期刊文献+

基于节点依赖度和交互频繁度的无线Mesh网络信任模型 被引量:1

Trust model based on node dependency and interaction frequency in wireless Mesh network
下载PDF
导出
摘要 无线Mesh网络(WMN)的开放性、动态性等优点使它得到了广泛应用,同时也产生了一些安全问题,传统的信任模型无法满足WMN的安全需求。基于社会网络的信任原理,提出了一种新的WMN信任模型TFTrust。该模型定义了与信任相关的多维因子计算方法,包括节点贡献度、节点依赖度以及交互频繁度,构建了节点间直接信任值的计算方法。仿真结果表明:TFTrust模型在网络的安全性、服务质量及降低网络通信代价等方面均优于无线自组网按需平面距离向量路由(AODV)协议及Beth模型。 The openness and dynamics of Wireless Mesh Network (WMN) makes it used widely, however, there are some security problems. The traditional trust model could no longer meet the security requirements of WMN. Based on the trust principle of social network, a new trust model named TFTrust was proposed. In the TFTrust, multi-dimensional factor calculation method was defined, including node contribution value, node dependency value and interaction frequency value, also the calculation method of the direct trust value was established. The simulation results show that TFTrust model is better than Ad Hoc on-demand Distance Vector Routing (AODV) protocol and Beth model in safety, quality of service and reduces the cost of network communications, etc.
出处 《计算机应用》 CSCD 北大核心 2015年第11期3051-3054,共4页 journal of Computer Applications
关键词 无线MESH网络 节点贡献度 节点依赖度 交互频繁度 直接信任值 Wireless Mesh Network (WMN) node contribution value node dependency value interaction frequency value direct trust value
  • 相关文献

参考文献14

  • 1LUHMANN N.信任:一个社会复杂性的简化机制[M] .瞿铁鹏, 李强,译.上海:上海人民出版社,2005:73.
  • 2方艺霖,李方敏,吴鹏,刘新华,马小林.无线Mesh网络组播路由协议[J].软件学报,2010,21(6):1308-1325. 被引量:16
  • 3SALEM N B, HUBAUX J P. Securing wireless mesh networks[J]. IEEE Wireless Communications, 2006,13(2):50-55.
  • 4韩毅,许进,方滨兴,周斌,贾焰.社交网络的结构支撑理论[J].计算机学报,2014,37(4):905-914. 被引量:8
  • 5BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]// Proceedings of the 17th Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1996:164-173.
  • 6BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[C]// Proceedings of the European Symposium on Research in Security. Brighton: Springer-Verlag, 1994:3-18.
  • 7JOSANG A, BRADLEY D, KNAPSKOG S J. Belief-based risk analysis[C]// Proceedings of the 2nd Workshop on Australasian Security,Data Mining and Web Intelligence,and Software Internationalisation. Darlinghurst: Australasian Computer Society, 2004:63-68.
  • 8SABATER J,SIERRA C. REGRET: reputation in gregarious societies[C]// Proceedings of the 15th International Conference on Autonomous Agents.New York: ACM,2001:194-195.
  • 9AL-OUFI S,KIM H-N, SADDIK A E. A group trust metric for identifying people of trust in online social networks[J]. Expert Systems with Applications,2012,39(18): 13173-13181.
  • 10ZHAN J,FANG X.A novel trust computing system for social networks[C]// Proceedings of the 2011 IEEE Third International Conference on Privacy,Security,Risk,and Trust,and 2011 IEEE Third International Conference on Social Computing. Piscataway: IEEE, 2011: 1284-1289.

二级参考文献51

  • 1刘群,张华平,俞鸿魁,程学旗.基于层叠隐马模型的汉语词法分析[J].计算机研究与发展,2004,41(8):1421-1429. 被引量:198
  • 2袁巍,李津生,洪佩琳.一种P2P网络分布式信任模型及仿真[J].系统仿真学报,2006,18(4):938-942. 被引量:45
  • 3Touch J.Overlay networks.Computer Networks,2001,36(2):115-116.
  • 4Zhang P,Helvik B E.Modeling QoS in P2P file-sharing with benign and malicious peers by stochastic activity networks//Proceedings of the 7th IEEE Consumer Communications and Networking Conference.Las Vegas,NV,USA,2010:461-465.
  • 5Mekouar L,Iraqi Y,Boutaba R.Peer-to-peer's most wanted:Malicious peers.Computer Networks,2006,50(4):545-562.
  • 6Zhang Q,Sun Y,Liu Z,Zhang X,Wen X Z.Design of a distributed P2P-based grid content management architecture//Proceedings of the 3rd Annual Communication Networks and Services Research Conference.Halifa,NS,Canada,2005:339-344.
  • 7Esaki H.A consideration on R & D direction for future Internet architecture.International Journal of Communication Systems,2010,23(6-7):694-707.
  • 8Gambetta D.Can we trust trust?//Gambetta D ed.Trust:Making and Breaking Cooperative Relations.Oxford:Basil Blackwell,1990:213-238.
  • 9Rahman A A,Hailes S.Supporting trust in virtual communities//Proceedings of the 33rd Hawaii International Conference on System Sciences.Maui,USA,2000:4-7.
  • 10Aberer K,Despotovic Z.Managing trust in a peer-to-peer information system//Proceedings of the 10th International Conference on Information and Knowledge Management.Atlanta,GA,USA,2001:1-7.

共引文献189

同被引文献20

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部