, 2003, 2 (1): 28-31.

二级参考文献17

  • 1Macker J, CORSON M. Mobile Ad Hoc Networking and the IETF. Mobile Computing and Communications Review, 1998;2(1).
  • 2RFC 2501, Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations.
  • 3Zhou L, HAAS Z. Securing Ad Hoc Networks. IEEE Network Magazine,1999;13(6).
  • 4SANTIS A, et al. How to Share a Function Securely. STOC' 94. Montreal, Canda, 1994.
  • 5Yi S, Kravets R. MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. The 2nd Annual PKI Research Workshop (PKI 03 ). NIST Gaithersburg MD , USA ,2003.
  • 6Luo H, Zerfos P, Kong J, et al. Self- securing Ad Hoc Wireless Networks.IEEE ISCC 2002. Taormins, Italy,2002.
  • 7Desmedt Y. Threshold Cryptography. European Transactions on Telecommunications, 1994; 5 (4).
  • 8Lloyd S. CA - CA Interoperability White Paper. http://www. pkiforum. org/pdfs/ca- ca-interop. pdf, March 2001.
  • 9Nash A著 张玉清译.公钥基础设施(PKI):实现和管理电子安全[M].北京:清华大学出版社,2002..
  • 10FORD W BAUM M.S.著 劳帼龄译.安全电子商务-为数字签名和加密构造基础设施(第二版)[M].北京:人民邮电出版社,2002..

共引文献59

同被引文献18

  • 1王映辉,张世琨,刘瑜,王立福.基于可达矩阵的软件体系结构演化波及效应分析[J].软件学报,2004,15(8):1107-1115. 被引量:47
  • 2张胜,徐国爱,胡正名,杨义先.Ad hoc网络信任模型的研究[J].计算机应用研究,2005,22(12):100-102. 被引量:6
  • 3田鹏飞,王剑英.动态最短路径算法及其仿真[J].计算机仿真,2007,24(6):153-155. 被引量:15
  • 4XU F, PAN J, I.U W. A Trust-based approach to estimating the confidence of the software system in open environments [J]. Journal of Computer Science and Technology: English Language Edition, 2009, 24(2) : 373-385.
  • 5ZHU M L, ZHI J. An sgent-based framework supporting trust evaluation for service selection[C]// 33rd Annual IEEE International Computer Software and Applications Conference, July 20-24, 2009, Seattle, WA, United states. [S. l.]: IEEE Computer Society, 2009: 286-291.
  • 6CHENC, GU L Z, NIU X X, et al. An approach for resource selection and allocation in grid based on trust management system[C]// International Conference on Future Information Networks, October 14-17, 2009, Beijing, China. [S. l.]:IEEE Computer Society, 2009: 232-236.
  • 7TAO F, HU Y, ZHAO D, et al. An approach to manufacturing grid resource service scheduling based on trust QoS [J].International Journal of Computer Integrated Manufacturing, 2009, 22(2): 100-111.
  • 8DUSTDAR S, HOFFMANN T. Interaction pattern detection in process oriented information systems[J]. Data and Knowledge Engineering, 2007, 62 ( 1 ):138-155.
  • 9GUO W C, LIN C. A formal approach to verify grid service composition based on interaction pattern[C]// the 3rd IEEE Asia-Pacific Services Computing Conference, December 15 -19, 2008, Pisa, Italy. [S.l.]:IEEE Computer Society, 2008: 69-74.
  • 10YAMABE T, TAKAHASHI K, NAKAJIMA T. Design issues and an empirical study in mobility oriented service development[C]// the 1st workshop on Mobile middleware: embracing the personal communication device, December 1-5, 2008, Leuven, Belgium. [S. l.] ACM, 2008: 1-6.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部