期刊文献+

移动自组网中非完全信息节点风险评估 被引量:3

Incomplete Information Nodes Risk Assessment in Mobile Ad Hoc Networks
下载PDF
导出
摘要 移动自组网是一种无中心、自组织以及多跳的无线网络,能否有效可靠地对通信节点进行风险评估是保障节点高质量通信的重要因素.当前基于可信度或是信誉的评估方法对评估样本都有特殊的要求,对评估对象提出种种假设,无法辨别间接样本的恶意推荐问题,在实际移动自组网中各个节点尤其是恶意节点对外暴漏的信息往往偏少,样本数量有限,无法明确判断其状态,大部分是非完全信息,从而导致评估结果缺乏客观性与可靠性.文中提出采用灰色系统理论描述通信节点非完全信息状态,根据灰类白化以及灰色聚类思想进行节点风险评估.方案针对自组网络通信需求对节点行为进行多关键属性划分,采用味集群方法收集原始样本,避免恶意推荐;将难以用数值精确刻画的关键属性以白化权函数量化,引入灰聚类的概念和计算方法,将实体的通信风险水平定义为实体关键属性值序列针对各评估灰类的聚类评估值,从而得到该实体通信风险水平的相对参考值.分析与实际计算表明该方法是一种适合移动自组网中非完全信息节点风险评估的有效方法. Mobile Ad hoe Networks are distributed self-organized and multi-hop networks, the efficient networks nodes risk assessment is the key factor for high quality communication. Most assessment methods based on reliability or reputation have particular requirement, suppose some conditions to the samples, and can't identify the vicious recommendation. However, in true Ad hoc networks, the exposed information of some nodes is little, which is more serious to some vicious nodes, the samples are so little that the clear state can't be identified and most are incomplete information, which result in that the assessment is not objective and credible. According to these problems, a Ad hoc networks risk assessment method based on grey theory is proposed. In this scheme, the communication nodes incomplete information state is described as grey league, the whitening function and grey clustering idea are used to do the assessment. The key attributes of nodes are marked off, original data is collected using taste concourse method to avoid vicious recommendation, the evaluated nodes are regarded as clustering entities, and the risk grade point value of their key attributes are given by clustering set assessment value, the analysis and computing shows this scheme is a efficient incomplete information nodes risk assessment method in mobile Ad hoc networks.
出处 《计算机学报》 EI CSCD 北大核心 2009年第4期805-816,共12页 Chinese Journal of Computers
基金 湖北省自然科学基金(2008CDB352) 国家自然科学基金(60703048,60803158)资助~~
关键词 移动自组网 风险评估 灰色理论 非完全信息 Ad hoc networks risk assessment grey theory incomplete information
  • 相关文献

参考文献17

  • 1Guha R, Kumar R, Raghavan P. Propagation of trust and distrust//Proceedings of the 13th International World Wide Web Conference Proceedings (WWW2004). New York, USA: Association for Computing Machinery, New York, United States, 2004:17-22
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open networks//Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verglag, 1999: 59-63
  • 3Wang Y, Vassileva J. Bayesian network trust model in peer- to-peer networks//Proceedings of the 2nd International Workshop: AP2PC 2003-Agents and Peer-to-Peer Computing. Melbourne, Australia: Springer Verlag, Heidelberg, D-69121, Germany, 2003: 23-24
  • 4Yu B, Munindar P. An evidential of distributed reputation management//Proceedings of the 1st International Joint Conference on: Autonomous Agents and Multiagent Systems (AAMAS02). Bologna, Italy: ACM Press, 2002:294-301
  • 5Jφsang A. Trust-based decision making for electronic transactions//Yngstrom L, Svensson T eds. Proceedings of the 4th Nordic Workshop on Secure Computer Systems. Kista:Stockholm University Press, 1999:1-21
  • 6唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 7Abdul-Rahman A, Hailes S. A distributed trust model// Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998:48-60
  • 8Theodorakopoulos G, Baras J S. Trust evaluation in Ad Hoc networks//Proceedings of the 2004 ACM Workshop on Wireless Security. Philadelphia, USA: ACM Press, 2004: 1-10
  • 9Buchegger S, Boudec J L. A robust reputation system for P2P and mobile Ad-hoc networks//Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems. Harvard University, Boston, Cambridge MA, 2004: 1-10
  • 10Xiong L, Liu L. PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management, 2004, 16(7): 843-857

二级参考文献35

  • 1廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 2于枫,王敏,高翔.数值型关联规则挖掘在网络入侵检测系统中的应用研究[J].计算机应用与软件,2006,23(11):52-53. 被引量:3
  • 3Ye W, Heidenmann J, Estrin D. An energy-efficient MAC protocol for wireless sensor networks. In: Proc. of the IEEE INFOCOM.2002. http://www.isi.edu/div7/publication_files/Ye02a.pdf
  • 4Sohrabi K, Gao J, Ailawadhi V, Pottie GJ. Protocols for self-organization of a wireless sensor network. IEEE Personal Comm. Mag.2000,7(5):16-27..
  • 5Kulik J, Heinzelman WR, Balakrishnan H. Negotiation-Based protocols for disseminating information in wireless sensor networks.ACM Wireless Networks, 2002,8(2): 169-185.
  • 6Cerpa A, Estrin D. ASCENT: Adaptive self-configuring sensor networks topologies. In: Proc. of the IEEE INFOCOM. 2002.
  • 7Kawadia V, Kumar PR. Power control and clustering in Ad hoc networks. In: Proc. of the IEEE INFOCOM. 2003.459-469.
  • 8Estrin D. Next century challenges: Scalable coordination in sensor networks. In: Proc. of the MobiCOM'99. 1999. 263-270.
  • 9Heinzelman WR, Kulik J, Balakrishnan H. Adaptive protocols for information dissemination in wireless sensor networks. In: Proc.of the 5th Ann. Int'l Conf. on Mobile Computing and Networking. 2001. 174-185.
  • 10Lindsey S, Raghavendra CS. Pegasis: Power-Efficient gathering in sensor information systems. In: Proc. of the IEEE Aerospace Conf. 2002. 1-6.

共引文献326

同被引文献38

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部