期刊文献+

Ad hoc网络中信任模型的研究

Research on trust model in Ad hoc networks
下载PDF
导出
摘要 针对移动Ad hoc网络的特点,信任机制被提出并广泛应用,以保障网络的安全性。通过对现有信任模型的研究,一种基于模糊逻辑的信任模型被提出来。该信任模型中影响信任的因素包括节点的独特性,节点的稳定性和节点的历史行为。通过对各因素的模糊化,推理其对应的输出值,并计算各因素的权值分配,最后综合各输出值计算出节点的信任值,根据该信任值帮助节点做出信任决策。 According to the characteristics of mobile Ad hoc network, trust mechanisms have been proposed and widely used to protect the security of the network. After studying on the current trust models, this paper proposes a new trust model based on fuzzy logic. Factors which affect trust in the model include the unique nature of the nodes, the stability of nodes and the historical behavior. These factors will be calculated to output values by fuzzification. Using the weight distribution, the output values will be aggregated into the last trust value. Nodes can make the trusting decision with the help of the trust value.
出处 《电子设计工程》 2013年第20期18-20,23,共4页 Electronic Design Engineering
基金 国家自然科学基金(61272500) 北京市教育委员会科技计划项目(KM201010005027)
关键词 AD HOC网络 信任模型 信任 模糊逻辑 Ad hoc network trust model trust fuzzy logic
  • 相关文献

参考文献7

  • 1MARSH S P. Formalising trust as a computational concept [D]. University of Stifling, 1994._nf10a39bef40034d439104 dc9200bcb7c7.
  • 2MANCHALA D W. Trust metrics, models and protocols for electronic commerce transactions[C]//Proceedings of the 18th IEEE international Conference on Distributed Computing Systems. Amsterdam, 1998: 312-321.
  • 3YUN Teng, PHOHA V V, CHOI B. Design of trust metrics based on dempster-shafer theory [EB/OL]. [2013-04-01]. http://diteseer.nj.nec.com/461538.html._nff247f40c5bba428f 984890e 18f22f642.
  • 4YAO Wang,VASSILEVA J. Bayesian network-based trust model [C]//Proceedings of the IEEE/W1C International Conference on Web Intelligence ,2003: 372-378.
  • 5SUN Y L,WEI Yu,ZHU Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoe networks [J]. IEEE Journal on Selected Areas in Communications, 2006,24 (2) :305 -317.
  • 6唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 7彭祖赠,孙韫玉.模糊(Fuzzy)数学及其应用[M].2版.湖北:武汉大学出版社.2007.

二级参考文献10

  • 1M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. The Royal Society of London, DEC Systems Research Center, Tech. Rep.: 39, 1989.
  • 2R. Yahalom, B. Klein, Th. Beth. Trust relationships in secure systems-A distributed authentication perspective. In: Proc.1993 IEEE Symposium On Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150~164.
  • 3A. Jφsang. Prospectives for modeling trust in information security. Information Security and Privacy, Second Australasian Conf., ACISP'97, Syndey, NSW, Australia, 1997.
  • 4T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. European Symposium on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3~18.
  • 5A.J. Sang. A logic for uncertain probabilities. Int'l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279~311.
  • 6E. Gerck. Toward real-world models of trust: Reliance on received information. http: ∥ www. mcg.org. br/trustdef. htm,1998.
  • 7D. Gambetta. Can we trust trust? In: Trust: Making and Breaking Cooperative Relations (Electronic edition), Department of Sociology, University of Oxford, Chapter 13. http: ∥www. sociology. ox. ac. uk/papers/gambetta 213 ~ 237. pdf, 2000.213~237.
  • 8LA扎德.模糊集合、语言变量及模糊逻辑[M].北京:科学出版社,1982.63-84.
  • 9C. C. Lee. Fuzzy logic in control systems: Fuzzy logic controller-Part Ⅱ. IEEE Trans. System, Man, and Cybernetics, 1990, 20(2): 419~435.
  • 10唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236

共引文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部