无线网状网基于不确定性度量极小化信任模型
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant Nos.60673142, 60473090 (国家自然科学基金)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [23]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    WMN(wireless mesh network)网络环境中,网络拓扑结构的改变或无线冲突的发生,都可能导致作为信任值评估证据的样本空间不一定完整和可靠,使得现有的信任评估模型不能应用其上.为了解决WMN网络节点间信任评估问题和建立信任关系,在研究现有信任模型并分析其存在问题的基础上,提出了基于不确定性度量极小化的信任模型.模型引入可信任度因子,根据网络实际情况,弱化证据样本空间不一定完整和可靠对信任值评估的影响,使得信任评估值的修正量在全局范围内达到最小.仿真实验与基于证据理论的信任评估模型进行了对比

    Abstract:

    In wireless mesh networks, the sample space of evidence may be not integrative or reliable because of the change of network topology and the occurrence of wireless collision. It makes the existing trust evaluation models inapplicable. To evaluate trust values of nodes and establish trust relationship in nodes, a trust model is proposed on the basis of the analyses of the existing trust models and the minimal principle of uncertainty metric. The model reduces the influence of the non-integrated and unreliable sample space through importing a credible parameter. According to the real situation of networks, the model can minimize the amendment of evaluation values in the whole scope. Contrasted with the evidence-based trust model, the simulation results show that the proposed model is effective.

    参考文献
    [1] Zhou L, Haas ZJ. Securing ad hoc networks. Network IEEE, 1999,13(6):24-30.
    [2] Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks. In: Proc. of the ACM MOBICOM. 2000. 275-283. http://portal.acm.org/citation.cfm?doid=345910.345958
    [3] Marti S, Giuli T, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th Annual ACM/IEEE Int’l Conf. on Mobile Computing and Networking. 2000. 255-265. http://portal.acm.org/citation.cfm?id=345910. 345955
    [4] Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proc. of the 8th ACM Int’l Conf. on Mobile Computing and Networking. 2002. 12-23. http://www.geocities.com/prashthy/secure_routing_ad_hoc.html
    [5] Eschenauer L, Gligor VD, Baras J. On trust establishment in mobile ad hoc networks. In: Proc. of the 10th Int’l Workshop on Security Protocols. 2002. 47-66. http://dblp.uni-trier.de/rec/bibtex/conf/spw/EschenauerGB02
    [6] Manchala DW. Trust metrics, models and protocols for electronic commerce transactions. In: Proc. of the 18th Int’l Conf. on Distributed Computing Systems. 1998. 312-321. http://portal.acm.org/citation.cfm?id=850926.851678
    [7] J?sang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. In: Proc. of the Decision Support Systems. 2005. http://citeseer.ist.psu.edu/738255.html
    [8] Yu B, Singh MP, Sycara K. Developing trust in large-scale peer-to-peer systems. In: Proc. of the 1st IEEE Symp. on Multi-Agent Security and Survivability. 2004. 1-10. http://jmvidal.cse.sc.edu/lib/yu04a.html
    [9] Buchegger S, Boudec JL. Performance analysis of the confidant protocol. In: Proc. of the IEEE/ACM Symp. on Mobile Ad Hoc Networking and Computing. 2002. 226-236. http://portal.acm.org/citation.cfm?id=513828
    [10] Theodorakopoulos G, Baras JS. Trust evaluation in ad-hoc networks. In: Proc. of the 2004 ACM Workshop on Wireless Security. 2004. 1-10. http://portal.acm.org/citation.cfm?id=1023648
    [11] Theodorakopoulos G. Distributed trust evaluation in ad hoc networks [MS. Thesis]. University of Maryland, 2004.
    [12] Housley R, Ford W, Polk W, Solo D. RFC 2459, Internet X.509 public key infrastructure, 1999.
    [13] Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Proc. of the 3rd European Symp. on Research in Computer Security. 1994. 3-18. http://www.informatik.uni-trier.de/~ley/db/conf/esorics/esorics1994.html
    [14] Theodorakopoulos G, Baras JS. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2006,24(2):318-328.
    [15] Mui L, Mojdeh M, Ari H. A computational mode of trust and reputation. In: Proc. of the 35th Hawaii Int’l Conf. on System Sciences. 2002. 2431-2439. http://portal.acm.org/citation.cfm?id=821158
    [16] Zand D. Trust and managerial problem solving. Administrative Science Quarterly, 1972,17:229-239.
    [17] Carnap R, Jeffrey RC. Studies in Inductive Logic and Probability, Vol.1. Berkeley: The University of California Press, 1971.
    [18] Niiniluoto I. On a k-dimensional system of inductive logic. Philosophy of Science Association, 1976,2:425-477.
    [19] Wang Y, Vassileva J. Bayesian network-based trust model. In: Proc. of the IEEE/WIC Int’l Conf. 2003. 372-378.
    [20] Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. In: Proc. of the Int’l World Wide Web Conf. 2004. 17-22. http://citeseer.ist.psu.edu/guha04propagation.html
    [21] Yu B, Munindar P. An evidential model of distributed reputation management. In: Proc. of the Int’l Conf. 2002. 294-301.
    [22] Abdul-Rahman A, Hailes S. Using recommendations for managing trust in distributed systems. In: Proc. of the IEEE Malaysia Int’l Conf. on Communication’97. 1997. http://citeseer.ist.psu.edu/360414.html
    [23] Johnson DB, Maltz DA, Hu YC. The dynamic source routing protocol for mobile ad hoc networks (DSR). 2004. http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

丁旭阳,范明钰,朱大勇,王佳昊.无线网状网基于不确定性度量极小化信任模型.软件学报,2008,19(1):116-124

复制
分享
文章指标
  • 点击次数:5320
  • 下载次数: 6084
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2006-05-17
  • 最后修改日期:2006-11-30
文章二维码
您是第19783765位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号