期刊文献+

基于信任的低地球轨道卫星网络路由安全机制 被引量:2

Route Security Mechanism Based on Trust for Low Earth Orbit Satellite Network
在线阅读 下载PDF
导出
摘要 将基于信任的路由安全机制引入卫星网络路由,提出一种信任评估模型,用信任度约束选路过程,以路由负载均衡为优化目标,对现有路由协议进行安全性改进,在此基础上,设计适用于卫星网络的按需安全路由协议。分析结果表明,该协议能够防范多种常见的内部攻击。 To solve the problem that most route protocols lack secure mechanism,the route secure scheme is provided following trust.The trust evaluation model is given based on satellite network routing behavior.Trust metric is used to limit path selection.Route load balance is the goal of optimization.By improving existing route protocol,an on-demand secure routing protocol for satellite network is formed.The analysis result shows that it can resist a lot of inside attacks.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第20期149-151,共3页 Computer Engineering
关键词 信任评估 路由安全 负载均衡 时间窗 trust evaluation route security load balance time window
作者简介 潘艳辉(1982-),女,博士研究生,主研方向:卫星网络路由,网络安全;E-mail:yanhuipan@126.com 王韬,教授; 吴杨,硕士研究生; 王文豪,硕士
  • 相关文献

参考文献15

  • 1Ekici E, Akyildiz I F. A Distributed Routing Algorithm for Datagram Traffic in LEO Satellite Networks[J]. IEEE Transactions on Networking, 2001, 9(2): 137-147.
  • 2Papapetrou E, Karapantazis S, Pavlidou F N. Distributed On- demand Routing for LEO Satellite Systems[J]. Computer Network, 2007, 51(15): 4356-4376.
  • 3王京林,晏坚,曹志刚.LEO卫星网络快照序列路由算法优化[J].宇航学报,2009,30(5):2003-2007. 被引量:19
  • 4席菁,王源,陆建德.基于信任和推荐的P2P信誉模型[J].计算机工程,2009,35(4):143-145. 被引量:11
  • 5Zapata M G, Asokan N. Securing Ad Hoc Routing Protocols[C]// Proc. of ACM WiSe’02. Atlanta, Geogia, USA: ACM Press, 2002.
  • 6Sanzgiri K, Dahill B, Levine B N, et al. A Secure Routing Protocol for Ad Hoc Networks[C]//Proc. of International Conference on Network Protocols. Paris, France: [s. n.], 2002.
  • 7Argyroudis P G, O’Mahony D. Secure Routing for Mobile Ad Hoc Networks[J]. Communications Surveys & Tutorials, 2005, 7(3): 12-21.
  • 8Hu Yih-Chun, Perrig A, Johnson D B. Ariadne: A Secure On- demand Routing Protocol for Ad Hoc Networks[C]//Proc. of the 8th ACM International Conference on Mobile Computing and Networking. [S. l.]: ACM Press, 2002.
  • 9Buttyan L, Hubaux J P. Report on a Working Session on Security in Wireless Ad Hoc Networks[J]. Mobile Computing and Commu- nications Review, 2002, 6(4): 11-35.
  • 10Michiardi P, Molva R. Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks[C]//Proc. of Conf. on Communication and Multimedia Security. Portoroz, Slovenia: [s. n.], 2002.

二级参考文献134

共引文献159

同被引文献22

引证文献2

二级引证文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部