期刊文献+

基于社区的移动社交网络安全路由算法设计与实现 被引量:1

A Secure Routing Algorithm of Mobile Social Network Based on Community
下载PDF
导出
摘要 传统的路由安全机制并不能适用于分布式协作的移动社交网络路由协议的设计。针对该问题,文章给出了一种基于社区的移动社交网络安全路由算法SRAC。首先,采用信任云模型计算出节点间基于社区的综合信任度;然后,给出节点间基于社区的偏好相似度,通过分析节点间的相遇信息计算出相互的联络紧密度,并综合偏好相似度与联络紧密度得出节点间的关系亲密度;最后,根据移动节点间的综合信任度和节点间的关系亲密度,设计移动社交网络的安全路由算法。实验结果表明,路由算法SRAC能够有效地抑制恶意节点对消息路由的影响。 The traditional routing security mechanism is not suitable for the design of routing protocols in distributed cooperative mobile social network. In view of the problem, a security routing algorithm of mobile social network based on community(SRAC) is proposed. Firstly, the comprehensive trust between node in the same community is calculated based on cloud model. Then, the preference similarity between nodes based on the community is given, the degree of compactness between nodes is computed by analyzing the contact in-formation, and the degree of close relationship between nodes is computed by synthesizing the preference similarity and the degree of compactness. In the end, a security routing algorithm of mobile social network is designed by synthesizing the comprehensive trust and the degree of close relationship between nodes. The results of simulation show that, the routing algorithm SRAC can effectively restrain the influence of ma-licious nodes on the routing of messages.
出处 《信息网络安全》 CSCD 2017年第7期25-31,共7页 Netinfo Security
基金 国家自然科学基金[61572191 61571188] 湖南省自然科学基金[2017JJ2124] 湖南省教育厅优秀青年科研项目[15B125] 湖南省计算机应用技术重点建设学科资助项目
关键词 移动社交网络 社区 信任云 偏好相似度 关系亲密度 mobile social network community trust cloud preference similarity degree of close relationship
  • 相关文献

参考文献12

二级参考文献132

  • 1李德毅,刘常昱,杜鹢,韩旭.不确定性人工智能[J].软件学报,2004,15(11):1583-1594. 被引量:401
  • 2刘常昱,冯芒,戴晓军,李德毅.基于云X信息的逆向云新算法[J].系统仿真学报,2004,16(11):2417-2420. 被引量:188
  • 3Fall K.A delay-tolerant network architecture for challenged in-ternets[C]∥Proc of SIGCOMM’03.New York:ACM,2003:27-34.
  • 4Su J,Chin A,Popivanova A,et al.User Mobility for Opportunis-tic Ad-Hoc Networking[C]∥Proceedings of the 6th IEEEWorkshop on Mobile Computing System and Applications(WMCSA).UK,December 2004:41-45.
  • 5Chaintreau A,Hui P,Crowcroft J,et al.Pocket switched net-works:Real-world mobility and its consequences for opportunis-tic forwarding[R].UCAM-CL-TR-617.Cambridge:ComputerLaboratory,University of Cambridge,2005.
  • 6Nguyen A M,Crespi N.Social-DTN:Why Social NetworkingServices is More Fruitful to Mobile Delay-tolerant Networks?[C]∥Proceedings of International Conference on Ultra ModernTelecommunications&Workshops(ICUMT).2009:1-2.
  • 7Zhang Y,Zhao J.Social network analysis on data diffusion in de-lay tolerant networks[C]∥Proc of MobiHoc’09.New York:ACM,2009:345-346.
  • 8Hossmann T,Legendre F,Spyropoulos T.From contacts tographs:pitfalls in using complex network analysis for DTN rou-ting[C]∥Proc of INFOCOM’09.Piscataway,NJ:IEEE,2009:1-6.
  • 9Ahmed S,Kanhere S S.Cluster-based Forwarding in Delay Tol-erant Public Transport Networks[C]∥Proceedings of the 32ndIEEE Conference on Local Computer Networks.2007:625-634.
  • 10Vahdat A,Becker D.Epidemic routing for partially-connected adhoc networks[R].CS-2000-06.Durham,NC:Department ofComputer Science,Duke University,2000.

共引文献129

同被引文献1

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部