期刊文献+

Ad Hoc网络中一种基于救赎机制的信任模型 被引量:2

A Redemption-based Trust Model for Ad Hoc Networks
下载PDF
导出
摘要 在Ad Hoc网络中,节点由于自私等恶意原因以及链路错误导致拒绝转发数据,需要采用适当的机制来提高网络的转发性能。提出一种Ad Hoc网络中的信任模型来激励节点间的协作,在此信任模型中,每个节点通过直接监控和其它节点的推荐监控信息共同完成对邻居节点的信任评价,并维护所有邻居节点的信任值,同时在信任值更新和重建中引入信任值衰退和信任救赎机制来体现模型的健壮性。实验表明该信任模型中的信任救赎机制能提高网络可用性,且该模型有效抑制了恶意节点的行为。 In Ad Hoc networks, nodes refuse to forward packets for others due to link error or malicious reasons such as selfish, A mechanism should be adopted to improve the performance of networks. In this paper,a trust model in Ad Hoc networks is proposed to prompt collaboration among nodes. In the trust model every node makes the trust evaluation of its neighbor nodes locally by direct observation and use of recommendation information available. In our approach, every node maintains a trust rating for each neighbor node. Meanwhile, trust fading and redemption are brought about by update and re-establishment of trust to show robustness. Experiments indicate the trust redemption mechanism of the trust model can enhance the usability of networks, and the model can restrain the misbehavior of malicious nodes effectively.
出处 《南京邮电大学学报(自然科学版)》 2009年第4期20-25,共6页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(60873231) 江苏省高校自然科学基金(08KJB520006) 江苏省研究生培养创新工程项目(CX07B_109z) 南京邮电大学青蓝计划(XK0070906052)资助项目
关键词 AD HOC网络 信任模型 信任救赎机制 Ad Hoc Network trust model trust redemption mechanism
  • 相关文献

参考文献27

  • 1DAVID R,IGNAS G N. Ad Hoc networking in future wireless communications [ J ]. Computer Communications ,2003,26 ( 1 ) :36 - 40.
  • 2FUDENBERY D, TIROLE J. Game Theory [ M ]. Cambridge, MA: MIT Press, 1991.
  • 3RAPAPORT A, CHAMMAH A M. The Prisoner's Dilemma:A study in conflict and cooperation [ M ]. Michigan : University of Michigan Press, 1965.
  • 4HUGHES D,COULSON G,WALKERDINE J. Free Riding on Gnutella Revisited : the Bell Tolls?[J].IEEE Distributed Systems Online,2005,6(6), 1 - 18.
  • 5DELLAROCAS C. Analyzing the Economic Efficiency of eBay-like Online Reputation Reporting Mechanisms [C] // Proceedings of the 3rd ACM Conference on Electronic Commerce. Tampa, Florida, USA,2001 : 171 - 179,.
  • 6BETH T,BORCHERDING M, KLEIN B. Valuation of trust in open networks [C]//Proceedings of the European Symposium on Research in Computer Security ( ESORICS 1994 ). Brighton : Springer- Verlag, 1994:3 - 18.
  • 7RAHMAN A,HAILES S. A Distributed Trust Model[ C]//Proceedings of the 1997 workshop on New security paradigms. Langdale, Cumbria, U K, 1997:48 - 60.
  • 8HUGHES T, DENNY J, MUCKELBAUER P, et al. Dynamic Trust Applied to Ad Hoc Network Resources[ C] //Proceedings of Autonomous Agents & Multi-Agent Systems Conference. Melbourne, Australia, 2003.
  • 9VIRENDRA M, UPADHYAYA S. Securing Information through Trust Management in Wireless Networks[ C] //Proceedings of Workshop on Secure Knowledge Management ( SKM 2004 ). Buffalo, NY, 2004.
  • 10ZHOU L,HAAS Z J. Securing ad hoc networks[J]. IEEE Network Magazine, 1999,13 (6) :24 - 30.

同被引文献17

  • 1谭长庚,罗文燕,陈松乔,王建新.移动Ad hoc网络中节点合作性研究综述[J].计算机科学,2007,34(4):24-27. 被引量:8
  • 2Heinzelman W, Chandrakasan A, Balakrishman H.Energy efficient communication protocol for wireless microsensor networks[C]// Proc of the 33rd Hawaii International Conference on System Sci- ences.Maui:IEEE Computer Society,2000.
  • 3Heinzelman W B, Chandra K A, Bala K H.An application-specific protocol architecture for wireless micro-sensor Networks[J].IEEE Transactions on Wireless Communications, 2002,1 (4) : 660-670.
  • 4Lindsey S,Raghavendra C, Sivalingam K M.Data gathering algo- rithms in sensor networks using energy metrics[J].IEEE Trans on Parallel and Distributed Systems, 2002,13 (9) : 924-935.
  • 5Muruganathan S D, Ma D C F, Bhasin R I, et al.A centralized energy-eficient routing protocol for wireless sensor networks[J]. IEEE Communications Magazine, 2005,43 (8) : 8-13.
  • 6Crosby G V,Pissinou N,Gadze J.A framework for trust-based cluster head election in wireless sensor networks[C]//Proc of the 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems,DSSNS 2006.Piscataway:IEEE Comput- er Society, 2006:13-22.
  • 7Buchegger S, Le Boudec J Y.Performance analysis of the CON- FIDANT protocol(cooperation of nodes-Fairness in dynamic ad- hoc networks)[C]//Proceedings of the 3rd ACM International Symposium of Mobile MANET Networking and Computing,Mo- biHoc 2002, June 2002 : 80-91.
  • 8The weighted average definition[EB/OL].http://www.math-words. corrffw/weighted_average.Htm.
  • 9Momani M,Challa S,Alhmouz R.Can we trust trusted nodes in wireless sensor networks[C]//Malaysia K L.Proceedings of the International Conference on Computer and Communication Engi- neering, 2008 : 1125-1130.
  • 10YONG WEI WANG, GIRUKA V C, SINGHAL M. A fair distributed Solution for selfish nodes problem in wireless ad hoc networks [C]. //Proceedings of third international conference, ADHOC NOW 2009, Vancouver, Canada, 2009:211-224.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部