首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
A Novel Node Information Update Multicast Algorithm in Wireless Sensor Networks 一种新的无线传感器网络节点信息更新组播算法
Zhu Yonghua, Dong Zhiling, Pan Shunhong, Wang Lu, Zhang Qian, Wu Junjie
Wireless Sensor Networks (WSN) are composed of a large number of sensor nodes which are connected by wireless channels. Some of these sensor nodes are regarded as critical nodes which are responsible for the management of the other nodes in their sphere. Therefore, update of node information must be implemented through these critical nodes’ multicast operation. In this paper, we present a novel Node Information Update Multicast (NIUM) algorithm to optimize the transmission performance among critical nodes. After applying with our algorithm, each critical node could explore a reasonable transportation way according to its distance apart from other critical nodes. Despite of the ideal assumption, our algorithm is also tested under different circumstances and the results prove that it behaves well for prompt node information update in wireless sensor networks. Both velocity and efficiency of the network can be improved tremendously.
无线传感器网络是由大量传感器节点通过无线信道连接而成的网络。其中一些传感器节点被认为是关键节点,负责管理其范围内的其他节点。因此,节点信息的更新必须通过这些关键节点的组播操作来实现。本文提出了一种新的节点信息更新组播(NIUM)算法来优化关键节点间的传输性能。应用我们的算法后,每个关键节点可以根据与其他关键节点的距离探索出合理的运输方式。尽管我们的假设是理想的,但我们的算法也在不同的情况下进行了测试,结果证明了它在无线传感器网络中能够很好地及时更新节点信息。网络的速度和效率都可以得到极大的提高。
{"title":"A Novel Node Information Update Multicast Algorithm in Wireless Sensor Networks","authors":"Zhu Yonghua, Dong Zhiling, Pan Shunhong, Wang Lu, Zhang Qian, Wu Junjie","doi":"10.1109/NSWCTC.2009.320","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.320","url":null,"abstract":"Wireless Sensor Networks (WSN) are composed of a large number of sensor nodes which are connected by wireless channels. Some of these sensor nodes are regarded as critical nodes which are responsible for the management of the other nodes in their sphere. Therefore, update of node information must be implemented through these critical nodes’ multicast operation. In this paper, we present a novel Node Information Update Multicast (NIUM) algorithm to optimize the transmission performance among critical nodes. After applying with our algorithm, each critical node could explore a reasonable transportation way according to its distance apart from other critical nodes. Despite of the ideal assumption, our algorithm is also tested under different circumstances and the results prove that it behaves well for prompt node information update in wireless sensor networks. Both velocity and efficiency of the network can be improved tremendously.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134254211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tree-Based RFID Yoking Proof 基于树的RFID轭证明
H. Chien, Shih-Bin Liu
RFID (Radio Frequency Identification) yoking proof protocol [1,6,9] allows a verifier to collect the proof of the simultaneous presence of two tags in the communication range of a specified reader. This proof has found several interesting applications. However, in the existing RFID yoking schemes, the computational cost of identifying a tag in the back-end server is O(N), where N is the number of tags. This paper proposes a tree-based yoking-proof scheme, which employs the tree structure to organize the tags and treats the dynamically updated paths of tags as the secrets to identify the tags. This arrangement results in great improvement of only O(1) computational cost to identifying the tag.
RFID (Radio Frequency Identification,射频识别)对联证明协议[1,6,9]允许验证者收集在指定阅读器的通信范围内同时存在两个标签的证明。这个证明有几个有趣的应用。然而,在现有的RFID联立方案中,在后端服务器中识别一个标签的计算成本为O(N),其中N为标签的数量。本文提出了一种基于树的标签证明方案,该方案采用树形结构组织标签,并将标签的动态更新路径作为识别标签的秘密。这种安排大大提高了识别标签的计算成本,仅为0(1)。
{"title":"Tree-Based RFID Yoking Proof","authors":"H. Chien, Shih-Bin Liu","doi":"10.1109/NSWCTC.2009.316","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.316","url":null,"abstract":"RFID (Radio Frequency Identification) yoking proof protocol [1,6,9] allows a verifier to collect the proof of the simultaneous presence of two tags in the communication range of a specified reader. This proof has found several interesting applications. However, in the existing RFID yoking schemes, the computational cost of identifying a tag in the back-end server is O(N), where N is the number of tags. This paper proposes a tree-based yoking-proof scheme, which employs the tree structure to organize the tags and treats the dynamically updated paths of tags as the secrets to identify the tags. This arrangement results in great improvement of only O(1) computational cost to identifying the tag.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A Combination Scheme for Fuzzy Partitions Based on Fuzzy Majority Voting Rule 基于模糊多数投票规则的模糊分区组合方案
Chunsheng Li
This paper propose a combination model of fuzzy partitions with the same number of clusters by generalizing the traditional majority voting rule to fuzzy majority voting rule and a class matching algorithm based on k nearest neighbours (KNN) to establish the correspondence among classes of component fuzzy partitions. The comparisons between our combination model and other two methods over real-world data sets show that our combination method is a little better than the other two.
本文通过将传统的多数投票规则推广到模糊多数投票规则,提出了一种具有相同簇数的模糊分区组合模型,并采用基于k近邻(KNN)的类匹配算法来建立组件模糊分区的类间对应关系。将我们的组合模型与其他两种方法在实际数据集上的比较表明,我们的组合方法比其他两种方法略好。
{"title":"A Combination Scheme for Fuzzy Partitions Based on Fuzzy Majority Voting Rule","authors":"Chunsheng Li","doi":"10.1109/NSWCTC.2009.251","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.251","url":null,"abstract":"This paper propose a combination model of fuzzy partitions with the same number of clusters by generalizing the traditional majority voting rule to fuzzy majority voting rule and a class matching algorithm based on k nearest neighbours (KNN) to establish the correspondence among classes of component fuzzy partitions. The comparisons between our combination model and other two methods over real-world data sets show that our combination method is a little better than the other two.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132252619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring and Modeling Message-Level Characteristics of BitTorrent BitTorrent消息级特性的测量与建模
Feng Liu, Zhitang Li, Lihui Huang
BitTorrent(BT) applications are very popular on the Internet. Measuring the impact it has on the network and understanding their behavior is an important field. From the perspective of network management, a thorough understanding of the stochastic properties of BT traffic is thus crucial to designing better traffic and resource control algorithms. However, previous works on measuring and analyzing BT application mostly focus on both data and message traffic. In order to gain insights into BT systems especially the message characteristics, we have undertaken an in-depth measurement and modeling study of BT message. Our results show that the Message model can well describe the BT incentive mechanism and the statistics collected on different files can fit equally well into distributions.
BT应用程序在互联网上非常流行。衡量它对网络的影响并理解他们的行为是一个重要的领域。从网络管理的角度来看,深入了解BT流量的随机特性对于设计更好的流量和资源控制算法至关重要。然而,以往对BT应用的测量和分析主要集中在数据流量和消息流量两方面。为了深入了解BT系统,特别是信息的特性,我们对BT信息进行了深入的测量和建模研究。结果表明,Message模型可以很好地描述BT激励机制,并且在不同文件上收集的统计数据可以很好地拟合分布。
{"title":"Measuring and Modeling Message-Level Characteristics of BitTorrent","authors":"Feng Liu, Zhitang Li, Lihui Huang","doi":"10.1109/NSWCTC.2009.214","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.214","url":null,"abstract":"BitTorrent(BT) applications are very popular on the Internet. Measuring the impact it has on the network and understanding their behavior is an important field. From the perspective of network management, a thorough understanding of the stochastic properties of BT traffic is thus crucial to designing better traffic and resource control algorithms. However, previous works on measuring and analyzing BT application mostly focus on both data and message traffic. In order to gain insights into BT systems especially the message characteristics, we have undertaken an in-depth measurement and modeling study of BT message. Our results show that the Message model can well describe the BT incentive mechanism and the statistics collected on different files can fit equally well into distributions.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133224222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Routing for Large Scale Bluetooth Network 大规模蓝牙网络的分层路由
Xiang Li, Chaoguang Men, Mantian Li, Lining Sun
Bluetooth node is mobile and the bandwidth-limited, constructing a QoS route for communication from one node to another in scatternet is a significant challenge. A hierarchical management model can be built for large scale Bluetooth network. In this paper a hierarchical network model for Bluetooth scatternet is proposed through plotting out the flat graph into sub-graphs which are abstracted as high-level graph, and rules to partition the graph into sub-graphs is also given. Then, a shortest path calculation algorithm is given for the hierarchical network.
蓝牙节点具有移动性和带宽限制,在散射网络中构建节点间通信的QoS路由是一个重大挑战。可以为大规模蓝牙网络建立分层管理模型。本文提出了一种蓝牙散射网的分层网络模型,将平面图划分为若干子图,这些子图被抽象为高级图,并给出了划分子图的规则。然后,给出了分层网络的最短路径计算算法。
{"title":"Hierarchical Routing for Large Scale Bluetooth Network","authors":"Xiang Li, Chaoguang Men, Mantian Li, Lining Sun","doi":"10.1109/NSWCTC.2009.293","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.293","url":null,"abstract":"Bluetooth node is mobile and the bandwidth-limited, constructing a QoS route for communication from one node to another in scatternet is a significant challenge. A hierarchical management model can be built for large scale Bluetooth network. In this paper a hierarchical network model for Bluetooth scatternet is proposed through plotting out the flat graph into sub-graphs which are abstracted as high-level graph, and rules to partition the graph into sub-graphs is also given. Then, a shortest path calculation algorithm is given for the hierarchical network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Qualitative and Quantitative Analysis of Information Leakage in Java Source Code Java源代码信息泄漏的定性与定量分析
Bo Chen, Da-wei Xu, Ling Yu
Java is a kind of type-safe language, it introduces access control mechanism into bytecode and application layer, so as to guarantee the system resource and running environment avoid the invasion of the malicious code. However, in some information systems, information leakage is not due to the faultiness of the security model, but the absence of the information flow control policy and implementation of that in the source code. So, it is necessary to analyze how information leaks through the source code. This paper surveys information leakage in Java source code by qualitative analysis, and after defining conditional information entropy of the variables, quantitative analysis of information-leak in code is given. Language-based software security researches, new direction in the development of high trusted software, are introduced finally.
Java是一种类型安全的语言,它在字节码和应用层引入了访问控制机制,从而保证了系统资源和运行环境不受恶意代码的入侵。然而,在一些信息系统中,信息泄露并不是由于安全模型的不完善,而是由于缺乏信息流控制策略以及在源代码中没有实现信息流控制策略。因此,有必要分析信息是如何通过源代码泄漏的。本文对Java源代码中的信息泄漏进行定性分析,在定义变量的条件信息熵后,对代码中的信息泄漏进行定量分析。最后介绍了基于语言的软件安全研究,这是开发高可信度软件的新方向。
{"title":"Qualitative and Quantitative Analysis of Information Leakage in Java Source Code","authors":"Bo Chen, Da-wei Xu, Ling Yu","doi":"10.1109/NSWCTC.2009.317","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.317","url":null,"abstract":"Java is a kind of type-safe language, it introduces access control mechanism into bytecode and application layer, so as to guarantee the system resource and running environment avoid the invasion of the malicious code. However, in some information systems, information leakage is not due to the faultiness of the security model, but the absence of the information flow control policy and implementation of that in the source code. So, it is necessary to analyze how information leaks through the source code. This paper surveys information leakage in Java source code by qualitative analysis, and after defining conditional information entropy of the variables, quantitative analysis of information-leak in code is given. Language-based software security researches, new direction in the development of high trusted software, are introduced finally.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Wireless Video Communication System Used to Monitor and Control Plant Disease 植物病害监测与控制无线视频通信系统的设计
Xiu-qing Wang, Chunxia Zhang, Shifeng Yang
A wireless video communication system applied to plant disease control is introduced in this paper. The system is used to acquire and transmit the field plant image or video data for subsequent monitoring and diagnosis. It is based on the DSP TMS320DM642 and nRF24L01 single chip 2.4GHz radio transceiver. It has two data compress and transmission tactics to meet users’ different need and uses multi-channel wireless communication to lower the whole cost in the system.
介绍了一种应用于植物病害防治的无线视频通信系统。该系统用于采集和传输现场植物图像或视频数据,用于后续的监测和诊断。它是基于DSP TMS320DM642和nRF24L01单片机的2.4GHz无线电收发器。它采用两种数据压缩和传输策略来满足用户的不同需求,并采用多路无线通信来降低系统的整体成本。
{"title":"Design of Wireless Video Communication System Used to Monitor and Control Plant Disease","authors":"Xiu-qing Wang, Chunxia Zhang, Shifeng Yang","doi":"10.1109/NSWCTC.2009.235","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.235","url":null,"abstract":"A wireless video communication system applied to plant disease control is introduced in this paper. The system is used to acquire and transmit the field plant image or video data for subsequent monitoring and diagnosis. It is based on the DSP TMS320DM642 and nRF24L01 single chip 2.4GHz radio transceiver. It has two data compress and transmission tactics to meet users’ different need and uses multi-channel wireless communication to lower the whole cost in the system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133429781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Traffic Grooming in WDM Ring Networks with Grooming Ratio 8 调优比为8的WDM环网业务量调优
Zhihe Liang, Yulian Miao, Yanfang Zhang
In this paper, we give the number of ADMs in a unidirectional ring, $A(8,N)$=$lceil 5N(N-1)/16rceil$ when $Nequiv 0,1,4,6,7$ (mod 16), with the possible exceptions $N$=36, 38, 39.
在本文中,我们给出了当$N = 0,1,4,6,7$ (mod 16)时,$ a (8,N)$=$ $ lceil 5N(N-1)/ $ rceil$的单向环上adm的个数,除了$N$= 36,38,39。
{"title":"Traffic Grooming in WDM Ring Networks with Grooming Ratio 8","authors":"Zhihe Liang, Yulian Miao, Yanfang Zhang","doi":"10.1109/NSWCTC.2009.321","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.321","url":null,"abstract":"In this paper, we give the number of ADMs in a unidirectional ring, $A(8,N)$=$lceil 5N(N-1)/16rceil$ when $Nequiv 0,1,4,6,7$ (mod 16), with the possible exceptions $N$=36, 38, 39.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133586704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Access Control for Web Services Web服务的语义访问控制
Miao Liu, Dongqing Xie, Peng Li, Xunlai Zhang, Chunming Tang
The paper designs the WSACPL policy ontology to express access control policies for web services. The ontology also includes a mechanism to resolve conflicts among WSACPL policies. In the end, the paper gives an implementation called WACS. The WACS combines WSACPL policy ontology with domain ontology and service ontology to realize semantic access control for web services.
本文设计了WSACPL策略本体来表达web服务的访问控制策略。本体还包括解决WSACPL策略之间冲突的机制。最后,给出了WACS的实现方案。WACS将WSACPL策略本体与领域本体和服务本体相结合,实现对web服务的语义访问控制。
{"title":"Semantic Access Control for Web Services","authors":"Miao Liu, Dongqing Xie, Peng Li, Xunlai Zhang, Chunming Tang","doi":"10.1109/NSWCTC.2009.389","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.389","url":null,"abstract":"The paper designs the WSACPL policy ontology to express access control policies for web services. The ontology also includes a mechanism to resolve conflicts among WSACPL policies. In the end, the paper gives an implementation called WACS. The WACS combines WSACPL policy ontology with domain ontology and service ontology to realize semantic access control for web services.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"652 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SPTM: A Security Protocol for Protecting the P2P Trust Information Management 一种保护P2P信任信息管理的安全协议
Jianli Hu, Quanyuan Wu, Bin Zhou
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peers’ behaviors with the trust mechanism and how to establish the reputation-based trust management mechanism, but takes no consideration of the security problems in trust information management. As for this issue, this paper proposes a security protocol for protecting the P2P trust information management (SPTM). Theoretical analysis and simulation experiments show that, SPTM can effectively suppress the sybil attackers and trust information tamper peers in transmissions with little time overhead. Moreover, it can be easily integrated into various reputation-based TMSs.
P2P网络的开放性、共享性和匿名性为分布式计算技术的发展提供了机遇和威胁。建立基于信誉的信任管理系统(TMS)是降低威胁的可行途径之一。以往的研究大多集中在如何利用信任机制对对等体的行为进行评价以及如何建立基于声誉的信任管理机制上,而没有考虑信任信息管理中的安全问题。针对这一问题,本文提出了一种保护P2P信任信息管理(SPTM)的安全协议。理论分析和仿真实验表明,SPTM在传输过程中可以有效抑制符号攻击者和信任信息篡改对等体,且时间开销很小。此外,它可以很容易地集成到各种基于声誉的tms中。
{"title":"SPTM: A Security Protocol for Protecting the P2P Trust Information Management","authors":"Jianli Hu, Quanyuan Wu, Bin Zhou","doi":"10.1109/NSWCTC.2009.156","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.156","url":null,"abstract":"The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peers’ behaviors with the trust mechanism and how to establish the reputation-based trust management mechanism, but takes no consideration of the security problems in trust information management. As for this issue, this paper proposes a security protocol for protecting the P2P trust information management (SPTM). Theoretical analysis and simulation experiments show that, SPTM can effectively suppress the sybil attackers and trust information tamper peers in transmissions with little time overhead. Moreover, it can be easily integrated into various reputation-based TMSs.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1