期刊文献+

A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks

A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
下载PDF
导出
摘要 Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly. Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1789-1792,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60372107) Doctoral Innovative Foundation ofJiangsu Province(46666001) .
关键词 MANET(mobile ad hoe networks) MULTILEVEL trust algorithm MANET(mobile ad hoe networks) multilevel trust algorithm
  • 相关文献

参考文献10

  • 1Vassilaras S;Vogiatzis D;Yovanof G S.Security and Cooperation in Clustered Mobile Ad Hoc Networks with Centralized Supervision[J],2006(02). 被引量:1
  • 2Sun Yan Lindsay;Wei Yu;Zhu Han.Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Cetworks[J],2006(02). 被引量:1
  • 3Theodorakopoulos G;Baras J S.On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks[J],2006(02). 被引量:1
  • 4Eschenauer L;Gligor V D;Baras J S.On Trust Establishment in Mobile Ad-Hoc Networks,2006. 被引量:1
  • 5Deng HongMei;Li Wei;Agrawal D P.Routing Security in Wireless Ad Hoc Networks[J],2002(10). 被引量:1
  • 6Wobber E;Abadi M;Burrows M.Authentication in the Taos Operating System,1994(01). 被引量:1
  • 7Dieter Gollmann.Computer Security,1999. 被引量:1
  • 8Bell D;LaPadula L.The Bell-LaPadula Model,1996(2-3). 被引量:1
  • 9Konstantin Knorr.Dynamic Access Control through Petri NetWorkflows,2000. 被引量:1
  • 10Djenouri D;Khelladi L;Badache A N.A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks,2005(04). 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部