期刊文献+

一种协同过滤的Ad-hoc网络可信路由协议 被引量:3

A Trust Routing Based on Collaborative Filtering in Ad-hoc Networks
在线阅读 下载PDF
导出
摘要 为了提高无线Ad-hoc网络数据传输可靠性,在分析了信任模型类型及可能受到的攻击的基础上,结合D-S证据理论提出一种基于节点工作状态的信任模型DCTM(Trust Model based on Dempster-Shafer theory and Collaborative Filtering recommendation),在信任模型中,考虑了节点间的直接信任与推荐信任,并通过协同过滤技术计算节点之间的相似度,结合交易密度因子设定了推荐权重,以减少恶意推荐等信任攻击.改进AODV路由算法,设计了可信路由,通过仿真实验验证了该算法能有效避免不信任节点,提供更为可靠的数据传输服务. In order to improve the reliability of Ad-hoc networks data transmission, in this paper, trust model types and attacks against them were analyzed, then proposed a trust model DCTM ( Trust Model based on Dempster-Shafer theory and Collaborative Filtering recommendation } based on node working state which was combined with D-S evidence theory. In this trust model, direct trust and recommendation trust was considered, using collaborative filtering to calculate the similarity between nodes, combined with exchange density factor and nodes' similarity , recommendation weight was set which can reduce the malicious recommendation trust attack. Meanwhile, based on the AODV, a trusted routing was given. Simulation results show that the new algorithm can resist attacks, and provides more reliable data transmission.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第10期2329-2334,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金面上项目(61070174 61371119)资助
关键词 AD-HOC网络 信任模型 D-S证据理论 协同过滤 可靠路由 Ad-hoc network trust model D-S evidence theory collaborative filtering reliable routing
  • 相关文献

参考文献5

二级参考文献50

  • 1王建新,张亚男,王伟平,卢锡城.移动自组网中基于声誉机制的安全路由协议设计与分析[J].电子学报,2005,33(4):596-601. 被引量:19
  • 2朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 3张骞,张霞,文学志,刘积仁,Ting Shan.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107. 被引量:71
  • 4DING GANG, BHARGAVA B. Peer-to-peer file-sharing over mobile Ad Hoc networks [ C]// Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Work-shops. Washington, DC: IEEE Computer Society, 2004: 104.
  • 5BLAZE M, FEIGENBAUM J, LACY J. Decent ralized trust management [ C]// Proceedings of the 1996 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1996: 164 - 173.
  • 6KAMVAR S D, SCHOLSSER M T, GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks [ C]// Proceedings of the 12th International Conference on World Wide Web. New York: ACM, 2003:640 -651.
  • 7SONG S, HWANG K, ZHOU R. Trusted P2P transactions with fuzzy reputation aggregation [ J]. IEEE Internet Computing, 2005, 9(6): 24-34.
  • 8REPANTIS T, KALOGERAKI V. Decentralized trust management for Ad-Hoc peer-to-peer networks [ C]// MPAC 2006: Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-Hoc Computing. New York: ACM, 2006: 6.
  • 9LI XIONG, LING LIU. PeerTrust: Sopporting reputation-based trust for peer-to-peer electronic communities [ J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843 -857.
  • 10LIANG ZHENGQIANG, SHI WEISONG. PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing [ C]// Proceedings of the 38th Hawaii International Conference on System Sciences. Washington, DC: IEEE Computer Society, 2005: 201 - 202.

共引文献73

同被引文献14

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部