期刊文献+

Trust Evaluation Model Based on Behavior Space Classification for Ad Hoc Networks 被引量:1

Trust Evaluation Model Based on Behavior Space Classification for Ad Hoc Networks
原文传递
导出
摘要 Trust management frameworks are used to evaluate and manage trust relationships between network nodes and enhance network security. However, trust management frameworks themselves are vulnerable to attacks. Attacks against trust management frameworks are described in this paper with a trust management framework to resist them. The trustworthiness between nodes is evaluated to classify node behavior using a three-dimensional classifier based on a fuzzy integral. Different behaviors are mapped to different behavioral spaces to detect malicious nodes and identify their behavior types. The security of ad hoc networks is then improved by various measures to handle different types of malicious behavior. Simula- tions of the model on the System In The Loop (SITL) platform show that this trust management framework can separate normal nodes and malicious nodes and can distinguish different types of malicious nodes. Trust management frameworks are used to evaluate and manage trust relationships between network nodes and enhance network security. However, trust management frameworks themselves are vulnerable to attacks. Attacks against trust management frameworks are described in this paper with a trust management framework to resist them. The trustworthiness between nodes is evaluated to classify node behavior using a three-dimensional classifier based on a fuzzy integral. Different behaviors are mapped to different behavioral spaces to detect malicious nodes and identify their behavior types. The security of ad hoc networks is then improved by various measures to handle different types of malicious behavior. Simula- tions of the model on the System In The Loop (SITL) platform show that this trust management framework can separate normal nodes and malicious nodes and can distinguish different types of malicious nodes.
出处 《Tsinghua Science and Technology》 EI CAS 2012年第2期179-185,共7页 清华大学学报(自然科学版(英文版)
基金 Supported by the National Natural Science Foundation of China (No.60972016)
关键词 ad hoc networks trust routing behavior space fuzzy integral System In The Loop (SITL) ad hoc networks trust routing behavior space fuzzy integral System In The Loop (SITL)
  • 相关文献

参考文献14

  • 1Buchegger S,Boudec J L.Self-policing mobile ad hoc networks by reputation systems.IEEE Communications Magazine,2005,43(7):101-107.
  • 2Li J,Li R,Kato J.Future trust management framework for mobile ad hoc networks.IEEE Communications Magazine,2008,46(4):108-114.
  • 3Buchegger S,Boudec J L.A robust reputation system for P2P and mobile ad-hoc networks.In:Proc.P2PEcon2004.Harvard Univ.,Cambridge,MA,2004:245-252.
  • 4Ganeriwal S,Srivastava M.Reputation-based framework for high integrity sensor networks.In:Proc.ACM Wksp.Sec.Ad Hoc and Sensor Networks.Washington,DC,USA,2004:178-185.
  • 5Marti S,Giuli T,Lai K,et al.Mitigating routing misbe-havior in mobile ad hoc networks.In:Proc.MobiCom.Boston,USA,2000:255-265.
  • 6Sun Y L,Han Z,Yu W,et al.A trust evaluation framework in distributed networks:Vulnerability analysis and defense against attacks.In:25th IEEE International Conference on Computer Communications.Orlando,FL,USA,2008:1-13.
  • 7Sun Y L,Zhu H,Liu K.Defense of trust management vul-nerabilities in distributed networks.IEEE Communications Magazine,2009,46(2):112-119.
  • 8Theodorakopoulos G,Baras S.On trust models and trust evaluation metrics for ad hoc networks.IEEE Journal on Selected Areas in Communications,2008,26(2):318-328.
  • 9Zouridaki C.A quantitative trust establishment framework for reliable data packet delivery in MANETs.In:Proc.the 3rd ACM Wksp.Sec.Ad Hoc and Sensor Networks.Alexandria,VA,USA,2005:475-481.
  • 10Sun Y,Yu W,Han Z.Information theoretic framework of trust modeling and evaluation for ad hoc networks.IEEE Journal on Selected Areas in Communications,2006,24(1):305-317.

同被引文献17

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部