首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于半环理论的可信性评估模型
引用本文:田俊峰,陈小祥,刘涛. 一种基于半环理论的可信性评估模型[J]. 计算机工程与应用, 2008, 44(15): 88-91. DOI: 10.3778/j.issn.1002-8331.2008.15.028
作者姓名:田俊峰  陈小祥  刘涛
作者单位:河北大学数学与计算机学院,河北,保定,071002;河北大学数学与计算机学院,河北,保定,071002;河北大学数学与计算机学院,河北,保定,071002
摘    要:在网络安全领域,可信指的是参加各种协议的各个实体之间关系的集合,这些关系是建立在实体在某个协议之上进行相互操作的行为之上的,为了加强网络的安全性,评估结点的可信性是非常重要的。讨论了对可信事件的评估:首先介绍了可信的相关概念和相关的特性;接着评估过程被建模成一个在有向图寻找最短路径的问题,在该有向图中结点表示实体或者用户,边表示可信关系,通过使用半环理论,建立了一个基于半环的可信性评估模型TD-SEMIRING,在两个以前没有进行相互操作的实体之间建立间接的可信关系,介绍了这个模型在路由选择当中的应用;最后,通过仿真实验,验证、分析了该模型的有效性。

关 键 词:可信  可信评估  可信评估模型  半环  Ad-Hoc网络
文章编号:1002-8331(2008)15-0088-04
收稿时间:2007-12-25
修稿时间:2007-12-25

Trust evaluation model based on semiring
TIAN Jun-feng,CHEN Xiao-xiang,LIU Tao. Trust evaluation model based on semiring[J]. Computer Engineering and Applications, 2008, 44(15): 88-91. DOI: 10.3778/j.issn.1002-8331.2008.15.028
Authors:TIAN Jun-feng  CHEN Xiao-xiang  LIU Tao
Affiliation:Institute of Computer Network Technology,Hebei University,Baoding,Hebei 071002,China
Abstract:The notion of trust,in the realm of network security,will for our purposes correspond to a set of relations among entities that participate in a protocol.These relations are based on the evidence generated by the previous interactions of entities within a protocol.To enhance security in Ad-Hoc networks,it is important to evaluate the trustworthiness of other nodes without centralized authorities.In this work,authors focus on the evaluation of trust evidence in Ad Hoc networks.First,the authors introduce the metrics of the trust,the evaluation process is modeled as a path problem on a directed graph,where nodes represent entities,and edges represent trust relations.Using the theory of semirings,a trust evaluation model based on semiring(TD-SEMIRING) is developed,then two nodes can establish an indirect trust relation without previous direct interaction and introduce the application of this model in route election.At last,the feasibility of this model is analyzed.
Keywords:trust  trust evaluation  trust model  semiring  Ad-Hoc networks
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号