期刊文献+

A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks 被引量:2

A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks
下载PDF
导出
摘要 In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks. In the harsh environment where node density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering most of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the delivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
出处 《China Communications》 SCIE CSCD 2015年第4期117-129,共13页 中国通信(英文版)
基金 supported by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1078) the Key Program of NSFC-Guangdong Union Foundation (U1135002) the Major national S&T program(2012ZX03002003) the Fundamental Research Funds for the Central Universities(JY10000903001) the National Natural Sci ence Foundation of China (Grant No. 61363068, 61100233) the Natural Science Foundation of Shaanxi Province (Grant No. 2012JM8030, 2011JQ8003)
关键词 信任管理 网络通信 行为 反馈 主义 节点密度 移动节点 身份认证 opportunistic networks trustmanagement key management forwardingprotocols verified feedback packet
  • 相关文献

参考文献34

  • 1Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine, 2006, 44(11): 134-141.
  • 2Conti M, Giordano S, May M, et al. From oppor?tunistic networks to opportunistic computing. Communications Magazine, IEEE, 2010,48:126- 139.
  • 3Conti M, Kumar M. Opportunities in Opportu?nistic Computing. Computer, 2010, 43(1): 42-50.
  • 4Froding M, Johansson P, Larsson P. Wireless Ad hoc networking-the art of networking without a network[J]. Ericesson Review, 2000(4):248-262.
  • 5Fall K. A Delay-Tolerant network architecture for challenged Internets. Proceedings of the 2003 Conference on Applications, Technologies, Ar?chitectures, and Protocols for Computer Com?munications. New York: ACM Press, 2003:27- 34.
  • 6Zhang Z. Routing in intermittently connected mobile ad hoc networks and delay tolerant net?works: overview and challenges. IEEE Commu?nications Surveys & Tutorials, 2006, 8(1): 24-37.
  • 7Allen S.M, Conti M, Crowcroft J, et at. Social Networking for Pervasive Adaptation. Proceed?ings of the Second IEEE International Confer?ence on Self-Adaptive and Self-Organizing Sys?tems Workshops (SASOW). Piscataway NJ: IEEE Press, 2008:49-54.
  • 8Scott J, Hui P, Crowcroft J, et al. Haggle: A net?working architecture designed around mobile users. Proceedings of the Third Annual IFIP Conference on Wireless On-Demand Network Systems and Services (WONS), 2006.
  • 9陈曦,马建峰.基于身份加密的机会网络安全路由架构[J].计算机研究与发展,2011,48(8):1481-1487. 被引量:9
  • 10陈曦,田有亮,李兴华,马建峰.机会网络中基于身份门限签名的可信路由(英文)[J].China Communications,2011,8(4):132-140. 被引量:1

二级参考文献82

  • 1田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 2Pelusi L, Passarella A, Conti M. Opportunistic networking: Data forwarding in disconnected mobile ad hoe networks [J]. IEEE Communications Magazine, 2006, 44(11): 134-141.
  • 3Conti M, Kumar M. Opportunities in opportunistic computing[J]. Computer, 2010, 43(1): 42-50.
  • 4Yoneki E, Hui F, Crowcroit J. Visualizing community detection in opportunistic networks [C] //Proc of the 2nd ACM Workshop on Challenged Networks (CHANTS'07). New York: ACM, 2007:93-96.
  • 5Scott J, Hui P, Crowcroft J, et al. Haggle~ A networking architecture designed around mobile users [C]//Proe of the 3rd Annual IFIP Conf on Wireless On Demand Network Systems and Services (WONS). Princeton: Citeseer, 2006:78-86.
  • 6Hui P, Chaintreau A, Scott J, et al. Pocket switched networks and human mobility in conference environments[C] //Proc of ACM SIGCOMM Workshop on Delay-Tolerant Networking. NewYork: ACM, 2005:244-251.
  • 7Allen S. M, Conti M, Crowcroft J, et al. Social networking for pervasive adaptation [C] //Proc of the 2nd IEEE Int Conf on Self-Adaptive and Self-Organizing Systems Workshops (SASOW). Piscataway, NJ:IEEE, 2008: 49-54.
  • 8Zhang Zhensheng. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks.- Overview and challenges [J]. IEEE Communications Surveys Tutorials, 2006, 8(1): 24-37.
  • 9Vahdat A, Becker D. Epidemic routing for partially connected ad hoc networks, CS 2000-06 [R]. Durham: Duke University, 2000.
  • 10Burns B, Brock O, Levine B N. MV routing and capacity building in disruption tolerant networks [C] //Proc of the IEEE INFOCOM 24th Annual Joint Conf of the IEEE Computer and Communications Societies. Piscataway, NJ: IEEE, 2005:398-408.

共引文献9

同被引文献11

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部