期刊文献+

利用信任模型构建安全路由协议 被引量:3

Constructing Secure Routing Protocol Using Trust Model
原文传递
导出
摘要 为在没有固定基站或中心节点的移动Ad Hoc网络中实现身份认证机制,提出了一种无需任何信任第3方认证服务器的动态信任模型.在该模型中,邻居节点间通过相互认证来建立路由信息.利用该动态信任模型组建了一个可信任的Ad Hoc网络.分析结果表明,本协议增强了网络安全性,提高了路由建立效率. To implement the authentication mechanism in mobile Ad Hoc networks with no fixed base station or central node,a new dynamic trust model without any third-party certification server is proposed.The neighbor nodes set up their routing information by mutual authenticating.The scheme constructs a dependable Ad Hoc networks using such dynamic trust model.Analysis results show that the new protocol enhances the security of network and increases the efficiency of routing.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第3期48-51,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家高技术研究发展计划项目(2007AA01Z472) 国家自然科学基金项目(60773002)
关键词 AD HOC网络 安全 动态信任模型 路由协议 认证 Ad Hoc networks security dynamic trust model routing protocol authentication
  • 相关文献

参考文献9

  • 1Komathy K, Narayanasamy P. Best neighbor strategy to enforce cooperation among selfish nodes in wireless Ad Hoc networks[J]. Computer Communications, 2007, 30 (18) : 3721-3735.
  • 2郑慧芳,蒋挺,周正.MANET增强合作模型的理论研究[J].北京邮电大学学报,2008,31(5):21-24. 被引量:3
  • 3Wang Yong, Attebury G, Ramamurthy B. A survey of security issues in wireless sensor networks[J]. IEEE Commun Surveys & Tutorials, 2006, 8(2) : 2-23.
  • 4Song Shanshan, Hwang K, Zhou Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation [ J ]. IEEE Internet Computing, 2005, 9 (6) : 24-34.
  • 5Perkins C, Belding-Royer E, Das S. RFC 3561 , Ad Hoc on-demand distance vector (AODV) routing[S], 2003.
  • 6吴劲,张凤荔,何兴高,陆庆.SIP安全机制研究[J].电子科技大学学报,2007,36(6):1211-1214. 被引量:10
  • 7Josang A. A logic for uncertain probabilities[ J]. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3) : 279-311.
  • 8Theodorakopoulos G, Baras J S, On trust models and trust evaluation metrics for Ad Hoc networks [J]. IEEE Journal on Selected Areas in Communications, 2006, 24 (2) : 318-328.
  • 9Yu Wei. Game theoretic analysis of cooperation stimulation and security in autonomous mobile Ad Hoc networks [ J ]. IEEE Trans on Mobile Computing, 2007, 6(5) : 507-521.

二级参考文献22

  • 1陈敏,杜才明.委托代理理论述评[J].中国农业银行武汉培训学院学报,2006(6):76-78. 被引量:20
  • 2ROSEN-BERG J, SCHULZRINNE H, CAMARILLO G, et al. SIP: Session initiation protocol[EB/OL]. http:// www.ietf.org/rfc/rfc3261.txt, 2002-06-05.
  • 3SALSANO S, VELTRI L. QoS control by means of COPS to support SIP-based applications[J]. IEEE Network, 2002, 16(Issue 2): 27-33.
  • 4ARKKO J, TORVINEN V, CAMARILLO G, et al. Security mechanism agreement for the session initiation protocol (SIP)[EB/OL]. http://www.ietf.org/rfc/rfc3329.txt? number= 3329, 2003-01-10.
  • 5TAT C, SENGODAN S. On applying SIP security to networked appliances[C]//Networked Appliances. Gaithersburg: IEEE 4th International Workshop on. [S. l. ]: IEEE. 2002: 31-40.
  • 6SI Duan-feng, LONG Qin, HAN Xin-hui, et al. Security mechanisms for SIP-based multimedia communication infrastructure[J]. ICCCAS, 2004, 1: 575-578.
  • 7CAMARILLO G, BLANCO G. The session initiation protocol (SIP) P-user-database private-header (P-Header) [EB/OL]. http://www.ietf.org/rfc/rfc4457.txt, 2006-04-08.
  • 8GEOFF D. TLS as the SIP security mechanism[EB/OL]. http://www.voipsa.org/pipermail/voipsee voipsa.org/2005- August/000613.html, 2005-08-06.
  • 9SALSANO S, VELTRI L, PAPALILO D. SIP security issues: the SIP authentication procedure and its processing load[J]. Network, IEEE, 2002, 16(6): 38-44.
  • 10PETERSON J, Neustar Ericsson security, S/MIME advanced encryption standard (AES) requirement for the session initiation protocol (SIP)[EB/OL]. http:// www. ietf.org/rfc/rfc3853.txt, 2004-07-03.

共引文献11

同被引文献47

  • 1王继林,伍前红,陈德人,王育民.匿名技术的研究进展[J].通信学报,2005,26(2):112-118. 被引量:16
  • 2王建新,张亚男,王伟平,卢锡城.移动自组网中基于声誉机制的安全路由协议设计与分析[J].电子学报,2005,33(4):596-601. 被引量:19
  • 3陆天波,方滨兴,孙毓忠,程学旗.点对点匿名通信协议WonGoo的性能分析[J].计算机工程,2006,32(2):26-28. 被引量:5
  • 4SICHITIU M L.Wireless mesh networks:opportunities and challenge[C] //2005 Proceedings of World Wireless Congress.San Francisco,California,2005:562-567.
  • 5AKYILDIZ I F,WANG X.Wireless mesh networks:a survey[J].Computer Networks,2005,47(5):445-487.
  • 6HU Y C,PERRIG A.A survey of secure wireless ad hoc routing[J].IEEE Security and Privacy,2004,2(3):28-39.
  • 7DING Xuyang,LUO Huiqiong.Trust evaluation based reliable routing in wireless mesh network[C] //2007International Conference on Wireless Communications,Networking and Mobile Computing,WiCom 2007,2007:2294-2297.
  • 8JOSANG A,GRAY E,KINATEDER M.Simplification and analysis of transitive trust networks[J].Web Intelligence and Agent Systems Journal,2006,4(2):139-161.
  • 9MARITI S,GUILI T,LAI K,BAKER M.Mitigating routing misbehavior in mobile ad hoc networks[C] //2000 International Conference on Mobile Computing and Networking,MobiCom,August 2000:255-265.
  • 10BUCHEGGER S,BOUDEC J Y.Performance analysis of the confidant protocol (cooperation of nodes:fairness in dynamic ad-hoc networks)[C] // 2002IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing,June 2002:226-236.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部