期刊文献+

基于信任距离的车联网恶意节点检测方法 被引量:4

Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network
下载PDF
导出
摘要 针对车联网网络拓扑结构变化快且相比传统移动自组网络更易受到恶意车辆发起的内部攻击等问题,在当前贝叶斯假设的信任理论研究的基础上,结合车联网高速移动中快速检测恶意节点的要求,加大否定事件的影响力度,提出了用于评估车辆节点行为的信任模型;在综合推荐信任值时,引入了"推荐信任距离"作为推荐信任的信任度量,预先排除恶意推荐意见,并有效防止车辆的串通攻击。与现有的基于信任的检测方法相比,该方法加快了检测速度,并简化了推荐传递。仿真实验表明,该方法有较快的检测速度,从网络丢包率和恶意节点检测率可以看出此信任模型对检测恶意节点具有较好的性能。 With the requirement of rapid detection of malicious nodes in high-speed VANET, a trust model was pro- posed on the basis of bayes hypothesis, aiming at solving the issues that the topology of VANET changes quickly and is more vulnerable to malicious internal attack than traditional mobile ad-hoc network. The model intensifies the influence of negative events, to eliminate the malicious recommendations in advance and avoid collusion attack. The concept of "recommendation trust distance" is introduced as trust metric of recommendation trust when integrating recommenda- tion trust. Compared with the current detection method based on trust, this model speeds up the detection speed and simplifies the recommend delivery. The simulation experiment shows that this trust model has rapid detection speed and good performance in detecting malicious nodes from the network packet loss rate and the detection rate of malicious nodes.
出处 《计算机科学》 CSCD 北大核心 2015年第8期157-160,174,共5页 Computer Science
基金 国家自然科学基金(61272074) 江苏省自然科学基金(BK2011464) 镇江市工业支撑计划项目(GY2013030)资助
关键词 车联网 信任模型 贝叶斯假设 推荐信任距离 网络丢包率 检测率 VANET,Trust model,Bayes hypothesis,Recommendation trust distance,Network packet loss rate,Detection rate
  • 相关文献

参考文献18

  • 1Fazio P, De Rango F, Lupia A. A new application for enhancing VANET services in emergency situations using the WAVE/ 802. llp standard[C]//Wireless Days(WD), 2013 IFIP. IEEE, 2013 : 1-3.
  • 2乔震,刘光杰,李季,戴跃伟.移动自组织网络安全接入技术研究综述[J].计算机科学,2013,40(12):1-8. 被引量:4
  • 3Sharma S,Mishra R,Kaur I. New trust based security approach for M-hoe networks [C]// 2010 3rd IEEE International Con- ference on Computer Science and Information Technology (ICCSIT). Chengdu, 2010,9 : 428-431.
  • 4Xia H,Jia Z,Sha E H M. Research of trust model based on fuzzy theory in mobile ad hoc networks[J]. IET Information Security, 2013,8(2) ..88-103.
  • 5陈深龙,张玉清.增强ad hoc网络可生存性的健壮多维信任模型[J].通信学报,2010,31(5):1-9. 被引量:12
  • 6Amaresh M, Usha G. Efficient malicious detection for AODV in mobile ad-hoe network[C]//IEEE International Conference on Recent Trends in Information Technology(ICRTIT). Chennai, 2013:263-269.
  • 7Bhoi S K,Nayak R P,Dash D,et al. RRP:A robust routing pro- tocol for Vehicular Ad Hoc Network against hole generation at- tack[C]//IEEE International Conference on Communications and Signal Processing ( ICESP ). Melmaruvathur, 2013 : 1175- 1179.
  • 8Bao F, Chen R, Chang M J, et al. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J]. IEEE Transactions on Net- work and Service Management, 2012,9 (2) .. 169-183.
  • 9Josang A,Knapskog S J. A metric for trusted systems[C]//Pro- ceeedings of the 21st National Security Conference. 1998:16-29.
  • 10胡玲龙,潘巨龙,崔慧.无线传感器网络中基于信誉的恶意节点检测[J].中国计量学院学报,2012,23(1):41-47. 被引量:9

二级参考文献123

共引文献47

同被引文献25

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部