高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于信任关系的IP网络容错容侵机制

纪俊杰 阳小龙 王进 吴雄飚 林建人 隆克平

纪俊杰, 阳小龙, 王进, 吴雄飚, 林建人, 隆克平. 基于信任关系的IP网络容错容侵机制[J]. 电子与信息学报, 2009, 31(7): 1576-1581. doi: 10.3724/SP.J.1146.2008.00615
引用本文: 纪俊杰, 阳小龙, 王进, 吴雄飚, 林建人, 隆克平. 基于信任关系的IP网络容错容侵机制[J]. 电子与信息学报, 2009, 31(7): 1576-1581. doi: 10.3724/SP.J.1146.2008.00615
Ji Jun-jie, Yang Xiao-long, Wang Jin, Wu Xiong-biao, Lin Jian-ren, Long Ke-ping. An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1576-1581. doi: 10.3724/SP.J.1146.2008.00615
Citation: Ji Jun-jie, Yang Xiao-long, Wang Jin, Wu Xiong-biao, Lin Jian-ren, Long Ke-ping. An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1576-1581. doi: 10.3724/SP.J.1146.2008.00615

基于信任关系的IP网络容错容侵机制

doi: 10.3724/SP.J.1146.2008.00615
基金项目: 

国家973计划项目(2007CB310706),国家杰出青年科学基金(60725104)和国家自然科学基金(60672045,60873263)资助课题

An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks

  • 摘要: 目前IP网络受自身故障和网络攻击等异常行为影响较过去更深广。因此如何增强IP网络的容错和容侵能力显得尤为重要。但是目前很多的研究仅关注其中一个方面,而很少两者兼有,从而不能很好地兼顾安全性和可生存性。该文提出了一种有效的基于信任关系的容错容侵机制。该机制借用了社会网络中的信任关系思想,定量地描述了信任关系值与网络行为的对应关系某节点的恶意行为会使得自己在其他节点处的信任值下降。然后,分析了该机制如何对3种网络异常,即自身故障、诋毁攻击和矛盾行为攻击的容忍能力。最后,仿真结果和分析表明该机制可以迅速而精确地检测到异常节点,并能有效地阻止这些异常对网络的攻击和破坏。
  • Kodian A A. Advances in p-cycle network design. [Ph.D.dissertation]. Department of Electrical and ComputerEngineering, University of Alberta. Spring 2006.[2]Cholda P and Jajszczyk A. Reliability assessment of opticalp-cycles[J].IEEE/ACM Transactions on Networking.2007,15(6):1579-1592[3]Chen Hai-guang, Han Peng, and Yu Bo, et al.. A new kind ofsession keys based on message scheme for sensor networks.The Seventeenth Asia Pacific Microwave Conference (APMC2005), Suzhou, China, Dec. 4-7, 2005: 1-4.[4]Karlof C, Sastry N, and Wagner D. TinySec: A link layersecurity architecture for wireless sensor networks.Proceedings of the Second ACM Conference on EmbeddedNetworked Sensor Systems (SenSys 2004), Baltimore,Maryland, USA, 2004: 162-175.[5]Chen Hai-guang, Han Peng, and Zhou Xi, et al.. Lightweightanomaly intrusion detection in wireless sensor networks.PAISI, 2007, LNCS 4430: 106-116.[6]Resnick P and Zeckhauser R. Trust among strangers ininternet transactions: empirical analysis of Ebays reputationsystem. Advances in Applied Microeconomics: TheEconomics of the Internet and E-Commerce, (Michael R B.ed.) Amsterdam: Elsevier/JAI Press, 2002, 11: 127-157.[7]Buchegger S and Le Boudec J Y. Performance analysis of theCONFIDANT protocol (cooperation of nodes-fairness indynamic ad-hoc networks). Proceedings of MobiHoc 2002,Lausanne, CH, June 2002: 226-236.[8]Ganeriwal S and Srivastava M B. Reputation-basedframework for high integrity sensor networks. SASN04,Washington, D.C., USA, October 25, 2004: 66-77.[9]Srinivasan A.[J].Teitelbaum J, and Wu J. DRBTS: Distributedreputation-based beacon trust system. The 2nd IEEEInternational Symposium on Dependable, Autonomic andSecure Computing (DASC06), Indianapolis, USA.2006,:-[10]Chen Hai-guang, Wu Hua-feng, and Zhou Xi, et al.. Agentbasedtrust model in wireless sensor networks. DOI 10.1109/SNPD. 2007, 122: 119-124.[11]Newman M E J. The structure and function of complexnetworks[J].SIAM Review.2003, 45(2):167-256[12]Dellarocas C. Mechanisms for coping with unfair ratings anddiscriminatory behavior in online reputation reportingsystems. Proceedings of ICIS, Brisbane, Australia, 2000:520-525.
  • 加载中
计量
  • 文章访问数:  3173
  • HTML全文浏览量:  89
  • PDF下载量:  969
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-05-15
  • 修回日期:  2009-03-02
  • 刊出日期:  2009-07-19

目录

    /

    返回文章
    返回