高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于自适应遗忘机制的半环信任模型

喻莉 李静茹 刘祖浩

喻莉, 李静茹, 刘祖浩. 基于自适应遗忘机制的半环信任模型[J]. 电子与信息学报, 2011, 33(1): 175-179. doi: 10.3724/SP.J.1146.2010.00221
引用本文: 喻莉, 李静茹, 刘祖浩. 基于自适应遗忘机制的半环信任模型[J]. 电子与信息学报, 2011, 33(1): 175-179. doi: 10.3724/SP.J.1146.2010.00221
Yu Li, Li Jing-Ru, Liu Zu-Hao. Semiring Trust Model Based on Adaptive Forgetting Scheme[J]. Journal of Electronics & Information Technology, 2011, 33(1): 175-179. doi: 10.3724/SP.J.1146.2010.00221
Citation: Yu Li, Li Jing-Ru, Liu Zu-Hao. Semiring Trust Model Based on Adaptive Forgetting Scheme[J]. Journal of Electronics & Information Technology, 2011, 33(1): 175-179. doi: 10.3724/SP.J.1146.2010.00221

基于自适应遗忘机制的半环信任模型

doi: 10.3724/SP.J.1146.2010.00221
基金项目: 

国家863计划项目(2009AA01Z205),国家实验室基金(P080010)和新世纪优秀人才计划(NCET070339)资助课题

Semiring Trust Model Based on Adaptive Forgetting Scheme

  • 摘要: 半环代数由于可以很好地描述可信度计算规则问题,因此可用来计算节点间的可信度,而目前存在的半环信任模型并未定义基于时间的动态变化问题。该文提出了一种基于自适应遗忘机制的半环信任模型,刻画信任的动态性,并改进已有的半环信任模型,弥补了其未定义动态变化问题的缺陷。仿真结果表明,这种基于自适应遗忘机制的半环信任模型有效分辨正常节点和异常节点,并抵御开关攻击,从而可有效提高网络的安全性。
  • Sun Yan (Lindsay), Han Zhu, and Liu K J R. Defense of trust management vulnerabilities in distributed networks[J]. IEEE Communications Magazine, 2008, 46(2): 112-119.[2]Buchegger S and Le Boudec Jean-Yves. Self-policing mobile Ad hoc networks by reputation systems[J]. IEEE Communications Magazine, 2005, 43(7): 101-107.[3]Sun Yan (Lindsay), Yu Wei, Han Zhu, and Liu K J R. Information theoretic framework of trust modeling and evaluation for Ad hoc networks[J].IEEE Journal on Selected Areas in Communications.2006, 24(2):305-317[4]Liao Hong-mei, Wang Qian-ping, and Li Guo-xin. A fuzzy logic-based trust model in grid[C][J].International Conference on Networks Security, Wireless Communications and Trusted Computing(NSWCTC 09), Wuhan, China, April 25-2.2009, 1:608-614[5]Theodorakopoulos G and Baras S. On trust models and trust evaluation metrics for Ad hoc networks[J].IEEE Journal on Selected Areas in Communications.2006, 24(2):318-328[6]Zhang Ming-wu, Yang Bo, and Zhang Wen-zheng. A semiring privacy protect model[C]. IFIP International Conference on Network and Parallel Computing Workshops, Dalian, China, 2007: 255-262.[7]Zhang Yun-chang.[J].Chen Shan-shan, and Yang Geng. SFTrust: a double trust metric based trust model in unstructured P2P system[C]. Source, IPDPS archive Proceedings of the 2009 IEEE International Symposium on ParallelDistributed Processing(IPDPS 2009), Rome, Italy, May 25-2.2009,:-[8]Perrone L F and Nelson S C. A study of on-off attack models for wireless Ad hoc networks[C]. First IEEE International Workshop on Operator-Assisted (Wireless Mesh) Community Networks (OpComm 2006), Berlin, Germany, Sept. 2006: 1-10.[9]Li J, Li R, and Kato J. Future trust management framework for mobile Ad hoc networks[J]. IEEE Communications Magazine, 2008, 46(4): 108-114.[10]Zouridaki C, et al.. A quantitative trust establishment framework for reliable data packet delivery in MANETs[C]. Proc. 3rd ACM Wksp. Sec. Ad hoc and Sensor Networks, Alexandria, Virginia, USA, Nov. 7, 2005: 1-10.[11]Chang E, Thomson P, Dillon T, and Hussain F. The fuzzy and dynamic nature of trust[C]. LNCS 3592, Berlin, Springer-Verlag, 2005: 161-174.
  • 加载中
计量
  • 文章访问数:  3624
  • HTML全文浏览量:  93
  • PDF下载量:  843
  • 被引次数: 0
出版历程
  • 收稿日期:  2010-03-11
  • 修回日期:  2010-09-02
  • 刊出日期:  2011-01-19

目录

    /

    返回文章
    返回