期刊文献+

移动计算环境下信任管理模型研究

Research on the Trust Management Model Based on Reputation for Mobile Computing Environment
下载PDF
导出
摘要 移动计算环境下的移动主机,易受攻击,且其交互是对等的,考虑到节点的自主行为及恶意节点,仅靠密码学的安全体系是不够的,文章借鉴P2P信任管理提出移动计算环境下基于信誉的信任管理模型,模型对移动节点是透明的,节能的,对简单恶意节点和合谋欺诈有很好的抵抗作用。 The resource constraints of mobile hosts in mobile computing environment make it easy to attack, further more the interaction between them are peer-to-peer, considering the dynamic behaviors of a mobile host and the exist of the malicious nodes, it is not enough to only depend on the conventional security mechanism that based on cryptography. Learned from the trust management of p2p networks, a trust management model based on reputation for mobile computing environment is proposed, mobile support stations evaluate the trust value of mobile notes and take charge of the mobility ,the model is transparent and economical to the mobile host, in addition, it has a perfect counteractant effect upon malicious nodes and collusive tricks.
出处 《中国新通信》 2008年第23期65-67,共3页 China New Telecommunications
关键词 移动计算 推荐 信任 信誉 mobile computing, recommend, trust, reputation
  • 相关文献

参考文献4

  • 1[1]Perrig A,Szewczykr W V,et al.SPINS:security protocols for sensoretworks.Wireless Networks Journal.2002,8 (5)
  • 2[2]Blaze M,Feigenbaum J,Lacy J.Decentralized trust management.Proceedings of IEEE Conf Security and Privacy,Oakland,California,USA,1996
  • 3[3]Park T,Woo N,Yeom H Y.An efficient optimistic message logging scheme for the recoverable mobile computing system.IEEE Trans on Mobile Computing,2002,1 (4):256-277
  • 4[4]Ayildiz I F,Ho J S M.On location management for personal communications networks.1EEE Communications Magazine,1996,9:138~145

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部