期刊文献+

移动自组织网络安全性测试研究 被引量:1

Research on Security Test of Mobile Ad Hoc Network
下载PDF
导出
摘要 传统的静态评估方法已经难以满足当前的评估需求,基于此种情况,提出了构建全新的动态再评估模型用来测试移动自组织网络安全性的想法。此模型可以对移动自适应网络进行抽象化处理,以拓扑结构的形式表现出来。当移动自组织网络发生变化后,以产生变化的构件为中心点,对附近的构件重新评估,获取全新安全度量值。根据仿真实验得出的结果,该模型拥有良好的安全性测试能力和评估效率。 Traditional static evaluation methods have been unable to meet the current evaluation needs. Based on this situation, this paper proposes an idea of building a new dynamic re-evaluation model to test the security of mobile ad hoc networks. This model can abstract the mobile adaptive network and express it in the form of topological structure. When the mobile ad hoc network changes, the changed componentis taken as the center point tore-evaluate the nearby components to obtain a new security measure. According to results obtained from the simulation experiment, it can be proved that the model has good safety testing ability and evaluation efficiency.
作者 朱龙梅 ZHU Longmei(Information Management Department, Shaanxi Technical College of Finance and Economics, Xianyang 712000, China)
出处 《微型电脑应用》 2021年第10期134-136,共3页 Microcomputer Applications
关键词 移动自组织网络 安全性测试 动态评估模型 再评估方法 mobile self-organizing network security test dynamic evaluation model re-evaluation method
  • 相关文献

参考文献6

二级参考文献48

  • 1朱晓妍,伍前红,王育民.移动Ad hoc网络安全策略[J].网络安全技术与应用,2004(1):22-25. 被引量:6
  • 2唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 3张晓宁,冯登国.无线自组网络中基于簇结构的安全方案[J].计算机研究与发展,2006,43(2):238-243. 被引量:6
  • 4王标,肖龙.基于资源分布规律的信息系统风险量化模型[J].四川大学学报(工程科学版),2007,39(6):129-133. 被引量:2
  • 5ONTI M, GIORDANO S. Mobile Ad Hoc networking: milestones, hallenges, and new research directions [ J]. IEEE Communications Vlagazine, 2014, 52(1) : 85 -96.
  • 6PAN L. Dynamic evaluation model of security risk in information sys- tem [ C]// ICCSEE2012: Proceedings of the 2012 International Con- ference on Computer Science and Electronics Engineering. Washing- ton, DC: IEEE Computer Society, 2012:225-229.
  • 7CHAN A H W, LYU M R. Security modeling and evaluation for the mobile code paradigm [C]//ASIAN99: Proceedings of the 5th Asi- an Computing Science Conference on Advances in Computing Sci- ence, LNCS 1742. Berlin: Springer, 1999:371-372.
  • 8MEADOWS C. The feasibility of quantitative assessment of security [ M]// Dependable Computing for Critical Applications 4. Vienna: Springer, 1995, 9:227-228.
  • 9TAHERI S,HARTUNG S,HOGREFE D.Achieving receiver location privacy in mobile Ad Hoc networks[C]//2010 IEEE Second International Conference on Social Computing.Minneapolis,MN:IEEE,2010:800-807.
  • 10MANJULADEVI V,BHARATHI R J.Efficient anonymous geographic ad Hoc routing[C]//2014 International Conference on Electronics and Communication Systems.[S.l.]:IEEE,2014:1-6.

共引文献15

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部