期刊文献+

基于MANET可用性的信任度量模型 被引量:5

Availability based trust evaluation model for MANET
下载PDF
导出
摘要 提出并设计了基于可用性的信任度量模型(ABTEM,availability based trust evalua tion model),在此基础上可以构建多种针对可用性的安全服务。网络模拟实验的结果证明,将ABTEM应用于DSR路由协议时,在路由层能够成功地根据其恶意行为发现网络中的恶意节点,并且进一步孤立这些恶意节点,从而避免网络继续受到恶意节点的侵害,显著提高了MANET系统的可用性。 ABTEM was presented, an availability based trust model, and many availability oriented security service can be obtained based on this model. The performance results show that malicious nodes can be successfully discovered in accordance with its malicious acts in the routing layer when apply ABTEM on the DSR protocol. Furthermore malicious nodes can be isolated to protect the network from the attack of them, and which will significantly increases system avail- ability.
出处 《通信学报》 EI CSCD 北大核心 2010年第3期82-88,共7页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2010CB328000) 国家高技术研究发展计划("863"计划)基金资助项目(2007AA040701-1)~~
关键词 MANET 可用性 信任度量 DSR协议 mobile ad hoc network availability trust evaluation DSR protocols
  • 相关文献

参考文献14

  • 1DJENOURI D, KHELLADI L, BADACHE A N. A survey of security issues in mobile ad hoc and sensor networks[J]. IEEE Communications Surveys & Tutorials, 2005, 7(4):2-28.
  • 2ZHOU L D, ZYGMUNT J H. Securing ad hoc networks[J]. IEEE Network, 1999, 13(6):24-30.
  • 3CAPKUN S, BUTTYAN L, HUBAUX J E Self-organized public-key management for mobile ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2003, 2(1):52-64.
  • 4YI S, KRAVETS R. MOCA: mobile certificate authority for wireless ad hoc networks[A]. The 2nd Annual PKI Research Workshop (PKI 03)[C]. USA, 2003.65-79.
  • 5PIRZADA A A, MCDONALD C. Establishing trust in pure ad hoc networks[A]. Proceedings of the 27th Australasian Conference on Computer Science[C]. Australia, 2004.47-54.
  • 6ESCHENAUER L, GLIGOR V D, BARAS J. On trust establishment in mobile ad-hoc networks [J]. Security Protocols, 2004, 2845:47-62.
  • 7AZZEDIN F, MAHESWARAN M. Evolving and managing trust in grid computing systems[A]. IEEE Ccec 2002: Canadian Conference on Electrcial and Computer Engineering, Vols 1-3, Conference Proceedings[C]. Canadian, 2002.1424-1429.
  • 8ABDUL-RAHMAN A, HAILES S. A distributed trust model[A]. Proe of the 1997 New Security Paradigms Workshop[C]. New York, 1998. 48-60.
  • 9BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[A]. Proc of the European Symp on Research in Security[C]. Berlin, 1994.3-18.
  • 10JOSANG A. A subjective metric of authentication[A]. Computer Security-Esorics 98[C]. 1998. 329-344.

同被引文献32

  • 1朱晓妍,伍前红,王育民.移动Ad hoc网络安全策略[J].网络安全技术与应用,2004(1):22-25. 被引量:6
  • 2唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 3Manikandan S P, Manimegalai R.Survey on mobile Ad Hoc network attacks and mitigation using routing protocols[J]. American Journal of Applied Sciences, 2012,9 ( 11 ) : 1796-1801.
  • 4Manjre B M,Gulhane V A.Seeure and reliable Ad-Hoc on demand multipath distance vector routing protocol for mobile Ad Hoe networks[C]//2011 International Conference on Information and Network Technology,2011.
  • 5Kamboj D, Sehgal P K.A comparative study of various secure routing protocols based on AODV[J].Internati0nal Journal of Advanced Computer Science and Applications, 2011,2(7) :80-85.
  • 6Vanaparthi R, Pragati G.Routing protocols to enhance security in MANETS[J].Global Journal of Computer Science and Technology, 2011,11 ( 13 ).
  • 7Liu Jinghua, Geng Peng, Qiu Yingqiang, et al.A secure rout- ing mechanism in AODV for Ad Hoe networks[C]//Proceed- ings of 2007.International Symposium on Intelligent Signal Processing and Communication System,2007.
  • 8Balfe S, Yan P W, Paterson K G.A guide to trust in mobile Ad Hoe networks[J].Security and Communication Networks, 2009.
  • 9Sukumaran S, Jaganathan V.Reputation based on demand routing protocol using mobile agent in mobile Ad-Hoc net- works[C]//International Conference on Wireless Communica- tion and Sensor Computing(ICWCSC),2010.
  • 10Ghosh T, Pissinou N, Makki K.Collaborative trust-based secure routing against colluding malicious nodes in multi-hop Ad Hoc networks[C]//Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN' 04), 2004.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部