期刊文献+

一种Ad Hoc网络中信任管理模型的研究与设计

Research and Design of a Trust Management Model in Ad Hoc Networks
下载PDF
导出
摘要 Ad Hoc网络的安全性是当前网络安全问题的研究热点,建立合理的信任管理模型是Ad Hoc网络安全的首要问题。文章分析了Ad Hoc网络的特点和它所面临的安全挑战,引入信任管理的概念,给出了一种新颖的基于主观信任的Ad Hoc网络信任管理模型,为建立安全的Ad Hoc网络提供了新的解决方法。 The security of Ad Hoc networks is a research hotspot of current network security problems,and building proper trust management model is a chief problem of Ad Hoc networks security.We analyze the characteristics of Ad Hoc networks and security challenge it faces,introduce the concept of trust management,give a new trust management model based on subjective trust for Ad Hoc networks,which provides a new solution for establishing safe Ad Hoc networks.
作者 张大雷
出处 《计算机时代》 2011年第3期44-46,共3页 Computer Era
关键词 AD HOC 信任 信任管理 模型 Ad Hoc trust trust management model
  • 相关文献

参考文献10

  • 1Elizabeth, M Royer. A Review of Current Routin Protocols for Ad Hoc Mobile Wireless Networks[J].IEEE Personal Communication, 1999.4(2):46.
  • 2Watts D J. Collective Dynamics of Small World Networks[J].Nature, 1998.393(6):440-442.
  • 3Josang A. Trust-Based decision making for electronic transactions. In: Proceedings of the 4th Nordic Workshop on Secure Computer Systems(NORDSEC′99), 1999.
  • 4Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Dale, J.,Dinolt, G.,eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland,CA:IEEE Computer Society Press,1996:164-173.
  • 5Abdul-Rahman A, Hailes S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop.Cumbria. UK:ACM Press,1998:48-60.
  • 6BethT, Borcherding, MKleinB. Valuation of trust in open networks [C].Proceedings of the European Symposium on Research in Security (ESORICS), Brighton: Springer-Verglag.,1999:59-63.
  • 7Josang A, Knapskog S.I, A Metric for Trusted Systems, Global IT Security[M].Wierr Austrian Computer Society,1998:541-549.
  • 8周海刚,肖军模.Ad hoc网络安全模型的研究[J].解放军理工大学学报(自然科学版),2002,3(3):5-8. 被引量:10
  • 9孙利荣,蒋泽军,王丽芳.Ad hoc网络信任模型的研究[J].微电子学与计算机,2004,21(10):161-164. 被引量:1
  • 10张胜,徐国爱,胡正名,杨义先.Ad hoc网络信任模型的研究[J].计算机应用研究,2005,22(12):100-102. 被引量:6

二级参考文献15

  • 1L Zhou, Z Haas. Securing Ad hoc Networks[J]. IEEE Network, 1999, 13(6): 24-30.
  • 2J Kong, P Zerfos, H Luo, et al. Providing Robust and Ubiquitous Security Support for Mobile Ad hoc Networks[C]. Proc. 9th Intl Conf. Network Protocols (ICNP), 2001.
  • 3A Shamir. How to Share a Secret[C]. Communications of ACM, 1979.
  • 4A Shamir. Identity-base Cryptosystems and Signature Schemes[J]. Proc. of Crypto84, Lecture Notes in Computer Science, Springer-Verlag, 1984, 196:47-53.
  • 5J H Silverman. The Arithmetic of Elliptic Curves[J]. Graduate Texts in Mathematic, Springer-Verlag,1986,106:96-99.
  • 6D Boneh,M Franklin. Identity-based Encryption from the Weil Pairing[C].Proc. Crypto 2001,LNCS,Springer-Verlag,2001.213-229.
  • 7F Hess. Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairing[EB/OL]. http://epring.iacr.org,2002.
  • 8K Paterson. ID-based Signatures from Pairing on Elliptic Curves[EB/OL]. http://epring.iacr.org,2002.
  • 9A Abdul-Rahman and S Hailes. A distributed trust model. ACM New Security Paradigms Wortshop. 1997.
  • 10R Perlman. An overview of PTI trust model. IEEE Networt. 12.1999.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部