期刊文献+

移动Ad hoc网络中的一种信任评估模型

Trust Valuation Model in Mobile Ad hoc Network
下载PDF
导出
摘要 为了实现从安全管理的角度划分移动Ad hoc网络的网络结构,保证移动Ad hoc网络的有效运行和管理,提出了一种信任评估模型.该模型从信任的定义出发,采用实体行为的服务级管理,针对不同类别服务的实体行为表现成功次数和失败次数对信任关系进行度量,定义了直接信任度、推荐信任度和节点信任度.结果表明该模型适用于移动Ad hoc网络,弥补了移动Ad hoc网络中现有的成簇算法缺少恶意节点检测的缺陷. To partition structurally the mobile Ad hoe network (MANET) in view of its security management and ensure its effective operation and management, a trust valuation model was developed according to the definition of trust. Introducing the service level management of entity behavior and measuring the success/failure frequencies of different kinds of entity behavior in trusting relationship, the direct, recommendation and node trust or confidence is defined separately. The application results showed that the model is adaptive to mobile Ad hoe network and especially it can compensate for the defect that there is no detection to malicious nodes in other existing clustering algorithms.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第3期341-344,共4页 Journal of Northeastern University(Natural Science)
基金 国家杰出青年科学基金资助项目(70625001) 国家高技术研究发展计划项目(2003AA712032)
关键词 移动AD HOC网络 信任评估 网络安全 成簇算法 mobile Ad hoe network trust valuation network security clustering algorithm
  • 相关文献

参考文献9

  • 1严中华,米加宁.信任的理论框架研究及其在电子商务中的应用[J].科技进步与对策,2003,20(9):29-32. 被引量:33
  • 2Weiser M.The computer for the 21st century[J].Scientific Amwrican,1991,267(3):94-104.
  • 3Konarad K,Fuchs G,Rathel J.Trust and electronic commerce more than a technical problem[C] //Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.Lausanne:IEEE Press,1999:360-365.
  • 4Blaze M,Feigenbaum J,Ioannidis J,et al.The role of trust management in distributed systems security[ C ] // Secure Intemet Programming:Issues for Mobile and Distributed Objects.Berlin:Springer-Verlag,1999:167-173.
  • 5Abdul R A,Hailes S.A distributed trust model[ C ]//Proceedings of the 1997 New Security Paradigms Workshop.Cambridge:ACM Press,1998:48-60.
  • 6Yahalom R,Klein B,Beth T.Trust relationships in secure system-a distributed authentication perspective[ C ]//Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy.Oakland:IEEE Press,1993:150 -164.
  • 7Beth T,Borcherding M,Klein B.Valuation of trust in open network[ C ] // Proceedings of the European Symposium on Research in Security (ESORICS).Berlin:Springer-Verlag,1994:3-18.
  • 8徐锋,吕建,郑玮,曹春.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051. 被引量:69
  • 9Basu P,Khan N,Little T D C.A mobility based metric for clustering in mobile ad hoc networks[ C ]// Proceedings of IEEE 21st International Distributed Computing System Workshop.Phoenix:1EEE Press,2001:413-418.

二级参考文献14

  • 1Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 3Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 4Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 5Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 6Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 7Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 8Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 9Javenpaa.S.L and N.Tractinsky(1999). Consumer Trust in an Internet store:A Cross Culture Validation.Journal of Compution-Mediated Communication 5(2).
  • 10J.D.Lewis and A.Weigert, Trust as a social reality,Social Forces,vol.63,pp.867-985,1985.

共引文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部