A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks

来源 :第八届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:aibang027123456
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  In the harsh environment where node density is sparse.the slow-moving nodes cannot effectivelv utilize the encountering opportunities to realize the self-organized identity authentications.and do not have the chance to join the network routing However.considering most of the communcationsin opportunistic networks are caused bv forwarding operations.there is no need to establish the complete mutual authentications for each conversation Accordingly.a novel trust management scheme is presented based on the information of behavior feedback.in order to complement the insufficiencv of identitv authentications Bv uhlizing the certificate chains based on social attributes.the mobile nodes build the local certificate graphs gradually to realize the web of "Identitv Trust- relationshhip.Meanwhile.the successors generate Verified Feedback Packets for each positive behavior.and consequently the -Behavior Trust- relationship is formed for slow-moving nodes Simulation result shows that.by implementing our trust scheme.the delivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes.and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
其他文献
针对嵌入式设备在执行ZUC加密运算过程中的侧信道信息泄露问题,本文提出一种基于傅里叶变换的侧信道频域攻击.与传统时域上的侧信道分析不同的是,本文提出的频域侧信道分析适用于解决实测环境中功耗曲线数据无法精确对齐的问题.以嵌入式平台上的ZUC加密运算设计实现为分析目标,进行侧信道时域攻击和频域攻击的对比实验.实验结果表明,侧信道频域攻击远比时域攻击更高效,且适用于其它加密算法及多种设计平台.
云计算是当前IT领域正在发生的深刻变革,它在提高使用效率和降低使用成本的同时,带来了极大的安全挑战,其中隐私保护问题首当其冲.分析了云计算中隐私风险产生原因,指出了云计算中隐私保护应解决的关键问题,回顾并总结了当前国内、外在云隐私保护领域的主流技术及研究现状,探讨了云隐私保护领域仍然存在的问题并对未来研究方向进行了展望. 安全和隐私一直是云计算领域中的热点及关键问题,尽管近些年国内外学者
Javascript是Web应用中使用最广泛的客户端脚本语言,基于Javascript脚本的恶意网页利用浏览器和客户端应用程序存在的漏洞执行恶意Javascript代码,这会导致用户的隐私泄露等安全问题.为了有效检测恶意网页,本文提出了一种基于Javascript代码基本词特征的轻量级分析方法.首先通过Javascript代码提取出基本词,然后利用最近邻(K-NN)、主成分分析(PCA)、支持向量
针对嵌入式平台功耗低、资源少等特点,设计了适用于嵌入式平台的可信芯片及嵌入式软件栈,构建了嵌入式可信计算平台.为使嵌入式可信计算平台能够有效地为嵌入式应用提供可信功能支持,本文设计并实现了嵌入式可信计算平台测评系统,从应用服务角度出发,保证嵌入式应用调用的可信功能的正确性.该测评系统支持多个平台的并行测试,并能根据不同需求定制测试方案,支持测试报表分析测试结果,且引起的平台额外开销较小.
The security policy can exactlv reflect the security expectations of svstem models Besides.it is also an important method of remote attestation of computing environment.which is based on model behavio
Privacy-preserving data publication problem has attracted more and more attention in recent years.A lot of related research works have been done towards dataset with single sensitive attribute.However
会议
The lightweight mask scheme is a new tendency of the mask countermeasures.With this scheme,we propose several profiled and non-profiled power analyses against the RSM and RSM-Like schemes in the DPA C
In this paper,we propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified.Besides,we can adjust the maximum tampered rate a
能量分析攻击实施的依据是密码设备的能量消耗依赖于设备所执行的密码算法的中间值。因此,如果试图抵御这种攻击,就要降低甚至消除这种依赖性。布尔掩码技术为目前最为流行的防御措施。针对带循环S盒掩码的AES密码芯片,提出了一种新的相关性功耗攻击方法.该方法首先利用方差分析找出明文盲化和S盒计算的时间点,然后通过比较盲化后的字节的汉明重量和实际测量功耗值的相关系数恢复掩码,最后针对S盒输入和输出的汉明距离进
Dependability analysis is an important step in designing and analyzing safety computer systems and protection systems.Introducing multi-processor and virtual machine increases the system faults comple