Advanced Search
Volume 31 Issue 7
Dec.  2010
Turn off MathJax
Article Contents
Ji Jun-jie, Yang Xiao-long, Wang Jin, Wu Xiong-biao, Lin Jian-ren, Long Ke-ping. An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1576-1581. doi: 10.3724/SP.J.1146.2008.00615
Citation: Ji Jun-jie, Yang Xiao-long, Wang Jin, Wu Xiong-biao, Lin Jian-ren, Long Ke-ping. An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1576-1581. doi: 10.3724/SP.J.1146.2008.00615

An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks

doi: 10.3724/SP.J.1146.2008.00615
  • Received Date: 2008-05-15
  • Rev Recd Date: 2009-03-02
  • Publish Date: 2009-07-19
  • Nowadays, IP networks are suffering many faults and malicious attacks which greatly threaten its security and survivability. So it is an important issue that how to make the IP networks to be more robust under faults and attacks, i.e., to improve their tolerance abilities for both fault and intrusion. However recently, most of the researches focus on only one of them, and decouple the survivability and security each other. According to the trust model in social networks, this paper proposes an efficient fault-tolerant and intrusion-tolerant scheme based on trust relationship for IP networks. This scheme not only borrows the trust rating from the social links, but also qualitatively describes the relationships between the trust rating and the network behavior. Then, this paper analyses the scheme how to tolerate three known malicious behaviors, viz., self-faults, bad mouth attacks and conflict behavior attacks. Finally, the numeric simulation results show that the scheme can detect the malicious nodes fast and accurately and efficiently prevent these malicious behaviors in IP networks.
  • loading
  • Kodian A A. Advances in p-cycle network design. [Ph.D.dissertation]. Department of Electrical and ComputerEngineering, University of Alberta. Spring 2006.[2]Cholda P and Jajszczyk A. Reliability assessment of opticalp-cycles[J].IEEE/ACM Transactions on Networking.2007,15(6):1579-1592[3]Chen Hai-guang, Han Peng, and Yu Bo, et al.. A new kind ofsession keys based on message scheme for sensor networks.The Seventeenth Asia Pacific Microwave Conference (APMC2005), Suzhou, China, Dec. 4-7, 2005: 1-4.[4]Karlof C, Sastry N, and Wagner D. TinySec: A link layersecurity architecture for wireless sensor networks.Proceedings of the Second ACM Conference on EmbeddedNetworked Sensor Systems (SenSys 2004), Baltimore,Maryland, USA, 2004: 162-175.[5]Chen Hai-guang, Han Peng, and Zhou Xi, et al.. Lightweightanomaly intrusion detection in wireless sensor networks.PAISI, 2007, LNCS 4430: 106-116.[6]Resnick P and Zeckhauser R. Trust among strangers ininternet transactions: empirical analysis of Ebays reputationsystem. Advances in Applied Microeconomics: TheEconomics of the Internet and E-Commerce, (Michael R B.ed.) Amsterdam: Elsevier/JAI Press, 2002, 11: 127-157.[7]Buchegger S and Le Boudec J Y. Performance analysis of theCONFIDANT protocol (cooperation of nodes-fairness indynamic ad-hoc networks). Proceedings of MobiHoc 2002,Lausanne, CH, June 2002: 226-236.[8]Ganeriwal S and Srivastava M B. Reputation-basedframework for high integrity sensor networks. SASN04,Washington, D.C., USA, October 25, 2004: 66-77.[9]Srinivasan A.[J].Teitelbaum J, and Wu J. DRBTS: Distributedreputation-based beacon trust system. The 2nd IEEEInternational Symposium on Dependable, Autonomic andSecure Computing (DASC06), Indianapolis, USA.2006,:-[10]Chen Hai-guang, Wu Hua-feng, and Zhou Xi, et al.. Agentbasedtrust model in wireless sensor networks. DOI 10.1109/SNPD. 2007, 122: 119-124.[11]Newman M E J. The structure and function of complexnetworks[J].SIAM Review.2003, 45(2):167-256[12]Dellarocas C. Mechanisms for coping with unfair ratings anddiscriminatory behavior in online reputation reportingsystems. Proceedings of ICIS, Brisbane, Australia, 2000:520-525.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3173) PDF downloads(969) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return