ISSN 1000-1239 CN 11-1777/TP

• 论文 • 上一篇    下一篇

一种移动自组网中信任评估模型的设计

叶阿勇1,2 马建峰1   

  1. 1(西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071) 2(福建师范大学网络安全与密码技术重点实验室 福州 350007) (yay@fjnu.edu.cn)
  • 出版日期: 2008-05-15

A Trust Valuation Model in MANET

Ye Ayong1,2 and Ma Jianfeng1   

  1. 1(Key Laboratory of Ministry of Education for Computer Networks and Information Security, Xidian University, Xi’an 710071) 2(Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350007)
  • Online: 2008-05-15

摘要: 移动自组网不依赖于任何固定的网络设施,节点间的相互信任对网络的可靠运行和安全保障具有重要意义.提出一个用于度量网络服务间信任关系的信任评估模型.模型采用证据理论来评价服务信任和综合多方推荐的经验;引入观察帧体现出经验的时间性;提出一个低开销的邻居共享机制用于节点间交换经验信息;采用模糊贴近度来量化描述推荐信任.与几个现有的工作相比,设计一个较完整的信任评估模型,并强调其动态适应能力、鲁棒性和资源的最小开销,信任评估模型可为节点间的协同和安全决策提供依据.

关键词: 移动自组网, 网络安全, 信任评估, 动态信任, 证据理论

Abstract: Being infrastructureless, node trust plays an important role in security and reliability of mobile ad hoc networks. A new trust valuation model based on the experience of node is given to evaluate trustworthiness between network nodes. To improve the accuracy and rationality of node trust evaluation in a mobile network, the evidence theory is introduced to evaluate trust and combine multilateral experience from others. In addition, observationframe is introduced to incorporate experience’s timesensitivity, which provides adequate support to cope with strategically altering behaviors of malicious nodes efficiently. A lowcost recommendation technique based on sleep mechanism is provided for neighboring nodes to share experience information, which obtains faster convergence rate and reduces the whole energy dissipation. Together, recommendation trust is quantitatively evaluated by a fuzzy similarity measure, which significantly increases the resilience against dishonest feedbacks. In comparison with the existing works, a complete trust valuation model is designed, with emphasis on its adaptability to dynamics of trust, robustness and resourcesaving. This model can be used in coordination and security decision for network services. Finally, the theoretical analysis and simulations is given to evaluate the proposed techniques.

Key words: MANET, network security, trust valuation, dynamic trust, evidence theory