期刊文献+

无线自组网中基于匿名电子投票的信任评估

Trust Evaluation Based on Anonymous Electronic Voting for Wireless Ad Hoc Networks
下载PDF
导出
摘要 无线自组网中的信任评估对安全的通信与路由有着重要的作用,传统的信任评估需要事先对事件进行好坏分类,然后采取一定的算法对事件进行统计分析,得出量化的信任评估结果。在移动自组网中,由于网络的动态性,网络环境的不可预测性,新出现的事件难以很快确定类型,传统评估方法应用效果有限,提出了一个基于匿名电子投票的信任评估机制,该机制不需要事先对网络事件进行好坏分类,直接对各个节点的投票进行统计以确定被投票节点的信任程度,该信任评估机制具有客观性、唯一性、可靠性以及匿名性的特点。 The trust evaluation of wireless Ad Hoc networks is important for secure communication and routing. The network events need to be identified as valid or legal one advancely in traditional trust evaluation, the events are computed and the trust result is acquired, which is not efficient in mobile wireless networks because of the dynamic and uncertain network characteristics. This paper proposes a trust evaluation scheme based on anonymous electronic voting, which directly computes the votes of all nodes to decide the trust degree of one node. The scheme is impersonal, exclusive, reliable and anonymous.
出处 《计算机仿真》 CSCD 北大核心 2009年第2期151-153,共3页 Computer Simulation
基金 国家自然科学基金(60703048)
关键词 无线自组网 信任评估 电子投票 Wireless Ad Hoc network Trust evaluation Electronic voting
  • 相关文献

参考文献7

  • 1R Guha, R Kumar, P Raghavan. Propagation of trust and distrust [ C]. Thirteenth International World Wide Web Conference Proeeedings, WWW2004. New York, USA : Association for Computing Machinery, New York, United States, 2004. 17 -22.
  • 2T Beth, M K Borcherding, B lein. Valuation of trust in open networks[C]. Proceedings of the European Symposium on Research in Security ( ESORICS), Brighton: Springer - Verglag, 1999.59 - 63.
  • 3Y Wang, J Vassileva. Bayesian network trust model in peer - to - peer networks[ C]. Second International Workshop: AP2PC 2003 - Agents and Peer - to - Peer Computing. Melbourne, Australia: Springer Verlag, Heidelberg, D - 69121, Germany,2003.23 - 24.
  • 4B Yu, P Munindar. An evidential of distributed reputation management[ C]. Proceedings of the 1st International Joint Conference on : Autonomous Agents adn Multiagent Systems ,AAMAS02. Bologna, Italy: ACM Press, 2002. 294 -301.
  • 5A J - sang. Trust - Based decision making for electronic transactions[C]. In: Yngstrom L, Svensson T, eds. Proc. of the 4th Nordic Workshop on Secure Computer Systems. Kista: Stockholm University Press, 1999. 1 -21.
  • 6G Theodorakopoulos, J S Baras. Trust Evaluation in Ad Hoc Networks[ C]. The 2004 ACM workshop on Wireless security. Philadelphia, USA:ACM Press,2004. 1 -10.
  • 7A Fujioka, T Okamoto, K Ohta. A practical secret voting scheme for large scale elections[C]. In: Seberry J, Zheng Y L eds. AUS- CRYPT92, LNCS 718. Gold Coast, Queensland, Australia. 1992. Berlin: Springer - Verlag, 1993. 244 - 251.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部