学术期刊
切换导航
首 页
文 章
期 刊
投 稿
预 印
会 议
书 籍
新 闻
合 作
我 们
按学科分类
Journals by Subject
按期刊分类
Journals by Title
核心OA期刊
Core OA Journal
数学与物理
Math & Physics
化学与材料
Chemistry & Materials
生命科学
Life Sciences
医药卫生
Medicine & Health
信息通讯
Information & Communication
工程技术
Engineering & Technology
地球与环境
Earth & Environment
经济与管理
Economics & Management
人文社科
Humanities & Social Sciences
合作期刊
Cooperation Journals
首页
信息通讯
无线通信
Vol. 1 No. 1 (August 2011)
期刊菜单
最新文章
历史文章
检索
领域
编委
投稿须知
文章处理费
最新文章
历史文章
检索
领域
编委
投稿须知
文章处理费
无线自组网中的信任建立机制相关问题研究
Researches on Trust Building Scheme Relevant Issues in Wireless Self-Organizing Network
DOI:
10.12677/hjwc.2011.11002
,
PDF
,
HTML
,
XML
,
被引量
下载: 3,614
浏览: 11,353
国家自然科学基金支持
作者:
王海涛
:解放军理工大学通信工程学院
关键词:
无线自组网
;
信任关系
;
信任模型
;
安全路由
Wireless Self-Organizing Network; Trust Relationship; Trust Model; Security Routing
摘要:
在无中心、分布式的无线自组网中建立信任关系对于确保网络的安全性至关重要,但是面临许多新的问题和挑战。首先,介绍了在无线自组网中引入信任机制的必要性。然后,阐述了信任的概念和作用。在此基础上,说明了信任建立的方法、信任模型以及信任辅助的安全路由机制。最后,归纳了信任建立机制面临的攻击及应对措施。
Abstract:
Building trust relationship in acentric and distributed wireless self-organizing network (WSON) is vital for ensuring network security, but it still faces many new problems and challenges. In this paper neces-sity of introducing trust schemes in WSON is introduced firstly. Then, concepts and functions of trust are expounded. Based on above elaboration, trust building methods, trust models and trust assisted secure routing schemes are explained. Finally, various attacks faced by trust building scheme are countermeasures are summed up.
文章引用:
王海涛. 无线自组网中的信任建立机制相关问题研究[J]. 无线通信, 2011, 1(1): 6-10.
http://dx.doi.org/10.12677/hjwc.2011.11002
参考文献
[
1
]
郑少仁, 王海涛, 赵志峰等. Ad Hoc网络技术[M]. 北京: 人民邮电出版社, 2005.
[
2
]
A. Josang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 2005, 43(2): 618-644.
[
3
]
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In: J. Dale, G. Dinolt, eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996: 164-173.
[
4
]
Y. Sun, Z. Han, and R. Liu. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 2008, 46(4): 112-119.
[
5
]
J. Li, R. D. Li. Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine, 2008, 46(4): 108-114.
[
6
]
H. Yang, H. Luo. Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications Magazine, 2004, 11(1): 38-47.
[
7
]
M. Lima, A. Santos, and G. Pujolle. A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 2009, 11(1): 66-77.
[
8
]
D. Joshi, K. Namuduri. Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis. Journal of Wireless Communications and Networking, 2005, 2005(4): 579-589.
[
9
]
N. Boudriga, M. Obaidat. Fault and intrusion tolerance in wireless ad hoc networks. Washington: Wireless Communications and Networking Conference, 2005, 4: 2281-2286.
[
10
]
王良民, 郭渊博. 容忍入侵的无线传感网络模糊信任评估模型[J]. 通信学报, 2010, 31(12): 37-44.
投稿
友情链接
科研出版社
开放图书馆