Study on security routing algorithm based on dynamic adjacent trust

By studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security routing algorithm based on dynamic adjacent trust ent...

Full description

Saved in:
Bibliographic Details
Main Authors: Ting HAN, Shou-shan LUO, Yang XIN, Yi-xian YANG, Gong CHENG, Xiao WU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.023/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539805635149824
author Ting HAN
Shou-shan LUO
Yang XIN
Yi-xian YANG
Gong CHENG
Xiao WU
author_facet Ting HAN
Shou-shan LUO
Yang XIN
Yi-xian YANG
Gong CHENG
Xiao WU
author_sort Ting HAN
collection DOAJ
description By studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security routing algorithm based on dynamic adjacent trust entropy was also proposed,which was validated in the OSPF protocol.The simulation results show that dynamic adjacent credibility-trust model can accurately reflect the state altering and malicious attack of the router node and has better dynamic response ability.In addition,the security routing algorithm can effectively guarantee the behavior and state trust of the router node with highly attack resistant properties.
format Article
id doaj-art-525b8d43b32d4daeb6ea9f78a20439c5
institution Kabale University
issn 1000-436X
language zho
publishDate 2013-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-525b8d43b32d4daeb6ea9f78a20439c52025-01-14T06:35:40ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-06-013419120059673185Study on security routing algorithm based on dynamic adjacent trustTing HANShou-shan LUOYang XINYi-xian YANGGong CHENGXiao WUBy studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security routing algorithm based on dynamic adjacent trust entropy was also proposed,which was validated in the OSPF protocol.The simulation results show that dynamic adjacent credibility-trust model can accurately reflect the state altering and malicious attack of the router node and has better dynamic response ability.In addition,the security routing algorithm can effectively guarantee the behavior and state trust of the router node with highly attack resistant properties.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.023/router node trustdynamic adjacent trustsecurity routing algorithmOSPF protoco
spellingShingle Ting HAN
Shou-shan LUO
Yang XIN
Yi-xian YANG
Gong CHENG
Xiao WU
Study on security routing algorithm based on dynamic adjacent trust
Tongxin xuebao
router node trust
dynamic adjacent trust
security routing algorithm
OSPF protoco
title Study on security routing algorithm based on dynamic adjacent trust
title_full Study on security routing algorithm based on dynamic adjacent trust
title_fullStr Study on security routing algorithm based on dynamic adjacent trust
title_full_unstemmed Study on security routing algorithm based on dynamic adjacent trust
title_short Study on security routing algorithm based on dynamic adjacent trust
title_sort study on security routing algorithm based on dynamic adjacent trust
topic router node trust
dynamic adjacent trust
security routing algorithm
OSPF protoco
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.023/
work_keys_str_mv AT tinghan studyonsecurityroutingalgorithmbasedondynamicadjacenttrust
AT shoushanluo studyonsecurityroutingalgorithmbasedondynamicadjacenttrust
AT yangxin studyonsecurityroutingalgorithmbasedondynamicadjacenttrust
AT yixianyang studyonsecurityroutingalgorithmbasedondynamicadjacenttrust
AT gongcheng studyonsecurityroutingalgorithmbasedondynamicadjacenttrust
AT xiaowu studyonsecurityroutingalgorithmbasedondynamicadjacenttrust