In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chanc...In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.展开更多
The authors extend the Gazi's swarm model with local neighbor rules and the dynamic communication topology, and study its aggregation properties. Results of analysis show that all agents in the models aggregate and e...The authors extend the Gazi's swarm model with local neighbor rules and the dynamic communication topology, and study its aggregation properties. Results of analysis show that all agents in the models aggregate and eventually form a cohesive cluster of finite size around the swarm center or the appointed point. Finally, simulations are provided to testify some of the results. Models in the paper are more applicable to the reality for the advantage that each agent only needs the partial information of the entire dynamic system when making motion decision.展开更多
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1078)the Key Program of NSFC-Guangdong Union Foundation (U1135002)+3 种基金the Major national S&T program(2012ZX03002003)the Fundamental Research Funds for the Central Universities(JY10000903001)the National Natural Sci ence Foundation of China (Grant No. 61363068, 61100233)the Natural Science Foundation of Shaanxi Province (Grant No. 2012JM8030, 2011JQ8003)
文摘In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
基金Project Operation and Simulation of Emergency Response Logistics Network in the System of Anti-bioterrorism supported by the National Natural Science Foundation of China under Grant No.70671021.
文摘The authors extend the Gazi's swarm model with local neighbor rules and the dynamic communication topology, and study its aggregation properties. Results of analysis show that all agents in the models aggregate and eventually form a cohesive cluster of finite size around the swarm center or the appointed point. Finally, simulations are provided to testify some of the results. Models in the paper are more applicable to the reality for the advantage that each agent only needs the partial information of the entire dynamic system when making motion decision.