期刊文献+

状态行为关联的可信网络动态信任计算研究 被引量:3

Study on dynamic trust metric of trusted network based on state and behavior associated
下载PDF
导出
摘要 综合实体状态和行为因素,提出一种可信网络动态信任模型。通过进行实体的状态行为关联分析,提取信任信息,深入分析信任与状态和行为之间的关系,并提出基于状态行为关联的实体动态信任计算方法。仿真表明,所提出的信任模型提供实时动态信任,能够有效地发现和处理动态恶意实体策略性的行为改变和恶意攻击。为网络安全机制制定智能安全策略提供一定参考,提高网络可信性能。 Intergrated the factors that state and behavior of entities,a new dynamic trust model of trusted network was proposed.The trust information was obtained through the associated analysis of state and behavior of entities.The rela-tion of trust,state and behavior of the entities was also studied,and a new dynamic trust measurement of trusted network was proposed.The simulation results show that the new trust model has advantages in providing real-time dynamic trust.It is highly effective in countering malicious entities regarding strategic altering behavior and malicious attack,presenting better choice in task assignment in the network,providing help to make the secure police for the network security,and enhancing trustworthily of network.
出处 《通信学报》 EI CSCD 北大核心 2010年第12期12-19,共8页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB310704) 国家自然科学基金资助项目(90718001)~~
关键词 可信网络 有限自动机 动态信任 状态行为关联 灰色关联 trusted network finite automatic machine dynamic trust state and behavior associated grey correlation
  • 相关文献

参考文献17

  • 1BLAZE M,FEIGENBAUM J,LACY J.Decentralized trust management[A].Proceedings of the Symposium on Security and Privacy[C].Oakland,USA,1996.164-173.
  • 2BLAZE M,FEIGENBAUM J,STRAUSS M.Compliance checking in the policymaker trustmanagement system[A].Proceedings of the Second International Conference on Financial Cryptography Table of Contents[C].Springer-Verlag London,UK,1998.254-274.
  • 3LIK MUI.Computational Models of Trust and Reputation:Agents,Evolutionary Games,and Social Networks[D].Department of Electrical Engineering and Computer Science,Massachusetts Institute of Technology,2002.
  • 4CAHILL V,GRAY E,SEIGNEUR J,et al.Using trust for secure collaboration in uncertain environments[A].IEEE Pervasive Computing Mobile and Ubiquitous Computing[C].2003.52-61.
  • 5QUCERCIA D,HAILES S.MATE:mobility and adaptation with trust and expected-utility[J].International Journal Internet Technology and Secured Transactions (IJITST),2006,1(1):43-53.
  • 6KAMVAR D,SCHLOSSER M T,GARCIA-MOLINA H.The eigentrust algorithm for reputation management in P2P networks[A].Proceedings of the 12th International Conference on World Wide Web[C].New York,NY,USA,2003.640-651.
  • 7DAMIANI E,VIMERCATI D C D,PARABOSCHI S.A reputation-based approach for choosing reliable resources in peer-to-peer networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington,DC,USA,2002.207-216.
  • 8KINATEDER M,ROTHERMEL K.Architecture and algorithms for a distributed reputation system[A].Proceedings of the First International Conference on Trust Management:iTrust'03[C].Heraklion,Crete,Greece,2003.1-16.
  • 9GUPTA M,JUDGE P,AMMARR M.A reputation system for peer to peer networks[A].Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video Monterey[C].CA,USA,2003.144-152.
  • 10BUCHEGGER S,BOUDEC J Y L.A robust reputation system for mobile ad-hoc networks[EB/OL].http://www.mics.org/getDoc.php?docid= 596& docnum=1.

二级参考文献54

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Floyd S. High-Speed TCP for large congestion windows. RFC3649, 2003.
  • 4DataTAG. http://datatag.web.cern.ch/datatag/networking.html
  • 5Corson MS. Internet-Based mobile ad hoc networking. IEEE Internet Computing, 1999. 63-70.
  • 6Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38:393-422.
  • 7Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: Scalable coordinate in sensor network. In: Proc. of the 5th ACM/IEEE Int'l Conf. on Mobile Computing and Networking. 1999. 263-270.
  • 8Saltzer H, Reed DP, Clark D. End to end argument in system design. ACM Trans. on Computing System, 1984,2(4):277-288.
  • 9Tennenhouse DL, Wetherall D. Towards an active network architecture. Computer Communication Review, 1996,26(2):21-28.
  • 10Yemini Y, Silva S. Towards programmable networks. In: Proc. of the IFIP/IEEE Int'l Workshop on Distributed Systems:Operations and Management. 1996.

共引文献314

同被引文献26

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部