期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
A TRUST MECHANISM-BASED CHANNEL ASSIGNMENT AND ROUTING SCHEME IN COGNITIVE WIRELESS MESH NETWORKS WITH INTRUSION DETECTION 被引量:1
1
作者 Wu Guofeng Zhang Jing He Zhaopan 《Journal of Electronics(China)》 2010年第5期728-734,共7页
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ... Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively. 展开更多
关键词 Cognitive Wireless Mesh Networks (CWMN) Intrusion detection trust mechanism Channel assignment ROUTING
下载PDF
Research on Trust Mechanism in Rural Cooperatives
2
作者 LIU Yu-xiang 《Asian Agricultural Research》 2011年第1期37-41,54,共6页
The thesis introduces the generation and mechanism of action of trust during cooperation, which indicates that trust can activate the members' participation in management and investment, and preclude the generatio... The thesis introduces the generation and mechanism of action of trust during cooperation, which indicates that trust can activate the members' participation in management and investment, and preclude the generation of members' will and behavior of breach of contract so as to guarantee the stable development of farmers' cooperatives; the decreasing degree of trust can put sand in the wheels of farmers' cooperatives. Based on these, we conduct survey of questionnaire on 197 rural households of 10 farmers' cooperatives in Yanliang, Xi'an, Lintong and Yanglin . By analyzing the generation of trust mechanism and survey data, some suggestions are put forward as follows: promote inner communication; remodel the trust culture of informal system; hew to contractual system; perfect the system of motivation and punishment; establish the system of equal property right and investment; implement management and supervision by job rotation so as to promote the trust degree among the members of farmers' cooperatives and keep the benign recycle of "trust-cooperation". 展开更多
关键词 Cooperatives trust mechanism Members'will and behavior China
下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
3
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power Internet of Things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
下载PDF
A Security Kernel Architecture Based Trusted Computing Platform 被引量:2
4
作者 CHENYou-lei SHENChang-xiang 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期1-4,共4页
A security kernel architeclrne built on trusted computing platform in thelight of thinking about trusted computing is presented According to this architecture, a newsecurity module TCB (Trusted Computing Base) is adde... A security kernel architeclrne built on trusted computing platform in thelight of thinking about trusted computing is presented According to this architecture, a newsecurity module TCB (Trusted Computing Base) is added to the operation system kerneland twooperation interface modes are provided for the sake of self-protection. The security kernel isdivided into two parts and trusted mechanism Is separated from security functionality. Ihe TCBmodule implements the trusted mechanism such as measurement and attestation, while the othercomponents of security kernel provide security functionality based on these mechanisms. Thisarchitecture takes full advantage of functions provided by trusted platform and clearly defines thesecurity perimeter of TCB so as to assure stlf-securily from architcetmal vision. We also presentfunction description of TCB and discuss the strengths and limitations comparing with other relatedresearches. 展开更多
关键词 trusted computing TCB module security kernel trusted mechanism
下载PDF
Networked TT&C for Mega Satellite Constellations:A Security Perspective 被引量:1
5
作者 Yafeng Zhan Guanming Zeng Xiaohan Pan 《China Communications》 SCIE CSCD 2022年第9期58-76,共19页
Satellite constellations are promising in enabling the global Internet.However,the increasing constellation size also complicates tracking,telemetry and command(TT&C)systems.Traditional groundbased and space-based... Satellite constellations are promising in enabling the global Internet.However,the increasing constellation size also complicates tracking,telemetry and command(TT&C)systems.Traditional groundbased and space-based approaches have encountered significant obstacles due to,e.g.,the limited satellite visible arc and long transmission delay.Considering the fast development of intersatellite communications,synergy among multiple connected satellites can be exploited to facilitate TT&C system designs.This leads to networked TT&C,which requires much less predeployed infrastructures and even performs better than traditional TT&C systems.In this paper,we elaborate system characteristics of networked TT&C compared with traditional ground-based and spacebased TT&C,and propose the unique security challenges and opportunities for networked TT&C,which includes secure routing and trust mechanisms.Furthermore,since networked TT&C is a novel scenario with few relevant researches,we first investigate the current researches on secure routing and trust mechanisms for traditional terrestrial and satellite networks,and then accordingly deliver our security perspectives considering the system characteristics and security requirements of networked TT&C. 展开更多
关键词 mega-constellation TT&C network SECURITY routing trust mechanisms
下载PDF
A Multi-case Study of Community Supported Agriculture (CSA) Operation Model in Beijing 被引量:1
6
作者 CHEN Yingying 《Journal of Landscape Research》 2021年第4期89-93,99,共6页
As one of the ways to localize foods,community supported agriculture can strengthen food safety and should be reasonably guided and developed.Based on the analysis of the spatial layout of the community supported agri... As one of the ways to localize foods,community supported agriculture can strengthen food safety and should be reasonably guided and developed.Based on the analysis of the spatial layout of the community supported agriculture organizations in Beijing,this paper described the development framework and course of community supported agriculture in Beijing.Combining 3 differentiated cases with the consumer's participation in community supported agriculture and the trust mechanism,it was found that the drive type has a very significant impact on the characteristics of these organizations. 展开更多
关键词 Community Supported Agriculture Operation Model Consumer participation trust mechanism Consumer-driven Producer-driven
下载PDF
一种基于节点鉴别的水下传感器网络协同干扰方案
7
作者 苏毅珊 刘尧 +3 位作者 范榕 李路裕 范慧丽 张舒 《Journal of Marine Science and Application》 CSCD 2022年第2期197-209,共13页
Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UA... Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network. 展开更多
关键词 underwater acoustic sensor networks(UASNs) physical layer security cooperative jamming physical layer authentication trust management mechanism
下载PDF
A Mechanism Aiming To Build Trust
8
作者 BONNIE GLASER 《Beijing Review》 2010年第23期14-15,共2页
The Strategic and Economic Dialogue facilitates better understanding between the United States and China After a year of ups and downs in the Sino-American relations hip, the second round of the Strategic and Economi... The Strategic and Economic Dialogue facilitates better understanding between the United States and China After a year of ups and downs in the Sino-American relations hip, the second round of the Strategic and Economic Dialogue (S&ED) was held in Beijing from May 24-25. 展开更多
关键词 A mechanism Aiming To Build trust
原文传递
Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks
9
作者 Wenbo ZHANG Tao WANG +1 位作者 Chaoyang ZHANG Jingyu FENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第4期540-554,共15页
As cross-chain technologies enable interactions among different blockchains(hereinafter“chains”),multi-chain consensus is becoming increasingly important in blockchain networks.However,more attention has been paid t... As cross-chain technologies enable interactions among different blockchains(hereinafter“chains”),multi-chain consensus is becoming increasingly important in blockchain networks.However,more attention has been paid to single-chain consensus schemes.Multi-chain consensus schemes with trusted miner participation have not been considered,thus offering opportunities for malicious users to launch diverse miner behavior(DMB)attacks on different chains.DMB attackers can be friendly in the consensus process on some chains,called mask chains,to enhance their trust value,while on others,called kill chains,they engage in destructive behaviors on the network.In this paper,we propose a multi-chain consensus scheme named Proof-of-DiscTrust(PoDT)to defend against DMB attacks.The idea of distinctive trust(DiscTrust)is introduced to evaluate the trust value of each user across different chains.The trustworthiness of a user is split into local and global trust values.A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain.Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners,chain miners,and chain miner leaders,separately.Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments. 展开更多
关键词 Blockchain Cross-chain trust mechanism Multi-chain consensus
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部