首页 | 本学科首页   官方微博 | 高级检索  
     

基于隐藏标签节点的跨网络认证方法仿真
引用本文:江楠,蔡增玉,李祖贺.基于隐藏标签节点的跨网络认证方法仿真[J].计算机仿真,2020,37(1):152-155,289.
作者姓名:江楠  蔡增玉  李祖贺
作者单位:郑州轻工业大学计算机与通信工程学院,河南郑州450000;郑州轻工业大学计算机与通信工程学院,河南郑州450000;郑州轻工业大学计算机与通信工程学院,河南郑州450000
摘    要:针对当前跨网络认证相关研究成果存在安全性能较差的问题,提出基于隐藏标签节点的跨网络认证方法。筛选出网络范围内度数比较大的节点当作识别目标,加入待配准节点聚类社团信息,分类挖掘隐藏标签节点,并将隶属同一类别的社团标签节点添加至待配准节点自中心网络范围,根据标签节点找到最优配准结果,通过迭代思想持续更新标签节点集合,直到不再有新标签节点出现,从而实现网络中全部节点身份识别;基于身份识别下的节点归类初步认证,结合信任度理念,实现跨网络的进一步认证,获取认证双方的信任度,构建网络之间信任关系,并同意访问本网络的数据资源,完成跨网络认证。实验结果表明,所提方法可有效检测出跨网络认证中的恶意访问,安全性能优于当前成果。

关 键 词:隐藏标签节点  跨网络  认证

Simulation of Cross-Network Authentication Method Based on Hidden Tag Node
JIANG Nan,CAI Zeng-yu,LI Zu-he.Simulation of Cross-Network Authentication Method Based on Hidden Tag Node[J].Computer Simulation,2020,37(1):152-155,289.
Authors:JIANG Nan  CAI Zeng-yu  LI Zu-he
Affiliation:(College of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou Henan 450000,China)
Abstract:A cross-network authentication method based on hidden tag nodes was presented.First of all,the nodes whose degrees were relatively large within the network range were screened as the identification targets.After that,the cluster community information of the node to be registered was added,and the hidden label nodes were mined and classified.Moreover,the community tag nodes which belonged to the same category were added to the self-center network range of the node to be registered.According to the label node,the optimal registration result was found.In addition,the set of tag nodes was continuously updated through the iterative idea until there were no more new nodes,so that the identification of all the nodes in network was achieved.Based on the initial authentication of node classification under identity recognition,combined with the concept of credibility,the further authentication across the network was achieved to obtain the trust between the two parties.Finally,the trust relationship between the networks was constructed and the data resources accessing the network were agreed to finish the cross-network au-thentication.Simulation results prove that the proposed method can effectively detect malicious access in cross-net-work authentication.Meanwhile,the security performance is better than that of current results.
Keywords:Hide tag nodes  Cross-network  Certification
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号