期刊文献+

基于直觉模糊理论的MANET主观信任模型 被引量:4

Subjective Trust Model Based on Intuitionistic Fuzzy Set Theory for MANET
下载PDF
导出
摘要 移动自组织网络缺乏可信第三方提供信任度量,节点可以依靠对其他节点特定行为进行主观判断以决定对其信任程度,而且行为特征还具有呈现与否的程度大小或者不知情的问题,为此,本文提出了一种基于直觉模糊理论的M ANET主观信任模型,并给出了信任的直觉模糊表述和实现方法,用于量化和评估节点的可信程度。仿真实验表明本模型是适合移动自组网安全的信任模型,能够有效地抵御网络攻击和信任模型攻击。 The absence of trust valuation presented by certain trusted third party in mobile ad hoc network(MANET) may result in that a node′s subjective trust in other nodes will only rely on their behavior,but the behavior may not present trust characteristics precisely.A subjective trust model based on intuitionistic fuzzy set theory(STMIFS) is proposed to quantify and evaluate the trust worthiness of nodes.Its intuitionistic fuzzy description and implementation are also given.The simulations show that STMIFS is suitable for MANET security and able to effectively defend against both ad hoc network attacks and trust model attacks.
出处 《南京航空航天大学学报》 EI CAS CSCD 北大核心 2011年第4期538-543,共6页 Journal of Nanjing University of Aeronautics & Astronautics
基金 国家自然科学基金(90718021 61003210 60903027)资助项目 江苏省自然科学基金(BK2007593)资助项目
关键词 移动无线自组网 信任模型 直觉模糊集 主观信任 mobile ad hoc network trust model intuitionistic fuzzy set subjective trust
  • 相关文献

参考文献15

  • 1黄刚,王汝传,许一帆.无线传感器网络中基于分簇广播认证协议方案[J].南京航空航天大学学报,2010,42(1):72-76. 被引量:8
  • 2Gambetta D. Trust:making and breaking cooperative relations [M]. Oxford: Basil Blackwell, 2000: 213- 237.
  • 3唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 4Blaze M, Feigenbaum J, Lacy J. Decentralized trust management [C]//Proceedings of the 17th Sympo- sium on Security and Privacy. Oakland: IEEE Com- puter Society Press, 1996 : 164-173.
  • 5Beth T, Borcherding M, Klein B. Valuation of trust in open network[C]//Proceedings of the European Symposium on Research in Security. Brighton: Springer-Verlag, 1994: 3-18.
  • 6Abdul-Rahman A, Hailes S. A distributed trust model[C]//Proceedings of Meeting on New Security Paradigms. Langdale UK: ACM, 1998: 48-60.
  • 7Josang A, Ismail R,Boyd C. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems, 2007,43(2) : 618-644.
  • 8Whitby A, Josang A, Indulska J. Filtering out un- fair ratings in Bayesian reputation systems[J]. The Icfain Journal of Management Research, 2005,4(2) : 48-64.
  • 9Song S S, Hwang K, Zhou R F, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005,9 (6) : 24-34.
  • 10Luo Junhai, Liu Xue, Fan Mingyu. A trust model based on fuzzy recommendation for mobile ad-hoc networks[J]. Computer Networks, 2009, 53 (14) : 2396-2407.

二级参考文献10

共引文献242

同被引文献31

  • 1张仕斌,陈麟,王一川.一种基于模糊推理的主观信任评价模型[J].仪器与仪表学报,2009,30(S1):658-660.
  • 2GAMBETYA D. Can we trust trust?[M]// Trust: making and breaking cooperative relations. New York: Oxford Press, 1990:213 - 237.
  • 3VIVEKANANTH P. Reputation based trust model for grid with en- hanced reliability [ C]// Proceedings of the 2011 International Con- ference on Computers and Computing. Stevens Point, Wisconsin: World Scientific and Engineering Academy and Society, 2011:1 - 11.
  • 4JOSANG A, PRESTI S. Analyzing the relationship between risk and trust [ C]//iTrust04: Proceedings of the Second International Con- ference on Trust Management. Berlin: Springer-Verlag, 2004:279 -311.
  • 5EHAB E. Probabilistic trust models in network security [ D]. South-ampton: University of Southampton, 2011.
  • 6Ghassan Beydoun,Graham Low.Generic modeling of security awareness in agent based systems[J].Information Sciences,2013,239:62-71.
  • 7Olivier Boissier,Rafael H Bordini,Jomi F Hubner.Multiagent oriented programming with JaCaMo[J].Science of Computer Programming,2013,78 (6):747-761.
  • 8Macal CM,North MJ.Tutorial on agent based modeling and simulation[J].Journal of Simulation,2010 (4):151-162.
  • 9李学斌.P2P文件共享系统信任模型研究与仿真[J].计算机仿真,2008,25(11):142-145. 被引量:2
  • 10王进,孙怀江.基于Jφsang信任模型的信任传递与聚合研究[J].控制与决策,2009,24(12):1885-1889. 被引量:10

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部