期刊文献+

增强ad hoc网络可生存性的健壮多维信任模型 被引量:12

Robust multi-dimensional trust model for improving the survivability of ad hoc networks
下载PDF
导出
摘要 针对目前攻击者可以结合多种攻击手段对ad hoc网络进行复合攻击的现状,提出了一种健壮的多维信任模型(RMTM)以增强ad hoc网络的可生存性。RMTM基于D-S证据理论,将节点的攻击证据分成多个维度,每个维度的信任根据基本信度分配函数计算,并通过多维信任融合实现对节点的综合评价。同时,为了应对攻击者对信任模型本身进行攻击,设计了相应容忍算法以提高RMTM的健壮性。仿真实验验证了RMTM可在较低系统开销内有效防御ad hoc网络复合攻击和信任模型攻击,进而大幅度地增强了ad hoc网络可生存性。 Attackers could perform the blended attack against ad hoc networks through utilizing several attack methods together.Under this circumstance,a robust multi-dimensional trust model(RMTM) to improve the survivability of ad hoc networks was proposed.RMTM was based on D-S theory.Nodes' attack evidences were classified into several dimen-sions and the trust of each dimension was computed according to basic probability assignment function.Then RMTM implemented the comprehensive evaluation through the multi-dimensional trust fusion.In order to resist the attacks against trust models themselves,the corresponding tolerant algorithms were designed to enhance the RMTM's robustness.The simulations show that RMTM can effectively defense against both ad hoc network blended attack and trust model attacks with limited overload and consequently it significantly improves the survivability of ad hoc networks.
出处 《通信学报》 EI CSCD 北大核心 2010年第5期1-9,共9页 Journal on Communications
基金 国家自然科学基金资助项目(60773135 90718007 60970140) 国家高技术研究发展计划("863"计划)基金资助项目(2007AA01Z427 2007AA01Z450)~~
关键词 ad HOC网络 信任模型 可生存性 D-S证据理论 RMTM ad hoc networks trust model survivability D-S theory RMTM
  • 相关文献

参考文献21

  • 1HU Y C,PERRIG A,JOHNSON D B.Rushing attacks and defense in wireless ad hoc network routing protocols[A].Proceedings of the 2003 ACM workshop on Wireless Scettrity[C].2003.30-40.
  • 2HU Y C,PERRIG A,JOHNSON D B.Ariadne:a secure on-demand muting protocol for ad hoc networks[J].Wireless Networks,2005,11(1):21-38.
  • 3CARVALHO M.Security in mobile ad hoc networks[J].IEEE Security & Privacy,2008,6(2):72-75.
  • 4DJENOURI D,KHELLADI L,BADACHE A N.A survey of security issues in mobile ad hoc and sensor networks[J].IEEE Communications Surveys & Tutorials,2005.7(4):2-28.
  • 5MARTI S,GIULITJ,LAIK et al.Mitigating muting misbehavior in mobile ad hoc networks[A].Proceedings of the 6th Annual Intemational Conference on Mobile Computing and Networking[C].2000.255-265.
  • 6BUCHEGGER S,BOUDEC J Y L.Performance analysis of the confidant protocol[A].Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing[C].2002.226-236.
  • 7MICHIARDI P,MOLVA R CORE:a collaborative reputation mechanism to enforce node cooperation mobile ad hoc networks[A].Proceedings of the IFIPTC6/TC11 Sixth Joint Working Conference On Communications and Multimedia Security[C].2002.107-121.
  • 8OLIVIERO F,ROMANO S P.A reputation-based metric for secure routing in wireless mesh networks[A].IEEE Global Telecommunications Conference[C].2008.1-5.
  • 9BALAKRISHNAN V,VADHARAJAN V,TUPAKULA U.Subjective logic based trust model for mobile ad hoc networks[A].Proceedings of the 4th Intemational Conferece on Security and Privacy in Communication Netowrks[C].2008.1-11.
  • 10BALAKRISHNAN V,VARADHARAJAN V,TUPAKULA U,et al.Team:trust enhanced security architecture for mobile ad hoc networks[A].Proceedings of the 15th IEEE Intemational Confereace on Networks[C].2007.182-187.

同被引文献137

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 3刘夫云,祁国宁,车宏安.复杂网络中简单路径搜索算法及其应用研究[J].系统工程理论与实践,2006,26(4):9-13. 被引量:24
  • 4BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[ C]//Proc of the 17th Symposium on Security and Privacy. 1996.
  • 5BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open networks[C]//Proc of European Symposium on Research in Computer Security. 1994:3-18.
  • 6JφSANG A. Prospectives for modeling trust in information security [ C ]//Proc of Australian Conference on Information Security and Privacy. [ S. l. ]: Springer-Verlag,1997.
  • 7WANG Yao, VASSILEVA J. Bayesian network-based trust model [C]//Proc of IEEE/WIC International Conference on Web Intelligence. Washington DC: IEEE Computer Society,2003.
  • 8EllisonRJ,FisherDA,LingerRC,etal.Survivablenetworksystems:Anemergingdiscipline.SoftwareEngineeringInstitute,CarnegieMellonUniversity,Pittsburgh,Pennsylvania,USA:TechnicalReportADA341963,1997.
  • 9PietroRD,VerdeNV.Introducingepidemicmodelsfordatasurvivabilityinunattendedwirelesssensornetworks//Proceedingsofthe2011IEEEInternationalSymposiumonaWorldofWireless,MobileandMultimediaNetworks(WOWMOM2011).Lucca,Italy,2011:16.
  • 10AzniAH,AhmadR,NohZ.SurvivabilitymodelingandanalysisofmobileAdHocnetworkwithcorrelatednodebehavior.ProcediaEngineering,2013,53:435440.

引证文献12

二级引证文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部