Study on security routing algorithm based on dynamic adjacent trust
By studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security routing algorithm based on dynamic adjacent trust ent...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.023/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539805635149824 |
---|---|
author | Ting HAN Shou-shan LUO Yang XIN Yi-xian YANG Gong CHENG Xiao WU |
author_facet | Ting HAN Shou-shan LUO Yang XIN Yi-xian YANG Gong CHENG Xiao WU |
author_sort | Ting HAN |
collection | DOAJ |
description | By studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security routing algorithm based on dynamic adjacent trust entropy was also proposed,which was validated in the OSPF protocol.The simulation results show that dynamic adjacent credibility-trust model can accurately reflect the state altering and malicious attack of the router node and has better dynamic response ability.In addition,the security routing algorithm can effectively guarantee the behavior and state trust of the router node with highly attack resistant properties. |
format | Article |
id | doaj-art-525b8d43b32d4daeb6ea9f78a20439c5 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2013-06-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-525b8d43b32d4daeb6ea9f78a20439c52025-01-14T06:35:40ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-06-013419120059673185Study on security routing algorithm based on dynamic adjacent trustTing HANShou-shan LUOYang XINYi-xian YANGGong CHENGXiao WUBy studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security routing algorithm based on dynamic adjacent trust entropy was also proposed,which was validated in the OSPF protocol.The simulation results show that dynamic adjacent credibility-trust model can accurately reflect the state altering and malicious attack of the router node and has better dynamic response ability.In addition,the security routing algorithm can effectively guarantee the behavior and state trust of the router node with highly attack resistant properties.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.023/router node trustdynamic adjacent trustsecurity routing algorithmOSPF protoco |
spellingShingle | Ting HAN Shou-shan LUO Yang XIN Yi-xian YANG Gong CHENG Xiao WU Study on security routing algorithm based on dynamic adjacent trust Tongxin xuebao router node trust dynamic adjacent trust security routing algorithm OSPF protoco |
title | Study on security routing algorithm based on dynamic adjacent trust |
title_full | Study on security routing algorithm based on dynamic adjacent trust |
title_fullStr | Study on security routing algorithm based on dynamic adjacent trust |
title_full_unstemmed | Study on security routing algorithm based on dynamic adjacent trust |
title_short | Study on security routing algorithm based on dynamic adjacent trust |
title_sort | study on security routing algorithm based on dynamic adjacent trust |
topic | router node trust dynamic adjacent trust security routing algorithm OSPF protoco |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.023/ |
work_keys_str_mv | AT tinghan studyonsecurityroutingalgorithmbasedondynamicadjacenttrust AT shoushanluo studyonsecurityroutingalgorithmbasedondynamicadjacenttrust AT yangxin studyonsecurityroutingalgorithmbasedondynamicadjacenttrust AT yixianyang studyonsecurityroutingalgorithmbasedondynamicadjacenttrust AT gongcheng studyonsecurityroutingalgorithmbasedondynamicadjacenttrust AT xiaowu studyonsecurityroutingalgorithmbasedondynamicadjacenttrust |