期刊文献+

Ad Hoc网络中基于信息论的可信模型研究 被引量:3

Research of Trust Evaluation Model Based on Information Theoretic Framework in Ad Hoc Network
下载PDF
导出
摘要 针对现有可信网络框架和可信度量模型不能很好的适用于Ad Hoc网络这一情况,在基于信息论的可信度量模型基础上,提出了一种面向Ad Hoc网络的多路径可信度量模型。该信任度量模型在考虑节点信任程度的同时,能够有效将业务分组在网络中均衡,避免中继节点大量承担转发任务。仿真结果表明,该模型在多跳Ad Hoc网络中能够根据信任度量值选择最优路径,避免中继转发节点缓存队列溢出丢包,能够提高网络吞吐率。 The current framework of TNC and trust evaluation model could not satisfy the performance requirements when the trusted access was needed in Ad Hoc networks. For this aim, a trust evaluation model DPET was proposed for Ad Hoc networks. Compared with the existing trust evaluation model, the DPET model could take load balancing into consideration while calculating the trust degree. Thus, it could prevent a relay node from forwarding too many packets, which could degrade the network performance. The simulation results validated that the DPET model could select the optimal path based on the trust degree value, and improve network throughput in multi-hop Ad Hoc networks.
作者 迟凯 CHI Kai(Laboratory of Electronic Information Network,The 20^th Research Institute of CETC,Xi'an 710068,China)
出处 《电子科技》 2018年第9期21-24,28,共5页 Electronic Science and Technology
基金 国家科技重大专项(2017ZX03001010-004)
关键词 可信网络 信任模型 信息论 Ad HOC 多路径路由 可信路由 trust network;trust evaluation model;information theory;Ad Hoc network;multipath route;trust route
  • 相关文献

参考文献5

二级参考文献50

  • 1张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 2张焕国,刘玉珍,余发江,周强,叶新.一种新型嵌入式安全模块[J].武汉大学学报(理学版),2004,50(A01):7-11. 被引量:7
  • 3林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 4林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 5.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,. 被引量:4
  • 6Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33 被引量:1
  • 7Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65 被引量:1
  • 8Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22 被引量:1
  • 9International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998 被引量:1
  • 10Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656 被引量:1

共引文献352

同被引文献15

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部