期刊文献+

基于模糊逻辑的Ad Hoc网络信任模型研究 被引量:2

Research of trust model based on fuzzy logic for Ad Hoc network
在线阅读 下载PDF
导出
摘要 为了研究Ad Hoc网络中节点间的信任关系,借助于模糊逻辑的知识,提出了一种基于模糊逻辑的Ad Hoc网络信任模型。该信任模型考虑了影响Ad Hoc网络信任的几个因素,并用模糊逻辑的方法来处理它们以得到节点的信任值。由仿真示例可以看出,该模型符合现实中的信任行为。 To study the trust relations between nodes in Ad Hoc network, a trust model based on fuzzy logic for Ad Hoc network was presented with the help of the knowledge of fuzzy logic. This model takes the account of several factors that WIU affect the trust in Ad Hoc network. Then a method based on fuzzy logic was used to deal with them for calculating the trust values of nodes. The results of the simulation show that this model is similar to the trust behavior in real life.
出处 《计算机应用》 CSCD 北大核心 2007年第9期2170-2173,共4页 journal of Computer Applications
基金 国家863计划项目(863-104-01-03)
关键词 Ad HOC网络 信任模型 模糊逻辑 模糊推理 隶属函数 Ad Hoc network trust model fuzzy logic fuzzy inference membership function
  • 相关文献

参考文献5

二级参考文献67

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2Beth T,Borcherding,M Klein B.Valuation of trust in open networks[C].In:Proceedings of the European Symposium on Research in Security (ESOR1CS), Brighton: Springer-Verglag, 1999: 59~63
  • 3Abdul-Rahman A,Hailes S.A distributed trust model[C].In :Proceedings of the 1997 New Security Paradigms Workshop,Cumbria,UK:ACM Press, 1998:48~60
  • 4Jφsang A.A model for trust in security systems[C].In:Proceedings of the 2nd Nordic Workshop on Secure Computer Systems, 1997
  • 5Jφsang A.A subjective metric of authentication[C].In:Proceedings of the ESORICS'98,Louvain-la-Neuve,Springer Verlag,1998:329~344
  • 6Mui L,Mohtashemi M,Halberstadt M.A computational model of trust and reputation[C].In:Proceedings of the 35th Hawaii International Conference on System Sciences,2002
  • 7Wang Y,Vassileva J.Bayesian network-based trust model[C].In: Proceedings of the IEEE/WIC international Conference on Web Intelligence ( WI'03 ), 2003
  • 8Guha R,Kumar R,Raghavan P.Propagation of trust and distrust,WWW2004,New York,USA,2004:17~22
  • 9Yu B,Munindar P. An evidential model of distributed reputation management[C].In: AAMAS02,2002-07:15 ~ 19
  • 10P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.

共引文献165

同被引文献26

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部