无线自组网中的信任建立机制相关问题研究
Researches on Trust Building Scheme Relevant Issues in Wireless Self-Organizing Network
DOI: 10.12677/hjwc.2011.11002, PDF, HTML, XML, 下载: 3,614  浏览: 11,353  国家自然科学基金支持
作者: 王海涛:解放军理工大学通信工程学院
关键词: 无线自组网信任关系信任模型安全路由
Wireless Self-Organizing Network; Trust Relationship; Trust Model; Security Routing
摘要: 在无中心、分布式的无线自组网中建立信任关系对于确保网络的安全性至关重要,但是面临许多新的问题和挑战。首先,介绍了在无线自组网中引入信任机制的必要性。然后,阐述了信任的概念和作用。在此基础上,说明了信任建立的方法、信任模型以及信任辅助的安全路由机制。最后,归纳了信任建立机制面临的攻击及应对措施。
Abstract: Building trust relationship in acentric and distributed wireless self-organizing network (WSON) is vital for ensuring network security, but it still faces many new problems and challenges. In this paper neces-sity of introducing trust schemes in WSON is introduced firstly. Then, concepts and functions of trust are expounded. Based on above elaboration, trust building methods, trust models and trust assisted secure routing schemes are explained. Finally, various attacks faced by trust building scheme are countermeasures are summed up.
文章引用:王海涛. 无线自组网中的信任建立机制相关问题研究[J]. 无线通信, 2011, 1(1): 6-10. http://dx.doi.org/10.12677/hjwc.2011.11002

参考文献

[1] 郑少仁, 王海涛, 赵志峰等. Ad Hoc网络技术[M]. 北京: 人民邮电出版社, 2005.
[2] A. Josang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 2005, 43(2): 618-644.
[3] M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In: J. Dale, G. Dinolt, eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996: 164-173.
[4] Y. Sun, Z. Han, and R. Liu. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 2008, 46(4): 112-119.
[5] J. Li, R. D. Li. Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine, 2008, 46(4): 108-114.
[6] H. Yang, H. Luo. Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications Magazine, 2004, 11(1): 38-47.
[7] M. Lima, A. Santos, and G. Pujolle. A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 2009, 11(1): 66-77.
[8] D. Joshi, K. Namuduri. Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis. Journal of Wireless Communications and Networking, 2005, 2005(4): 579-589.
[9] N. Boudriga, M. Obaidat. Fault and intrusion tolerance in wireless ad hoc networks. Washington: Wireless Communications and Networking Conference, 2005, 4: 2281-2286.
[10] 王良民, 郭渊博. 容忍入侵的无线传感网络模糊信任评估模型[J]. 通信学报, 2010, 31(12): 37-44.