Advanced Search
Volume 32 Issue 6
Jun.  2010
Turn off MathJax
Article Contents
Yu Yao, Li Zhe, Liu Jun, Liu Cui-xiang, Guo Lei. A Feasible Dynamic Reputation Evaluation Model in Hierarchical Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2010, 32(6): 1469-1474. doi: 10.3724/SP.J.1146.2009.00720
Citation: Yu Yao, Li Zhe, Liu Jun, Liu Cui-xiang, Guo Lei. A Feasible Dynamic Reputation Evaluation Model in Hierarchical Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2010, 32(6): 1469-1474. doi: 10.3724/SP.J.1146.2009.00720

A Feasible Dynamic Reputation Evaluation Model in Hierarchical Ad hoc Networks

doi: 10.3724/SP.J.1146.2009.00720
  • Received Date: 2009-05-12
  • Rev Recd Date: 2009-09-28
  • Publish Date: 2010-06-19
  • In this paper, a dynamic reputation evaluation model is proposed to meet the characteristic and security requirement in hierarchical Ad hoc networks. In this model, the reputation relationship is defined with the consideration of related nodes roles and function, and the reputation evaluation mechanism is built based on the correlation among nodes to evaluate and update reputation information of nodes with different roles. The cluster reputation is monitored by the cluster head in this model to solve the slow convergence speed issue in traditional reputation calculation. Simulation results show that, compared to traditional reputation evaluation models, the model proposed in this paper can more real-time and accurately reflect the security status in hierarchical Ad hoc networks.
  • loading
  • Sung Sul-yun.[J].Seo Yuh-wa, and Shin Yong-tae. Hierarchical clustering algorithm based on mobility in mobile Ad hoc networks [C]. 2006 International Conference on Computational Science and its Applications (ICCSA2006), Scotland, UK.2006,:-[2]Elhdhili M E, Azzouz L B, and Kamoun F. CASAN: Clustering algorithm for security in Ad hoc networks [J].Computer Communication.2008, 31(13):2972-2980[3]胡华平, 胡光明, 董攀, 等. 大规模移动自组网络安全技术综述[J]. 计算机研究与发展, 2007, 44(4): 545-552.Hu Hua-ping, Hu Guang-ming, and Dong Pan, et al.. Survey of security technology for large scale MANET[J].Journal of Computer Research and Development.2007, 44(4):545-552[4]李小勇, 桂小林. 大规模分布式环境下动态信任模型研究[J]. 软件学报, 2007 , 16(6): 1510-1521.[5]Li Xiao-yong and Gui Xiao-lin. Research on dynamic trust model for large scale distributed environment[J]. Journal of Software, 2007, 16(6): 1510-1521.[6]Mundinger J and Boudec J L. Analysis of a reputation system for mobile Ad-hoc networks with liars[J].Performance Evaluation.2008, 65(3/4):212-226[7]肖德琴, 冯健昭, 周权, 等. 基于高斯分布的传感器网络信誉模型[J]. 通信学报, 2008, 29(3): 47-53.Xiao De-qin, Feng Jian-zhao, and Zhou Quan, et al.. Gauss reputation framework for sensor networks[J]. Journal on Communications, 2008, 29(3): 47-53.[8]Otrok H, Mohammed N, and Wang Ling-yu, et al.. A game-theoretic intrusion detection model for mobile Ad hoc networks [J].Computer Communications.2008, 31(4):708-721[9]钱海, 马建辉, 王旭法. 一种新的免疫协同多Agent模型及其仿真分析[J]. 系统仿真学报, 2008, 20(13): 3436-3439.Qian Hai, Ma Jian-hui, and Wang Xu-fa. Novel immune cooperative multi-agent model and its simulation analyses[J]. Journal of System Simulation, 2008, 20(13): 3436-3439.[10]鲍宇, 曾国荪, 曾连荪, 等. P2P网络中防止欺骗行为的一种信任度计算方法[J]. 通信学报, 2008, 29(10): 215-222.Bao Yu, Zeng Guo-sun, and Zeng Lian-sun, et al.. Reputation based on new metric in P2P network[J]. Journal on Communications, 2008, 29(10): 215-222.[11]Yu Yao, Guo Lei, and Wang Xing-wei, et al.. A new node role-based reputation model in hierarchial Ad hoc networks[C]. International Joint Conference on INC, IMS and IDC, Seoul, Korea, 2009: 457-461.[12]Ganeriwal S and Srivastava M B. Reputation-based framework for high integrity sensor networks [C]. Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, Washington, DC, USA, 2004: 66-77.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3296) PDF downloads(560) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return