期刊文献+

一种改进的Ad Hoc网络信任模型

An Improved Trust Model for Ad-Hoc Network
下载PDF
导出
摘要 对Ad Hoc网络信任模型进行研究,提出一种改进的分簇信任模型,该模型具有较好的可扩充性、动态性,并能主动发现问题节点。仿真实验表明该模型是有效的。 The article summarized security issues and trust management in mobile Ad Hoc network environment .Based on several currently popular trust models , this article studied and analyzed the advantages and disadvantages of each model , proposed an im-proved clustering trust model , which is of scalable , dynamic, and initiatively finding out wrong nodes , then, using NS2 simula-tion platform to simulate the model , compared and analyzed the results in the network performance .The results show the improved model is effective .
作者 刘玮 李芒
出处 《计算机与现代化》 2013年第12期141-144,205,共5页 Computer and Modernization
关键词 移动自主网 基于身份的分簇模型 动态主观信任 mobile Ad Hoc network identity-based clustering model dynamic subject trust
  • 相关文献

参考文献11

  • 1Yan Lindsay Sun, Wei Yu, Zhu Han, et al. Information theoretic framework of trust modeling and evaluation for Ad Hoc networks[ J]. IEEE Journal on Selected Areasin Com- munications, 2006,24(2) :305-317.
  • 2Theodorakopoulos G, Baras J S. Trust evaluation in Ad- Hoc networks[ C]// Proceedings of the 3rd ACM Work- shop on Wireless Security. 2004:1-10.
  • 3Theodorakopotdos G, Baras J S. On trust models and trust evaluation metrics for Ad-Hoe networks [ J ]. IEEE Journal on Selected Areas in Communications, 2006,24 ( 2 ) : 318- 328.
  • 4Rachedi A, Benslimane A. Trust and mobility-based cluste- ring algorithm for secure mobile Ad Hoe networks [ C ]// International Conference on Systems and Networks Commu- nications, 2006. 2006:72.
  • 5The University of Southern California. The Network Simula- tor-ns-2 [ DB/OL ]. http://www, isi. edu/nsnam/ns, 2013-10-10.
  • 6Govindan K, Mohapatra P. Trust computations and trust dy- namics in mobile Ad hoc networks: A survey [ J ]. Commu- nications Surveys & Tutorials, 2012,14 (2) : 279 -298.
  • 7Shamir A. How to share a seeret [ J ]. Communication of ACM, 1979,22(1) :612-613.
  • 8IEEE. EEE 802.15 Working Group for WPAN[ DB/OL]. http://grouper, ieee. org/groups/802/15, 2012-O9-23.
  • 9Zhou L, Hass Z J. Securing Ad Hoe netmorks [ J ]. IEEE Networks, 1999,13 (6) :24-30.
  • 10Mingliang Jiang, Jinyang Li, Yong Chiang Tay. Cluster Based Routing Protocol (CBRP) Functional Specification [ R]. National University of Singapore, 1999.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部