期刊文献+

基于声誉的机会网络信任模型

TRUST MODEL IN OPPORTUNISTIC NETWORKS BASED ON REPUTATION
下载PDF
导出
摘要 机会网络中,节点间进行交互必须考虑其他节点的可信性。针对机会网络节点间信任问题,提出基于声誉的机会网络信任模型。该模型采用贝叶斯方法计算节点的直接声誉,并将时间退变因子引入到间接声誉的计算当中,利用加权求合的方法合成信任值,根据此信任值节点双方进行访问控制并更新信任表。最后研究模型各个参数对信任值的影响,该模型能够有效地提高节点交互成功率。 In opportunistic networks, the interaction between nodes must consider the credibility of other nodes. According to the trust issue between nodes in opportunistic networks, this paper proposes a reputation-based opportunistic networks trust model. This model uses Bayesian method to calculate the direct reputation of nodes, introduces time degeneration factor in the indirect reputation calculation, and uses weighted sum method to integrate the trust value. Moreover, both sides of the node conduct access control and update their trust table based on this trust value. Finally, the influence of parameters of the model on the trust value is discussed. This model can improve the success rate of interaction between the nodes effectively.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第7期204-206,共3页 Computer Applications and Software
关键词 机会网络 信任模型 声誉 贝叶斯 时间退变因子 访问控制 Opportunistic networks Trust model Reputation Bayesian Time degeneration factor Access control
  • 相关文献

参考文献8

  • 1熊永平,孙利民,牛建伟,刘燕.机会网络[J].软件学报,2009,20(1):124-137. 被引量:324
  • 2Coti M, Giordano S. Multihop ad hoe networking:The reality[ J]. Communications Magazine,2007,45 (4) : 88 - 95.
  • 3Tamez E B, Woungang I, Lilien L, et al. Trust Management in Opportunistic Networks : A Semantic Web Approach [ C ]//Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business. IEEE Computer Society Press ,2009:235 - 238.
  • 4Moreira M R P G E D S, Martimiano L A F. Trust Management in Opportunistic Networks [ C ]//Proceedings of the 2010 Ninth International Conference on Networks. IEEE Computer Society Press, 2010:209 -214.
  • 5Yu B, Singh M, Sycara K. Developing Trust in Large Scale Peer-to-Peer Systems [ C ]//Proceedings of the First IEEE Symposium on Multi-Agent Security and Surivivability. IEEE Computer Society Press,2004:1 -10.
  • 6王伟,曾国荪.一种基于Bayes信任模型的可信动态级调度算法[J].中国科学(E辑),2007,37(2):285-296. 被引量:22
  • 7Ganeriwal S, Srivastava M. Reputation-based Framework for high integrity sensor Networks [C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks ( SASN 2004 ). New York : ACM Press ,2004:66 - 77.
  • 8刘庆俞,叶震,郑礼良.一种改进的信任模型研究[J].计算机应用与软件,2011,28(3):293-295. 被引量:2

二级参考文献76

  • 1袁禄来,曾国荪,姜黎立,蒋昌俊.网格环境下基于信任模型的动态级调度[J].计算机学报,2006,29(7):1217-1224. 被引量:53
  • 2Hull B, Bychkovsky V, Zhang Y, Chen K, Goraczko M, Miu A, Shih E, Balakrishnan H, Madden S. CarTel: A distributed mobile sensor computing system. In: Proc. of the 4th Int'l Conf. on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 125-138.
  • 3Pan H, Chaintreau A, Scott J, Gass R, Crowcroft J, Diot C. Pocket switched networks and human mobility in conference environments. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM. 2005. 244-251.
  • 4Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy-Efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In: Proc. of the 10th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2002.96-107. DO1=http://doi.acm.org/10.1145/605397.605408
  • 5Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, 2006,44(11): 134-141.
  • 6Conti M, Giordano S. Multihop ad hoe networking: The reality. Communications Magazine, 2007,45(4):88-95.
  • 7Fall K. A delay-tolerant network architecture for challenged Internets. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe: ACM, 2003.27-34.
  • 8Akyildiz IF, Akan B, Chert C, Fang J, Su W. InterPlaNetary Intemet: State-of-the-Art and research challenges. Computer Networks, 2003,43(2):75-112.
  • 9Gupta P, Kumar P. The capacity of wireless networks. IEEE Trans. on Information Theory, 2000,46(2):388-404.
  • 10Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002, 10(4):477-486.

共引文献345

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部