基于贝叶斯网络信任构建来缓解MANET网络安全威胁
Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks
摘要
由于移动Ad hoc(MANET)网络具有无固定基础设施、通信信道不可靠、节点随机移动等特性,对其安全问题的研究一直富有挑战性。信任机制结合加密技术可以有效缓解各类网络攻击(例如丢包攻击)。考虑到MANET网络的特性,需采取智能化方法来实现信任构建,进而发现攻击者的恶意行为。文章侧重缓解丢包攻击与数据包篡改攻击威胁,提出了一种基于贝叶斯网络的可信度评估构建机制,该机制可有效进行因果推理。文章提出的信任模型可有效区别导致网络丢包的不同原因:是由于网络信道不可靠,还是由于遭受恶意攻击。这样,即可计算出更精确的可信度。最后,仿真结果表明文章所提算法在恶劣网络环境中可行且有效。
出处
《通信对抗》
2015年第3期58-63,共6页
Communication Countermeasures
参考文献25
-
1J. Loo, J. Lloret, and J. H. Ortiz, Mobile Ad Hoc Net- works: Current Status and Future Trends. CtLC Press, 2011.
-
2J. Liu, F. Yu, C.-H. Lung, and H. Tang, "Optimal com- bined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 806-815, 2009.
-
3Q. Guan, F. Yu, S. Jiang, and V. Leung, "Joint topology control and security in mobile ad hoc networks with co- operative communications," IEEE Trans. Veh. Tech., vol. 61, no. 6, pp. 2674-2685, 2012.
-
4Y. Wang, F. Yu, H. Tang, and M. Huang, "A mean field game theoretic approach for security enhancements in mo- bile ad hoc networks," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1616-1627, 2014.
-
5S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mo- bile Ad Hoc Networking: The Cutting Edge Directions, 2nd Edition. Wiley-IEEE Press, 2013.
-
6S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mo- bile Ad Hoc Networking. Wiley-IEEE Press, 2004.
-
7Z. Wei, H. Tang, F. Yu, M. Wang, and P. Mason, "Secu- rity enhancements for mobile ad hoc networks with trust management using uncertain reasoning," IEEE Trans. Veh. Tech., Feb. 2014. accepted for publication.
-
8J. H. Cho, A. Swami, and I. R. Chen, "A survey on trust management for mobile ad hoc networks," IEEE Com- mun. Surveys & Tutorials, vol. 13, no, 4, pp. 562-583, 2011.
-
9J. Pearl, Probabilistic Reasoning in Intelligent Systems: Net- works of Plansible Inference. Morgan Kaufmann, 1988.
-
10A. Darwiche, Modeling and reasoning with Bayesian Net- works. Cambridge University Press, 2009.
-
1周永嘉,邹峰.如何区分P2P系统中的故障与攻击[J].计算机安全,2008(1):58-60.
-
2苗原,张文生,李实,孙增圻.基于模糊认知图的因果推理[J].模式识别与人工智能,1999,12(2):143-151. 被引量:2
-
3杨海燕.如何抑制集散型控制系统中的干扰问题[J].黑龙江纺织,2003(3):24-26.
-
4王刚.浅析数据恢复及销毁实验室的构建[J].计算机光盘软件与应用,2013,16(14):171-171. 被引量:6
-
5周文琼,王乐球.Oracle数据库启动过程研究与实践[J].软件导刊,2011,10(7):169-171. 被引量:2
-
6刘旭春.数据恢复技术在维护信息资源安全中的运用[J].中国科技博览,2013(35):503-503.
-
7王伦刚.Java中文问题浅析[J].山东纺织经济,2008,25(2):98-100.
-
8张光华,张玉清,刘雪峰.认知无线电网络中基于信任的安全路由模型[J].通信学报,2013,34(2):56-64. 被引量:6
-
9金芝,李德意,胡守仁.一种基于面向对象环境的因果推理方法[J].计算机科学,1991,18(5):43-49. 被引量:2
-
10冯登国,秦宇,汪丹,初晓博.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349. 被引量:116