首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种基于深度优先的开放网络可信路径搜索方法
引用本文:张琳,姜民明,王汝传,王海艳.一种基于深度优先的开放网络可信路径搜索方法[J].成都信息工程学院学报,2011,26(5):538-543.
作者姓名:张琳  姜民明  王汝传  王海艳
作者单位:1. 南京邮电大学计算机学院,江苏南京210003;江苏省无线传感网高技术研究重点实验室,江苏南京210003;宽带无线通信与传感网技术教育部重点实验室,江苏南京210003
2. 南京邮电大学计算机学院,江苏南京,210003
基金项目:国家自然科学基金资助项目(60973139、60773041);江苏省科技支撑计划(工业)资助项目(BE2010197、BE2010198);江苏省级现代服务业发展专项资金;高校科研成果产业化推进工程资助项目(JH10-14);江苏高校科技创新计划资助项目(CX10B-196Z);江苏省六大高峰人才资助项目(2008118);教育部高等学校博士学科点专项科研基金资助项目(20103223120007)
摘    要:现有的安全解决方案已不再适应开放网络对安全的需求,系统的可信性将逐渐成为研究的趋势。借助消息机制给出了信任在各节点的部署方案;讨论了可信路径搜索的多个细节问题,包括对节点的交互能力和诚实能力的区分,对3个影响因素的分析,及对特殊位置处节点的处理;结合递归的思想,设计了深度优先遍历的可信路径搜索策略,仿真实验结果表明模型与人类社会中的交往关系是相吻合的。

关 键 词:信息安全  信任传播  开放网络  信任模型

Trusted Path-searching Method Based on Depth-first for Open Network
ZHANG Lin,JIANG Min-ming,WANG Ru-chuan,WANG Hai-yan.Trusted Path-searching Method Based on Depth-first for Open Network[J].Journal of Chengdu University of Information Technology,2011,26(5):538-543.
Authors:ZHANG Lin  JIANG Min-ming  WANG Ru-chuan  WANG Hai-yan
Institution:1,2,3(1.College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;2.Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Jiangsu Province,Nanjing 210003,China;3.Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education Jiangsu Province,Nanjing,Jiangsu 210003,China)
Abstract:The traditional security solution has not met the needs of open network. Trusted system will be an important research trend in security area. A trust deployment scheme was proposed amongst net nodes based on message mechanism. The problems of trusted path-searching were discussed in detail, including making distinction between interaction and honesty attributes, analyzing three major influencing factors, and dealing with particular position nodes. The newly trusted path-searching strategies were presented with recursive depth-first searching method. Experimental results show the presented model is well conform to the social communication relations.
Keywords:information security  trust transitivity  open network  trust model
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号