期刊文献+

基于等级评价的VANET信任模型 被引量:4

Trust Model based on Graded Evaluation in VANET
原文传递
导出
摘要 信任管理成为车载自组织网络(VANET)应用的重要问题。针对该问题提出一种基于角色和事件信任等级评价的信任模型,结合以往方法的直接信任和邻居节点推荐信任的基础上,引入节点角色和事件等级并分配相应权重,综合判定信息是否可信。信任值计算采用角色信任等级评价的方法,受评价节点信任等级的影响,在一定程度上降低恶意节点共谋攻击,恶意评价。仿真后证明,该方法在安全性能、过滤恶意节点、降低系统开销等几个方面有较好表现,进一步加强了VANET网络环境中对恶意节点和恶意信息的识别和过滤,更有效地进行信息传递。 Trust management gradually becomes an urgent problem in the applications of VANET.This paper proposes a new trust model based on graded evaluation of the event and role,and in combination of the traditional direct trust with recommend trust,the concept of graded event and node role is introduced in VANET,including the corresponding assigned weight,and thus the comprehensive evaluation of trust value could be done.Due to the influence of the event and node trust grade,the evaluation of conspiracy attack and malicious evolution by misbehaved nodes might be reduced in some degree.The simulation result shows that the proposed model has a good performance in security,filtering of the misbehaved nodes reduction of the system cost and so on,thus further strengthening the recognization and filtering of malicious information and misbehaved nodes,and realizing the effective propagation of information.
作者 倪妍
出处 《通信技术》 2012年第11期26-29,33,共5页 Communications Technology
关键词 车载自组织网 信任管理 信任评价 事件等级 角色等级 VANET trust management trust evalution event grade role grade
  • 相关文献

参考文献7

二级参考文献70

  • 1毕文伟,王连威,毕文辉.仪器仪表可靠性分析方法[J].仪器仪表用户,2004,11(6):86-88. 被引量:9
  • 2Corson S, Macker J. Mobile protocol performance issues ad hoc networking(MANET):Routing and evaluation considerations[R]. University of Maryland: Naval Research Laboratory, 1999 http://www.faqs. org/rfcs/rfc2501, html
  • 3Macker J, Corson S. Mobile Ad Hoc Networking and the IETF[J]. Mobile Computing and Communications Review, 1998, 2(01): 9-14. http://citeseer. ist. psu. edu/macker98mobile. html.
  • 4Mauve M, Widmer J, Hartenstein H.A survey on positionbased routing in mobile ad hoc networks[J].IEEE Network Magazine, 2001,15(06):31-39.
  • 5Hong Xiaoyan, Xu Kaixin, Gerla M. Scalable routing protocols for mobile ad hoc networks[J].IEEE Network magazine, 2002,7-8: 10-21.
  • 6Camp T, Boleng J, Williams B. Performance comparison of two location based routing protocols for ad hoc networks[M]. New York:The IEEE INFOCOM, 2002:1678 - 1687.
  • 7Singer D. A fuzzy set approach to fault tree and reliability analysis[J]. Fuzzy Sets and Systems, 1990,34(02):145-155.
  • 8Singer D. Fault tree analysis based on fuzzy logic[J]. Computers & Chemical Engineering, 1990,14(03):259-266.
  • 9Sallak M, Simon C, Aubry ,J F. A fuzzy probabilistic approach for determining safety integrity leve[J]. IEEE Transactions on Fuzzy Systems, 2007.
  • 10Tornatore M, Maier G, Pattavina A. Availability design of optical transport networks[J]. Selected Areas in Communications, IEEE Journal on Volume 23, Issue 8, 2005:1520-1532.

共引文献13

同被引文献29

  • 1马金伟,江冰.基于GPS/GPRS的车载卫星定位系统的研究[J].计算机测量与控制,2006,14(12):1676-1679. 被引量:18
  • 2Dotzer F,Fischer L,Magiera P.VARS:a vehicle Ad-Hoc net-work reputation system [A].Proceedings of the Sixth IEEE Inter-national Symposium on World of Wireless Mobile and Multimedia Networks [C].IEEE Computer Society.2005:454-456.
  • 3Zouridaki C,Mark B L,Hejmo M,et al.Robust cooperative trust establishment for MANETs [A].Proceedings of SASN' 06 [c].2006.
  • 4Raya M,Papadimitratos P,Gligor V,et al.EPFL.on data-een-tric trust establishment iri ephemeral Ad Hoc networks [A].Pro-ceedings of IEEE Infocom [C].2008.
  • 5Ostermaier B,Dotzer F,Strassherger M.Enhancing the security of local danger warnings in VANETs-a simulative analysis of voting schemes [Z].Vienna,Austria,2007:422-431.
  • 6Blaze M,Feigenbaum J,Lacy J.Decentralized Trust Manage merit [A].Dale J,Dinolt G,eds.Proceedings of the 17th Sym posiumon Security and Privacy [C].Oakland,CA:IEEE Corn puter Society Press,1996:164-173.
  • 7Matt B,Joanf.Decentralized Trust Management [C].USA IEEE Computer Society,1996:164-173.
  • 8Otrok H,Mohammed N,Wang L,et al.A game-theoretic in-trusion detection model for mobile ad-hoc networksJ].Com-puter Communications,2008,31(4):708-721.
  • 9Yu W.Game theoretic analysis of cooperation stimulation and se-curity in autonomous mobile ad-hoc networks [J].IEEE Trans on Mobile Computing,2007,6(5):507-521.
  • 10常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-126. 被引量:191

引证文献4

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部