期刊文献+

可信路由机理及关键技术 被引量:3

Research on Theory and Key Technologies of Trustworthy Routing
下载PDF
导出
摘要 文章认为由于网络规模的增大以及节点移动、多宿主、网络流量工程等需求的不断增强,使得路由可扩展性、安全性、可靠性等问题凸显。尽管与可信路由相对应的理论技术方案不断提出,但未能从根本上解决网络路由的可信任问题。为此文章提出可信路由体系结构模型、可信域内路由、可信域间路由等新网络环境下的可信路由参考机制,并对可信路由涉及的关键技术,如映射可扩展技术、路由信任机制、多径路由技术、服务质量保证、路由监测管理技术,进行了研究和探讨。 Due to the increasing network size and the wide use of mobility, multi-homing and traffic engineering, some serious problems such as routing scalability, routing security and routing reliability, arise in the routing system. In spite of many theories and technologies proposed to address the problems, the issues associated with trustworthy routing still could not be solved fundamentally. Therefore, we present a trustworthy routing architecture model, and introduce the reference trustworthy routing mechanisms used in the inner-domain and among inter-domains individually. Meanwhile, several key technologies for trustworthy routing in the new network environment are discussed in this paper, including mapping scalability, routing trust schemes, multipath routing, quality assurance of services, and routing monitoring and management
出处 《中兴通讯技术》 2009年第6期13-17,共5页 ZTE Technology Journal
基金 国家重点基础研究发展规划("973"计划)课题(2007CB307100)
关键词 可信路由 路由理论 网络架构 路由技术 trustworthy routing routing theory network architecture, routing technology
  • 相关文献

参考文献10

  • 1FIND:future Internet network design. http://find.isi.edu . 2009
  • 2FIRE:Future Internet research&experimentation. http://cordis.europa.eu/fp7/ict/fire/home_en.html . 2009
  • 3MEYER D,ZHANG L,FALL K.Report from the IAB workshop on routing and addressing[].IETF RFC.2007
  • 4RRG:Routing Research Group. http://tools.ietf.org/group/irtf/trac/wiki/RoutingResearchGroup . 2009
  • 5CAESAR M,CONDIE T,KANNAN J,et al.ROFL:Routing on flat labels[].Proceedings of the Conference on ApplicationsTechnologiesArchitecturesand Protocols for Computer Communications(SIGCOMM‘).2006
  • 6ANDERSEN D G,BALAKRISHNAN H,FEAMSTER N,et al.Accountable Internet Protocol(AIP)[].Proceedings of Conference on ApplicationsTechnologiesArchitecturesand Protocols for Computer Communications(SIGCOMM’).2008
  • 7SHAND M,BRYANT S.IP fast-reroute framework. http://tools.ietf.org/html/draft-ietf-rtgwg-ipfrr-framework-06 . 2009
  • 8KYALBEIN A,HANSEN A F,CICIC T,et al.Fast IP network recovery using multiple Routing Configurations[].Proceedings ofth IEEE International Conference on Computer Communications(INFOCOM’).2006
  • 9XU Wen,REXFORD J.MIRO:Multi-path Interdomain Routing[].Proceedings of the Conference on ApplicationsTechnologiesArchitecturesand Protocols for Computer Communications(SIGCOMM‘).2006
  • 10YANG Xiaowei,WETHERALL D.Source selectable path diversity via routing deflections[].Proceedings of the Conference on ApplicationsTechnologiesArchitecturesand Protocols for Computer Communications(SIGCOMM‘).2006

同被引文献34

  • 1Ellison R J, Moore A P. Trustworthy refinement through intrusion-aware design: An overview [C]// The 3rd Annual High Confidence Software and Systems Conference, Baltimore, MD, USA, 2003.
  • 2Yan Sun, Wei Yu, Zhu Han, et al. Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks [J]. Journal on Selected Areas in Communications (S0733-8716), 2006, 24(2): 305-317.
  • 3He R, Niu J W, Zhang G W. CBTM: A trust model with uncertainty quantification and reasoning for pervasive computing [M]. Parallel and Distributed Processing and Applications (S0302-9743), 2005: 541-552.
  • 4A Tajeddine, A Kayssi, Ali Chehab. Fuzzy reputation-based trust model [J]. Applied Soft Computing (S1568-4946), 2011, 11(1): 345-355.
  • 5Mieso K Denko, Tao Sun, Isaac Woungang. Trust management in ubiquitous computing: A Bayesian approach [J]. Computer Communications (S0140-3664), 2011, 34(3): 398-406.
  • 6Marcela Mejia, Nestor Pena, Jose L Munoz, et al. A game theoretic trust model for on-line distribute devolution of cooperation in MANETs [J]. Journal of Network and Computer Applications (S1084-8045), 2011, 34(1): 39-51.
  • 7Wang X, Cheng H, Huang M. Multi-robot navigation based QoS routing in self-organizing networks [J]. Engineering Applications of Artificial Intelligence (S0952-1976), 2013, 26(1): 262-272.
  • 8Hu Z, Zhou L, Gui Z. Delay-bandwidth constrained QoS unicast routing algorithms considering uncertain information [C]// Proceedings of ICC'05. Piscataway, USA: IEEE Inc, 2005: 229-232.
  • 9Xue G L, Arunabha Sen, Zhang W Y, et al. Finding a path subject to many additive QoS constraints [J]. IEEE/ACM Transactions on Networking (S1063-6692), 2007, 15(1): 201-211.
  • 10Cohen A, Korach E, Last M, et al. A fuzzy-based path ordering algorithm for QoS routing in non-deterministic communication [J]. Fuzzy Sets and Systems (S0165-0114), 2005, 150(3): 401-417.

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部