期刊文献+

一种Ad Hoc中基于拓扑变换的改进信任度估计模型 被引量:1

An Improved Trust Evaluation Model Based on Topology Transformation for Ad Hoc Networks
下载PDF
导出
摘要 针对无线Ad Hoc网络中虚假推荐对信任度准确性造成的恶意影响的问题,提出了一种基于拓扑变换的信任度估计模型.分析与仿真结果表明,该模型的全局信任度具有迭代收敛性,加载此抵御虚假推荐的信任模型能更有效地激励节点协作,分组成功接收率和平均丢包数都有一定改善,同时更适合较大规模的网络. In term of the influence of fake recommendation on the accuracy of recommendation trust in wire less Ad Hoc networks, a trust model based on topology transformation was proposed. Mathematic analyses and simulations results reveal that the proposed trust model has convergence characteristic, the fake recommendation-resisted model performs better in terms of packet successful delivery ratio and mean num- ber of packets dropped. Meanwhile, this enhanced trusted model is more suitable for large scale networks.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2011年第8期1230-1235,共6页 Journal of Shanghai Jiaotong University
基金 国家重点基础研究发展规划(973)项目(2011CB302903) 国家自然科学基金资助项目(60873231) 江苏省高校自然科学研究重点项目(10KJA510035) 南京邮电大学引进人才科研启动基金资助项目(NY209016) 南京邮电大学宽带无线通信与传感网技术教育部重点实验室开放研究基金资助项目(NYKL201107)
关键词 拓扑变换 信任模型 AD HOC网络 topology transformation trust model mobile Ad Hoc networks
  • 相关文献

参考文献9

  • 1Zhou Run-fang, Hwang Kai. Power trust: A robust and scalable reputation system for trusted peer-to-peer computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473.
  • 2Zhang Ming-wu, Yang Bo, Qi Yu, et al. Using trust metric to detect malicious behaviors in WSNs [C]// Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Qingdao, China: IEEE Computer Society Press, 2007:104-108.
  • 3李柏岩,姚文胜,尤晋元.基于信任逻辑的PKI互通信任模型形式化[J].上海交通大学学报,2004,38(z1):154-158. 被引量:1
  • 4Kamvar S D, Sehlosser M T. EigenRep: Reputation management in P2P networks [C]//Proceedings of the 12th International World Wide Web Conference. Budapest: ACM Press, 2003: 123-134.
  • 5孙知信,唐益慰.基于全局信任度的多层分组P2P信任模型[J].通信学报,2007,28(9):133-140. 被引量:21
  • 6Wang Kun, Wu Meng. A trust approach for node cooperation in MANET[C]// Proceedings of the 3rd International Conference on Mobile Ad-hoc and Sensor Network. Beijing, China: Springer Press, LNCS 4864, 2007: 481-491.
  • 7Levien R, Aiken A. Attack-resistant trust metrics for public key certification [C]// Proceedings of the 7th USENIX Security Symposium. San Antonio, TX: USENIX Association, 1998.. 229-242.
  • 8Mui L. Computational models of trust and reputation: Agents, evolutionary games, and social networks [D]. USA: MIT, 2003.
  • 9Buchegger S, Le Boudec J Y. Performance analysis of the CONFIDANT protocol (Cooperation of Nodes-Fairness in Dynamic Ad-Hoc NeTworks) [C]// Proceedings of the 3rd ACM International Symposium of Mobile MANET Networking and Computing. San Antonio, TX: ACM Press, 2002: 80-91.

二级参考文献24

  • 1[1]Steve L, David F, Richard L, et al. CA-CA interoperability [EB/OL]. http://www. pkiforum. org/pdfs/ca-ca-interop. pdf, 2001-05-01.
  • 2[2]Perlman R. An overview of PKI trust models [J].IEEE Network, 1991,3(6): 38- 43.
  • 3[3]Moses T. Trust management in the public key infrastructure [EB/OL]. http://www. entrust. com/resources/pdf/trustmodels. pdf, 2002- 06- 03.
  • 4[4]Bakkali H E, Kaitouni B I. A logic-based reasoning about PKI trust model [A]. Proceedings of Sixth IEEE Symposium on Computers and Communications [C]. Hammamet: IEEE Press, 2001.42- 48.
  • 5[5]Kohlas R, Maurer U. Reasoning about public-key certification: on bindings between entities and public keys [J]. IEEE Journal on Selected Areas in Commu nications, 2000,18 (4): 551 - 560.
  • 6[6]Burrows M, Abadi M, Needham R. A logic of authentication [J]. ACM Transactions on Computer Systems, 1990,8(1): 18- 36.
  • 7[7]Abadi M, Burrows M, Lampson B, et al. A calculus for access control in distributed systems [J]. ACM Transactions on Programming Languages and Systems, 1993,15(4): 706- 734.
  • 8[8]Lampson B, Abadi M, Burrows M, et al. Authentication in distributed systems: theory and practice [J]. ACM Transactions on Computer Systems, 1992,10(4) :256- 310.
  • 9[9]Howell J, Kotz D. A formal semantics for SPKI[R].Hanover : Dartmouth College, 2000. TR2000- 363.
  • 10[10]Grandison T, Sloman M. A survey of trust in Internet applications[J]. IEEE Communications Surveys,2000,4(4) :2-16.

共引文献20

同被引文献10

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部