MANETs动态信任模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
移动自组织网络(MANETs)是由一组带有无线收发装置的移动节点组成的无须固定设施支持的临时性的通信网络。其基本特点具有开放的媒质、动态的拓扑结构、分布式的合作和受限的网络能力,网络中移动节点具有匿名性和高度自治,网络通讯依靠在通信路径上的中间节点转发数据包,实现无线传输范围外节点间的正常通信。
     由于MANETs中移动节点本身要受诸如能量和计算能力等各种资源的限制,节点不愿意花费资源去转发它不感兴趣的数据包,甚至却期望其它节点转发自己的数据包。同时由于节点间缺乏对与之交互的节点的可信程度的知识,节点需应对交互过程中可能出现的威胁,每个移动节点都可能受到直接或间接的攻击。如何保障在MANETs网络环境下的通信安全成为一个不容忽视,必须解决的关键性问题。
     本文针对上述问题,以MANETs动态信任模型为主要研究对象,总结MANETs安全问题的发展现状和未来趋势,在借鉴传统网络安全方法的基础上,结合MANETs的固有特点,在不增加任何额外的硬件设备的情况下,对如何保障MANETs安全性进行创新性和探索性的研究。本文提出基于博弈、模糊和置信度的MANETs动态信任模型以及频率域下多目标可信路由发现算法。
     主要创新点体现在以下几方面:
     (1)针对MANETs中自私节点储存自身能量和其它资源,常常不参与转发数据,不利于网络节点间实现相互信赖路由和转发数据包的弊病,本文基于博弈研究MANETs中节点的行为,提出一种根据节点的信誉度来获得资源,刺激节点共享资源和转发数据的方法。此方法兼顾MANETs通信中没有第三方中心认证的特点,不是一种集中于网络节点强制合作的方法。基于博弈理论的信任模型,实现鼓励包转发,约束自私节点。
     仿真实验结果表明,此信任模型能够识别自私节点并且能在信任节点之间建立信任,提高整个网络效率。
     (2)基于模糊逻辑能够很好的处理不确定性和信任评价、包转发检查和可靠性调整的不精确性输入的特点,提出一种基于模糊推荐的MANETs信任模型,用于量化和评估节点的推荐可信程度,给出五种基于模糊关系理论的模糊信任推荐和模型的数学表述。该模型的目的在于削弱自私节点协同作弊的效果。通过节点间模糊推荐构造节点的全局信任,它综合整个网络对该节点的信任评价,因此自私节点不能通过“相识”的同伙给出不实评价而获得较高的信任,避免自私节点间相互伪造推荐度来互相“吹捧”,以获得虚高的信任的现象。
     仿真实验结果表明,此模型能够有效地适用于遏制更广泛类型的自私节点同谋攻击,在端到端分组传递率和网络中的平均能量消耗等性能指标上较传统模型有较大提高。在节点评价数据极端稀疏的情况下,仍能取得较理想的质量。
     (3)针对MANETs网络拓扑结构的改变或无线冲突的发生都可能导致作为信任值评估证据的样本空间不一定完整和可靠,使得现有的信任评估模型不能应用其上的问题,提出基于置信度的MANETs环境下的信任模型,给出模型的数学表述和实现方法,此模型用于量化和评估节点的可信程度。本文运用置信度对信任问题进行建模,建立信任的评价机制,提出推荐信任关系的推导规则,构造一个完整的信任模型。
     仿真实验结果表明,此模型与已有的基于证据理论的信任评估模型相比较,具有有效性和优越性,为MANETs网络环境中的信任模型研究提供一个有价值的新思路。
     (4)提出一种独特的MANETs中基于频率下多目标可信路由决策算法,它和现在大多数路由算法都是在时间域下使用单一约束参数选择路由的方式截然不同。此方法利用概率理论分析安全和可信路由,基于概率密度函数的时频相互转化,减小计算复杂度,解决MANETs中节点间缺乏物理安全以及在低信任水平和节点扰乱网络操作情况下,发现可信安全路由难的问题。
     案例分析证明此算法的可行性。
Mobile Ad-hoc Networks (MANETs) are the multi-hop temporary communicationnetworks of mobile nodes equipped with wireless transmitters and receivers without theaid of any fixed network infrastructure. MANETs have their fundamental characteristics,such as open medium, dynamic topology, distributed cooperation, and constrainedcapability. Due to the anonymous and self-organization nature of mobile nodes in thenetwork, intermediate nodes on a communication path are expected to forward packetsof other nodes so that nodes can communicate beyond their wireless transmission range.
     Because mobile nodes are usually constrained by limited energy, bandwidth andcomputational power, a node may be unwilling to spend its resources in forwardingpackets which are not of its direct interest, even though it expects other nodes toforward its packets to the destination. At the same time, nodes have to manage the riskinvolved with the transactions without prior knowledge about each other's trust. Eachmobile node in MANETs may even be attacked directly or indirectly by maliciousnodes. With increasing applications of MANETs, it is a crisis issue to guaranteenetwork security.
     To solve above topics, the dissertation focuses on researching on dynamic trustmodel for MANETs. It concludes and analyses the present status and future challengesof security issues in MANETs. Based on the traditional network security and theinherence characteristics of MANETs, some novel research on guaranteeing networksecurity for MANETs are explored without adding the additional hardware. Somerelated trust models and a trusted routing discovery algorithm in frequency-domain areproposed based on game theory, fuzzy theory and certainty-factor for MANETs in thepaper.
     Related efforts result in following major innovative achievements:
     (1)Selfish nodes in MANETs do not forward packets to save battery or otherresources, which leads to make against realizing trust routing between nodes andforwarding data. In this paper, game theory is used to study nodes' behaviors whennodes receive service based on their reputations. Reputation is employed as a mechanism to incentives nodes to share resource and forward packets for other nodes.The model thinks synchronously over that there is not any central authority and acentralized solution to stimulate cooperation is not suitable for MANETs.
     Theoretical analysis and experimental results show the proposed trust model cansuccessfully identify selfish nodes and build trust among trust nodes to improve theefficiency of the network.
     (2)Based on that fuzzy logic provides a natural framework to deal with uncertaintyand the tolerance of imprecise data inputs for the subjective tasks of trust evaluation,packet-forwarding review and credibility adjustment, a trust model based on fuzzyrecommendation is proposed to quantify and evaluate the recommendationtrustworthiness of a node, which includes five types of fuzzy trust recommendationrelationships based on the fuzzy relation theory and a mathematical description forMANETs. The model aims at preventing the synergistic effect of selfish nodes. Theglobal trust value of a node is a global view of the whole network on the node bysummarizing the recommendations of nodes. Evaluation is not made only through someof "acquaintances" of selfish nodes. It simultaneity avoids the phenomenon that selfishnodes mutually forge recommendations to "flatter" each other in order to obtain themendacious and high trust values.
     Theoretical analysis and experimental results show that it is still robust under moregeneral conditions where selfish nodes cooperate in an attempt to deliberately subvertthe system, end-to-end packet delivery ratio more quickly, and decreases the averageenergy consumes more effectively compared with some traditional trust models. Theeffect of node rating data's sparsity can be greatly reduced and show the excellentperformance on typical data set.
     (3)The sample space of evidence may be not integrative or reliable because of thechange of network topology or the occurrence of wireless collision, so the existing trustevaluation model can not be applied. In this paper, a trust model based oncertainty-factor is proposed to quantify and to evaluate the trustworthiness of nodes,which includes a mathematical description and an implementation. The certainty-factorhas been used to model the issues of trust management. The evaluation of trust model isdiscussed, the derivation rules of recommendation trust relationships in MANETs arepresented and a trust model is provided.
     Theoretical analyses and experimental results show the model is more effectivelycomparing with the trust model based on evidence-evaluation. The trust model providesa new valuable way for MANETs.
     (4)In this paper, a trusted routing selection algorithm based on multi-objectives infrequency-domain for MANETs is proposed. It is distinctly different with most ofrouting algorithms that select routing based on a single-objective in the time-domain.Our proposed algorithm tries to analyze the secure and trusted routing based onprobability theory to reduce the computation complex with the mutual transformation ofprobability functions between time-domain and frequency-domain. It solves thequestion of finding secure and trusted routing for MANETs in the ease of the lack ofphysical security, untrustworthy scenario and low trust levels among nodes in MANETsand malicious nodes colluding with one another to disrupt the network operation.
     Extensive analysis has been carried out to evaluate the design of our algorithm.
引文
[1] Mingmei Li. Strategic pricing to stimulate node cooperation in wireless ad-hoc networks, PhD dissertation, The Graduate University for Advanced Studies (SOKENDAI), 2007, 21-55
    [2] Xiaoqi Li. Trust model based self-organized routing protocol for secure ad-ho networks, PhD dissertation, The Chinese University of Hong Kong, 2003, 6-23
    [3] 黄景博.移动Ad-hoc网络的节能路由技术研究,[博士学位论文].合肥:中国科学技术大学,2007
    [4] Moe Rahnema. Overview of the GSM system and protocol architecture, IEEE Communications, Magazine, 1993
    [5] Kyoung II Kim. Handbook of CDMA system design, Engineering and Optimization, Prentice Hall PTR, 1999
    [6] Http://www.bluetooth.org, 2007
    [7] Http://standards.ieee.org/getieee802/download/IEEE 802.11-1999.pdf, 2007
    [8] IEEE Computer Society and IEEE Microwave Theory and Techniques Society. Air Interface for Fixed Broadband Wireless Access Systems, IEEE STD 802.16-2001, 2002
    [9] Http://students.mimuw.edu.pl/SR/prace-mgr/chmielowiec/achmielowiec 2007-08-08.pdf, 2007
    [10] IEEE 802.20 PD-03, Mobile Broadband Wireless Access Systems, 2006
    [11] IEEE 802.20 PD-04, Introduction to IEEE 802.20 Technical and Procedural Orientation, 2006
    [12] Charikleia Zouridaki. Trust establishment for reliable data packet delivery in mobile ad-hoc networks, PhD dissertation, George Mason University, 2007, 83-99
    [13] Diana Senn. Reputation and trust management in ad-hoc networks with misbehaving nodes, Eidgenossische Technische Hochschule Zurich Swiss Federal Institute of Technology Zurich, 2003, 5-21
    [14] 郑相全.无线自组网技术实用教程,北京:清华大学出版社,2004.6
    [15] 郑少仁,王海涛,赵志峰等.Ad-hoc网络技术,北京:人民邮电出版社.2005.1
    [16] 王金龙,王呈贵.Ad-hoc移动无线网络,北京:国防工业出版社,2004.5
    [17] 陈林星,曾曦,曹毅.移动Ad-hoc网络-自组织分组无线网络技术,电子工业出版社,2006.4
    [18] Jiangyi Hu. Trust management in mobile wireless networks: security and survivability, PhD dissertation, The Florida State University, 2007, 10-28
    [19] Katrin Hoper. Authentication and key exchange in mobile ad-hoc networks, University of Waterloo, PhD dissertation 2007, 13-19
    [20] 孙磊.移动自组网及其安全若干技术研究,[博士学位论文].郑州:解放军信息工程大学,2006
    [21] N. Abramson. The ALOHA system-another altemative for computer communications, in Proc. Fall Joint Computer Conference, 1970, 37: 281-285
    [22] J. Jubin, J. D. Tornow. The DARPA packet radio network protocols, in Proc IEEE (Special Issue on Packet Radio Networks), 1987, 75(1): 21-32.
    [23] J. A. Freebersyser, B. Leiner. A DoD perspective on mobile ad hoc networks, Charles E. Perkins (Ed.), Ad Hoc Networking, Addison Wesley, 2001, 29-51
    [24] G. Lauer. Advanced protocol for the SLTRAN packet radio network, in Proc. SHAPE Packet Radio symposium, 1989
    [25] J. M. McQuillan I. Richer, E. C. Rosen. The new routing algorithm for ARPANET, IEEE Transactions on Communications, 1980, 28(5): 711-719
    [26] N. Asokan, P. Ginzboorg. Key agreement in ad hoc networks, Computer Communication, 2000, 23(170): 1627-1637
    [27] B. Leiner, R. Ruth, A. R. Sastry. Goals and challenges of the DARPA GloMo program, IEEE Personal Communications, 1996, 3(6): 34-43
    [28] 朱成刚.基于主观逻辑的MANETs安全可信路由协议研究,[硕士学位论文].成都:电子科技大学,2007
    [29] Http://www.ietf.org, 2006
    [29] 史美林,英春.自组网路由协议综述,通信学报,2001,22(11):93-103
    [30] Luo Junhai, Ye Danxia, Fan Mingyu. A survey of multicast routing protocols for mobile ad-hoc networks, IEEE Communications Surveys & Tutorials, 2009, 11(1): 78-91
    [31] Luo Junhai, Xue Liu, Ye Danxia. Research on multicast routing protocols for mobile ad-hoc networks, Computer Networks, 2008, 52(5): 988-997
    [32] Xianren Wu. Statistical models and performance evaluation of mobile ad-hoc networks, PhD dissertation, University of California, 2008, 2-23
    [33] Mohamad Y. Alsaadi. Simulation study for a secure routing protocol for wireless mobile ad-ho networks, Master dissertation, University of Pureto Rico, 2006, 17-24
    [34] Spiewak, Dagmara, Engel, Thomas. Trust as foundation for follow-on security mechanisms in MANETs, WSEAS Transactions on Communications, 2007, 6(1): 125-131
    [35] Burmester, Mike/Yasinsac, Alec. Security issues in ad-hoc networks, Spdnger-Vedag New York Inc, 2005, 8
    [36] Tavli, Bulent/Heinzelman, Wendi. Mobile ad-hoc networks, Spdnger-Vedag New York Inc, 2005, 8
    [37] Anjum, Farooq/Mouchtaris, Petros. Security for wireless ad-hoc networks, John Wiley & Sons Inc, 2005, 7
    [38] Ning, Peng (EDT)/Du, Wenliang (EDT). Security of ad-hoc and sensor networks, Ios Pr Inc, 2005, 7
    [39] Zhu, Bo, Ren, Kui, Wang, Lingyu. Anonymous misbehavior detection in mobile ad hoc networks, ICDCS Workshops 2008, 2008, 358-363
    [40] Anon. 2007 IEEE 65th Vehicular Technology Conference-VTC2007-Spdng, VTC2007-Spring, 2007, 3284
    [41] Http://www.cs.ucla.edu/NRL/wireless, 2007
    [42] Http://www.cse.ucsc.edu/research/ccrg/home.html, 2006
    [43] Http://wnl.ece.cornell.edu, 2008
    [44] Http://www.crhc.uiuc.edu/-nhv, 2008
    [45] Http://www.cs.umd.edu/projects/mcml, 2007
    [46] Http://moment.cs.ucsb.edu, 2008
    [47] Ciszkowski, Tomasz, Kotulski, Zbigniew. Distributed reputation management in collaborative environment of anonymous MANETs, EUROCON 2007, 2007, 1028-1033
    [48] De Moraes, Renato M, Sadjadpour, Hamid R, Garcia-Luna-Aceves, J. J. Many-to-many communication: a new approach for collaboration in MANETs, INFOCOM 2007, 2007, 1829-1837
    [49] Abolhasan, Mehran, Wysocki, Tadeusz A. Dynamic zone topology routing protocol for MANETs, European Transactions on Telecommunications, 2007, 18(4): 351-368
    [50] Tran, Thi Minh Chau, Scheuermann, Bjoin, Mauve, Martin. Detecting the presence of nodes in MANETs, CHANTS 2007, 2007, 43-50
    [51] 于宏毅.无线移动自组织网,北京,人民邮电出版社,2005.4
    [52] Todd Randel. Formal security evaluation of ad-ho routing protocols, PhD dissertation, The Florida State University, 2007, 1-8
    [53] Zhu Ji. Game theoretical framework for cooperation in autonomous wireless networks, PhD dissertation, University of Maryland, 2007, 8-17
    [54] Narula, Prayag, Dhurandher, Sanjay Kumar et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing, Computer Communications, 2008, 31(4): 760-769
    [55] Razak, S. A, Furnell, S. M, Clarke, N. L et al. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks, Ad Hoc Networks, 2008, 6(7): 1151-1167
    [56] Rachedi, Abderrezak, Benslimane, Abderrahim, Guang, Lei et al. A confident community to secure Mobile Ad Hoc Networks, ICC 2007, 2007, 1254-1259
    [57] Watkins, Damian, Scott, Craig. Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks, WCNC 2004, 2004, 622-627
    [58] Aziz, M, Al-Akaidi, M. Security issues in wireless ad hoc networks and the application to the telecare project, DSP 2007, 2007, 491-494
    [59] Gonzalez, Oscar F, Howarth, Michael, Pavlou, George. Detection of packet forwarding misbehavior in mobile ad-hoc networks, WWIC 2007, 2007, 302-314
    [60] Yu, Wei, Liu, K. J. Ray. Defense against injecting traffic attacks in wireless mobile ad-hoc networks, IEEE Transactions on Information Forensics and Security, 2007, 2(2): 227-239
    [61] Bose, S, Kannan, A. Detecting denial of service attacks using cross layer based intrusion detection system in wireless ad hoc networks, ICSCN 2008, 2008, 182-188
    [62] Jahnke, Marko, Toelle, Jens, Finkenbrink, Alexander et al. Methodologies and frameworks for testing IDS in ad-hoc networks, Q2SWinet 2007, 2007, 113-122
    [63] Lin, Xiaodong, Lu, Rongxing, Zhang, Chenxi et al. Security in vehicular ad hoc networks [security in mobile ad hoc], IEEE Communications Magazine, 2008, 46(4): 88-95
    [64] Khalil, Issa, Bagchi, Saurabh, Shroff, Ness B. MobiWorp: Mitigation of the wormhole attack in mobile multi-hop wireless networks, Ad Hoc Networks, 2008, 6(3): 344-362
    [65] Yi, Ping, Wu, Yue, Li, Jianhua. Securing Ad Hoc networks by mobile firewall, Journal of Information and Computational Science, 2007, 4(2): 839-850
    [66] Guette, Gilles, Ducourthial, Bertrand. On the Sybil attack detection in VANET, MASS 2007, 2007, 4428742
    [67] Sun, Yan Lindsay, Yang, Yafei. Trust establishment in distributed networks: analysis and modeling, ICC 2007, 2007, 1266-1273
    [68] Http://www.academypublisher.com/jnw/vol03/no05/jnw03051320.pdf, 2006
    [69] 罗俊海,范明钰,叶丹霞.MANET路由安全研究,计算机应用研究,2008,25(1):243-245
    [70] Http://www.chinaunicom.com.cn/profile/xwdt/txjs/file1405.html, 2006
    [71] 柳楠,韩芳溪,张维勇等.移动Ad-hoc网络中的特殊攻击,计算机工程与设计,2005,26(6):1486-1487
    [72] Luo Junhai, Fan Mingyu, Ye Danxia. Research on topology discovery for IPv6 networks, SANPD 2007, 2007, 804-809
    [73] Crepeau, Claude, Davis, Carlton R, Maheswaran, Muthucumaru. A secure MANET routing protocol with resilience against byzantine behaviors of malicious or selfish nodes, AINAW 2007, 2007, 19-26
    [74] 张元,沈苏彬.Ad-hoc网络中信任管理模型的研究与设计,西安邮电学院学报,2008,13(1):86-90
    [75] 黄玉飞,王培康,黄少滨.移动Ad-hoc网基于信任度的路由发现算法,计算机辅助工程,2005,14(2):59-62
    [76] 张长伦.移动Ad-hoc网络信任管理,北京电子科技学院学报,2007,15(4):19-22
    [77] M. Deutsch. Cooperation and trust: some theoretical notes. In Nebraska Symposium on Motivation, 1962275-319
    [78] L. Niklas. Trust and Power Chichester John Wiley and sons, 1979
    [79] Http://www.lunwentianxia.com/product.free.7969411.1, 2006
    [80] Http://www.chinaelections.org/newsinfo.asp?newsid=124736, 2008
    [81] 贾佳,曲向丽,杨文婧.信任管理相关技术研究,通讯和计算机,2006,3(10):37-43
    [82] 刘志远.移动自组网环境下基于推荐的信任模型,计算机工程与应用,2007,43(11):11-14
    [83] Ren, Yonglin, Boukerche, Azzedine. Modeling and managing the trust for wireless and mobile ad hoc networks, ICC 2008, 2008, 2129-2133
    [84] Boukerch, A, Xu, L, EL-Khatib, K. Trust-based security for wireless ad hoc and sensor networks, Computer Communications, 2007, 30(11-12): 2413-2427
    [85] Http://iir.ruc.edu.cn/ppt/2008/WebTrust.ppt, 2008
    [86] Http://www.66wen.com/06gx/tujian/jianzhu/20060821/19790.html, 2006
    [87] Http://baike.baidu.com/view/150886.htm, 2006
    [88] 罗俊海,范明钰.基于博弈的MANETs信模型研究,计算机研究与发展,2008,45(10): 17040-1710
    [89] Otrok, H, Mohammed, N, Wang, L et al. A game-theoretic intrusion detection model for mobile ad-hoc networks, Computer Communications, 2008, 31(4): 708-721
    [90] Yu, W. Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad-hoc networks, IEEE Transactions on Mobile Computing, 2007, 6(5): 507-521
    [91] Gupta, R, Somani, A. K. Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networks, ICPADS 2005, 2005, 244-249
    [92] 王丽颖.重复博弈:信用合作的逻辑路径选择,[博士学位论文].吉林:吉林大学,2005
    [93] 刘业,杨鹏.基于重复博弈的P2P网络信用管理机制的研究,计算机研究与发展,2006,43(4):586-593
    [94] 赵宗渠.P2P环境下一种基于成员组的信任模型,[硕士学位论文].河南:郑州大学,2005
    [95] Ji, Zhu, Yu, Wei, Liu, K. J. Ray. A game theoretical framework for dynamic pricing-based routing in self-organized MANETs, IEEE Journal on Selected Areas in Communications, 2008, 26(7): 1204-1217
    [96] He, Qi, Wu, Dapeng, Khosla, Pradeep. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks, WCNC 2004, 2004, 825-830
    [97] Charles E. Perkins. Elizabeth M. Royer etc. Ad hoc on-demand distance vector (AODV) Routing, Draft-ietf-manet-aodv-08.txt 2, 2001
    [98] D. Johnson, David. Maltz, Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (DSR), Draft-ietf-manet-dsr-10 IETF MANET Working Group INTERNET-DRAFT, 2004
    [99] D. Johnson, Y. Hu, D, Maltz. The dynamic source routing protocol for mobile ad hoc networks for IPv4, IETF RFC 4728, 2007
    [100] Takenaka, Tomoya, Mineno, Hiroshi, Tokunaga, Yuichi et al. Performance evaluation of optimized link state routing-based localization, IPCCC 2007, 2007, 150-159
    [101] Khan, Farrukh Aslam, Song, Wang-Cheol. A location-aware zone-based routing protocol for mobile ad hoc networks, COIN-NGNCON 2006, 2006, 248-250
    [102] Luo Junhal, Fan Mingyu, Ye Danxia. Black hole attack prevention based on authentication mechanism, ICCS 2008, 2008, 173-177
    [103] 罗俊海,范明钰.物理网络拓扑发现算法的研究,西部通信会议 2006,2006,698-702
    [104] 于斌,孙斌,温暖等.NS2与网络模拟,人民邮电出版社,2007,4
    [105] Http://www.isi.edu/nsnam/ns, 2008
    [106] Http://cesl.ee.tsinghua.edu.cn/Thesis/2008libing.pdf, 2008
    [107] 窦文,王怀民,贾焰等.构造基于推荐的Peer-to-Peer环境下的Trust模型,软件学报,2004,15(4):571-583
    [108] Buttyan L, Hubaux J. Stimulating cooperation in self-organizing mobile ad hoc networks, ACM/Kluwer Mobile Networks and Applications, 2003, 8(5): 579-592
    [109] Michiardi P, Molva R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Proc. of the IFIP-Communication and Multimedia Security Conf 2002, 2002, 107-121
    [110] S. Marti, T. J. Giuli, K. Lai, et al. Mitigating routing misbehavior in mobile ad-hoc networks, MobiCom 2000, 2000, 255-265
    [111] Http://xcon.xfocus.org/XCon2003/archives/Xcon2003_jinxin.pdf, 2006
    [112] S. Buchegger, J-Y-L Boudec. Performance analysis of the confidant protocol, MobiHoc 2002, 2002, 226-236
    [113] S. Buchegger, J. -Y Le Boudec. Self-policing mobile ad-hoc networks by reputation, IEEE Communication Magazine, 2005, 43 (7): 101
    [114] F. Azzedin, A Ridha, A. Rizvi. Fuzzy trust for peer-to-peer based systems, PWASET 2007, 2007, 123-127
    [115] N. Griffiths, K. -M Chao, M. Younas. Fuzzy trust for peer-to-peer systems, ICDCSW Workshops 2006, 2006, 1648962
    [116] S. Schmidt, R. Steele, T. S. Dillon et al. Building a fuzzy trust network in unsupervised multi-agent environments, OTM Workshops 2005, 2005, 816-825
    [117] Http://xysy.asyzonline.com/lunwen/wangxinxin.doc, 2006
    [118] F. Yu, H. Zhang, F. Yan. A fuzzy relation trust model in p2p system, Computational Intelligence and Security, 2006 International Conference 2006, 2006, 1497-1502
    [119] M. T. Refaei, V. Srivastava, L. DaSilva et al. A reputation-based mechanism for isolating selfish nodes in ad hoc networks, MOBIQU1TOUS 2005, 2005, 3-11
    [120] 陆音,石进,谢立.基于重复博弈的无线自组网络协作增强模型,软件学报,2008,19(3):755-768
    [121] J. Li, X. Wang, B. Liu et al. A reputation management scheme based on global trust model for peer-to-peer virtual communities, WAIM 2006, 2006, 205-216
    [122] Y. Rebahi, V. Mujica, D. Sisalem. A reputation-based trust mechanism for ad hoc networks, ISCC 2005, 2005, 37-42
    [123] T. Anker, D. Dolev, B. Hod. Cooperative and reliable packet-forwarding on top of AODV, Modeling and Optimization in Mobile, ad-hoc and Wireless Networks, 2006 4th International Symposium on 2006, 2006, 1-10
    [124] Y. Sun, W. Yu, Z. Han et al. Trust modeling and evaluation in ad-hoc networks, GLOBECOM 2005, 2005, 1862-1867
    [125] Maag, Stephane, Grepet, Cyril. A node self similarity approach for interoperability testing of ad hoc routing protocols, AINA 2008, 2008, 983-988
    [126] Carvalho, Marco. Security in mobile ad hoc networks, IEEE Security and Privacy, 2008, 6(2): 72-75
    [127] 李景涛,荆一楠,肖晓春等.基于相似度加权推荐的P2P环境下的信任模型,软件学报,2007,18(1):157-167
    [128] 罗俊海,范明钰,叶丹霞.MANETs环境下的模糊信任模型,计算机应用研究,2008,25(11):3449-3450
    [129] Luo Junhai, Xue Liu, Yi Zhang et al. Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks, LCN 2008, 305-311
    [130] Http://www10.org/cdrom/papers/519/node12.html, 2006
    [131] Http://www10.org/cdrom/papers/519/node13.html, 2006
    [132] Http://www10.org/cdrom/papers/519/node14.html, 2006
    [133] L. Jing-Tao, J. Yi-Nan, X. Xiao-Chun, et al. A trust model based on similarity-weighted recommendation for p2p environments, Mob Netw Appl, 2007, 18(1): 157-167
    [134] P. Michiardi, R. MoNa. Simulation-based analysis of security exposures in mobile ad hoc networks, EW 2002, 2002
    [135] Yang, Li, Kizza, Joseph M, Cemerlic, Alma et al. Fine-grained reputation-based routing in wireless ad hoc networks, IS12007, 2007, 75-78
    [136] Fu, Li Min, Shortliffe, Edward H. Application of certainty factors to neural computing for rule discovery, IEEE Transactions on Neural Networks, 2000, 11(3): 647-657
    [137] Http://web.thnu.edu.cn/zf/wlkc/htm/lilun11_4.html, 2006
    [138] 汪荣贵,张佑生,高隽等.从确信因子模型到Bayes网络,计算机科学2004,31(10):182-188
    [139] 侯孟书,卢显良,任立勇等.基于确定性理论的P2P系统信任模型,电子科技大学学报,2005,34(6):806-808
    [140] Beth, T, Borcherding, M, Klein, B. Valuation of trust in open network, in: Gollmann, D., ed. ESORICS 1994, 3-18
    [141] Abdul-Rahman A, Hailes S. A distributed trust model In: Proc. of the 1997 New Security Paradigms Workshop. Langdale: ACM Press, 1997, 48-60
    [142] Josang, Audun. A logic for uncertain probabilities, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311
    [143] Whitby A, Josang A, Indulska J. Filtering out unfair ratings in Bayesian reputation systems, The Icfain Journal of Management Research, 2005, 4(2): 48-64
    [144] 唐文,陈钟.基于模糊集合理论的主观信任管理模型研究,软件学报,2003,14(8):1401-1408
    [145] 哈明虎,李海军.两种改进的相似度及模糊推理方法,计算机工程与应用,2005,35(1):31-34
    [146] Manickarn, J. Martin Leo, Shanmugavel, S. Fuzzy based trusted ad hoc on-demand distance vector routing protocol for MANET, ADCOM 2007, 2007, 414-421
    [147] 刘伟,蔡嘉勇,贺也平.一种基于信任度的自组安全互操作方法,软件学报,2007,18(8):1958-1967
    [148] Dombi, Jozsef. Towards a general class of operators for fuzzy systems, IEEE Transactions on Fuzzy Systems, 2008, 16(2): 477-484
    [149] 时金桥,程晓明.匿名通信系统中自私行为的惩罚机制研究,通信学报,2006,27(2):80-86
    [150] Komathy, K, Narayanasam P. Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad-hoc networks, Computer Communications, 2007, 30(18): 3721-3735
    [151] Narula, Prayag, Dhurandher, Sanjay Kumar, Misra, Sudip et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing, Computer Communications, 2008, 31(4): 760-769
    [152] Vasantha, V, Manimegalai, D. Mitigating routing misbehaviors using subjective trust model in mobile ad hoc networks, ICCIMA 2007, 2008, 417-422
    [153] Nehra, Neeraj, Patel, R. B, Bhat, V. K. Trust aware routing with load balancing in ad hoc network using mobile agent, CIS Workshops 2007, 2007, 454-459
    [154] Wang, Kun, Wu, Meng, Shen, Subin. A trust evaluation method for node cooperation in mobile ad hoc networks, ITNG 2008, 2008, 1000-1005
    [155] Kannhavong, Bounpadith, Nakayama, Hidehisa, Kato, Nei et al. A study of a routing attack in OLSR-based mobile ad hoc networks, International Journal of Communication Systems, 2007, 20(11): 1245-1261
    [156] Satyanarayana, A. Unified formula for analysis of some network reliability problems, IEEE Transactions on Reliability, 1982, R-31(1):23-32
    [157] Kannhavong,Bounpadith,Nakayama, Hidehisa, Nemoto, Yoshiaki et al.A survey of routing attacks in mobile ad hoc networks, IEEE Wireless Communications, 2007,14(5): 85-91
    [158] O. Katsuhiko.System dynamics (Fourth Edition), New Jersey: Prentice Hall, 2003
    [159] Andel, Todd R, Yasinsac, Alec.Adaptive threat modeling for secure ad hoc routing protocols, Electronic Notes in Theoretical Computer Science, 2008,197(2):3-14
    [160] Zouridaki, Charikleia,Mark, Brian L, Hejmo, Marek.Byzantine robust trust establishment for mobile ad hoc networks, Telecommunication Systems, 2007,35(3-4): 189-206
    [161] Long Zheng, J. L. Zhou.Optimization of military transportation path based on generalized cut set algorithm, Computer Engineering, 2007, 33(11): 4-9
    [162] Long Zheng, Xue Liu, Jinglun Zhou.Frequency-domain reliability analysis and modeling of networked control systems, FeBID 2008,2008, 35-40
    [163] Rentel, Carlos H, Kunz, Thomas.A mutual network synchronization method for wireless ad hoc and sensor networks, IEEE Transactions on Mobile Computing,2008, 7(5): 633-645

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700