期刊文献+

水下无线通信网络分级信任管理 被引量:2

Hierarchical Trust Management in Underwater Wireless Communication Networks
下载PDF
导出
摘要 在分析现有信任管理机制的基础上提出了一种适用于水下分簇无线通信网络的分级信任管理机制。针对现有信任管理机制存在的问题和水下无线通信网络的安全需求,从包正常转发率、包的完整性、能量因素三方面对节点行为进行信任评估,采用直接信任值合成方法,将信任值的计算和管理分为成员节点、簇头节点、网关节点三级,实现了分级信任管理。仿真结果表明该信任管理机制能有效降低恶意节点对网络数据传输和吞吐量的影响并提高系统的安全性。 In this paper,the existing trust management mechanisms are studied.Based on the analysis and research,a hierarchical trustmanagementmechanism is proposed for cluster-based underwater wireless communication networks.To solve the problem in existing trust management mechanisms and to satisfy the security requirements of underwater wireless communication networks,we propose a hierarchical trustmanagementmechanism.The mechanism evaluate nodes'behaviours from the successful rate of packets forwarded,the integrity of packets,and the energy factor.The direct trust value method is utilized,and the compution of trustvalue is devided into three levels.The proposed hierarchical trust management scheme is simulated and validated.The experiment results show that the hierarchical trust management scheme improves the security of underwater wireless communication networks effectively.
出处 《中国海洋大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第6期109-114,共6页 Periodical of Ocean University of China
基金 国家重点基础研究发展规划项目"基于声纳和水下视觉的深海复杂环境AUV组合导航系统关键技术"(2009AA12Z330)资助
关键词 水下无线通信 信任管理 分簇拓扑 分级信任 underwater wireless communications trust management cluster-based topology hierarchical trust
  • 相关文献

参考文献18

  • 1荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730. 被引量:62
  • 2Li N,Mitchell J C, Winsborough W H. Design of a role basedtrustmanagement framework [C]. // Proceedings of 2002 IEEESymposium on Security and Privacy. 2002 : 114-130. 被引量:1
  • 3Blaze M,Feigenbaum J,Lacy J. Decent ralized Trust Manage-ment [C]. // Proceeding of the 17th Symposium on Security andPrivacy, IEEE Computer Society Press. 1996: 164-170. 被引量:1
  • 4Yu T, Winslett M, Seamons K E. Supporting structured creden-tials and sensitive policies through interoperable strategies for au-tomated trust negotiation [J]. ACM Transactions on Informationand System Security, 2003,6(1) : 1-42. 被引量:1
  • 5Chu Y H, Feigenbaum J, LaMacchia B, et al. REFEREE: Trust-management for web applications [J]. World Wide Web Journal,1997, 2(2): 127-139. 被引量:1
  • 6Li N,Grosof B N,Feigenbaum J. Delegation logic: A logic-basedapproach to distributed authorization [J]. ACM Transactions onInformation and System Security, 2003,6(1) : 128-171. 被引量:1
  • 7官尚元,伍卫国,董小社,梅一多.分布式环境中高效信任管理的研究[J].西安交通大学学报,2009,43(6):15-19. 被引量:3
  • 8Pirzada A,McDonald C. Trust establishment in pure ad-hoc net-works. wireless personal [J], Wireless Personal Communications,2006,37: 139-163. 被引量:1
  • 9Almenarez F, Marin A,Diaz D,et al. Developing a model fortrustmanagement in pervasive devices [C]. //Proc of the 3rd IEEE IntiWorkshop on Pervasive Computing and Communication Security,2006: 267-272. 被引量:1
  • 10XiongL, Liu L. Peer trust: sopporting reputation-based trustforpeei^to-peer elect ronic communities [J]. IEEE Transactions onKnowledge and Data Engineering, 2004, 16(7) : 843-857. 被引量:1

二级参考文献48

  • 1TOLONE W, AHN G J, PAI T. Access control in collaborative systems [J]. ACM Computing Surveys, 2005, 37(1): 29-41. 被引量:1
  • 2BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management [C]//IEEE Symposium on Security and Privacy. Los Alamitos, NJ, USA: IEEE Computer Society, 1996: 164-173. 被引量:1
  • 3BLAZE M, IOANNIDIS J, KEROMYTIS A D. Experience with the KeyNote trust management system: applications and future directions, iTrust 2003 [M]// LNCS 2692. Berlin, Germany: Springer-Verlag, 2003 : 284-300. 被引量:1
  • 4CHU Y H, FEIGENBAUM J, MACCHIA B L, et al. REFEREE: trust management for web applications [J]. World Wide Web Journal, 1997, 2(3) : 127-139. 被引量:1
  • 5LI N, MITCHELL J C. Understanding SPKI/SDSI using first-order logic [J]. International Journal of Information Security, 2006, 5(1): 48-64. 被引量:1
  • 6WEEKS S. Understanding trust management systems [C]//IEEE Symposium on Security and Privacy. Los Alamitos, NJ, USA: IEEE Computer Society, 2001: 94-105. 被引量:1
  • 7JOSANG A, ISMAIL R, BOYD C. A survey of trust and reputation systems for online service provision [J]. Decision Support Systems, 2007, 43 (5):618- 644. 被引量:1
  • 8LI N, WINSBOROUGH W H, MITCHELL J C. Distributed credential chain discovery in trust management [J]. Journal of Computer Security, 2003, 11 (1): 35-86. 被引量:1
  • 9Ganeriwal S,Srivastava M.Reputation-based Framework for High Integrity Sensor Networks[C] //Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.Washington,USA:[s.n.] ,2004:66-77. 被引量:1
  • 10Momani M,Challa S,Aboura K.Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective[J].Innovative Algorithms and Techniques in Automation,Industrial Electronics and Telecommunications,2007,9(9):317-321. 被引量:1

共引文献63

同被引文献24

  • 1郭淑霞,高颖,黄建国.远程水下通信系统纠错编码方法研究[J].测控技术,2006,25(3):30-32. 被引量:6
  • 2胡楚锋,赵军仓,张麟兮.水下通信中TCM的关键技术研究[J].计算机测量与控制,2007,15(9):1214-1216. 被引量:1
  • 3Kumar GEP, Titus I, Thekkekam SI. A comprehensive overview on application of trust and reputation in wireless sensor network. Procedia Engineering, 2012, (38): 2903-2912. 被引量:1
  • 4Che RS, Feng RJ, Liang X, Wang X. A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Security Comm. Networks, 2015, (8): 168-175. 被引量:1
  • 5Galkin PV. Analisys of energy units wireless sensor networks. SR. 2014. 2: 55-61. 被引量:1
  • 6Abramov ES, Basan ES. Development of the protected clustered wireless sensor network model. Proc. of SFedU. Engineering of information security, 2013, 12(149): 48-56. 被引量:1
  • 7Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007: 57-64. [doi:10.1109/SCIS.2007.357670.]. 被引量:1
  • 8Abramov ES, Basan ES, Laxmi V. Development of secure protocol for mobile cluster sensor network management. Izvestiya SFedU. Engineering Sciences, 2014, 2(151): 101-107. 被引量:1
  • 9Marmol FG~ Perez GM. TRMSim- WSN, trust and reputation models simulator for wireless sensor networks. Proc. of the IEEE International Conference on Communications, Communication and Information Systems Security Symposium. Dresden, Germany. jun 2009. 被引量:1
  • 10Kamvar S, Schlosser M, Garcia-Molina H. The eigen trust algorithm for reputation management in P2P networks, WWW03: Proc. of the 12th International Conference on World Wide Web. 2003.640-651. 被引量:1

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部