The Ad-Hoc Network Trustworthiness Evaluation Model Based on the Bayesian Network

被引:1
作者
Wang, Xiaodong [1 ]
Hu, Shanfeng [1 ]
Zho, Yu [1 ]
Ye, Qingwei [1 ]
机构
[1] Ningbo Univ, Coll Informat Sci & Engn, Ningbo 315211, Zhejiang, Peoples R China
来源
2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012) | 2012年
关键词
Trustworthiness Evaluation; Bayesian Network; Ad-Hoc;
D O I
10.1109/PDCAT.2012.127
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To address security problem of the Ad-hoc network caused by vulnerable username and password, we present a trustworthiness evaluation model based on Bayesian network. The node's trustworthiness is computed in the form of direct and indirect trustworthiness. Bayesian network employs node's online duration, link speed, routing forwarding ratio and surplus energy as four entities to compute direct trustworthiness. Indirect trustworthiness is archived by node's single-hop neighbors' collaboration. The proposed model allows dynamic evaluation policy. Simulation shows that the model obtains dynamical, timely, precious, sensitive and fixable trustworthiness.
引用
收藏
页码:281 / 284
页数:4
相关论文
共 18 条
[1]  
[Anonymous], 2005, RES BAYESIAN NETWORK
[2]  
Borsotto M, 2006, PROC INT C TOOLS ART, P455
[3]   Modeling Spammer Behavior: Naive Bayes vs. Artificial Neural Networks 0 [J].
Islam, Md Saiful ;
Khaled, Shah Mostafa ;
Farhan, Khalid ;
Rahman, Md Abdur ;
Rahman, Joy .
2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, :52-+
[4]  
Lepar V., 1998, Uncertainty in Artificial Intelligence. Proceedings of the Fourteenth Conference (1998), P328
[5]   Trust-based on-demand multipath routing in mobile ad hoc networks [J].
Li, X. ;
Jia, Z. ;
Zhang, P. ;
Zhang, R. ;
Wang, H. .
IET INFORMATION SECURITY, 2010, 4 (04) :212-232
[6]  
Li Yu, 2012, Tsinghua Science and Technology, V17, P179
[7]  
Lian J., 2008, RES CONSTRUCTION BAY
[8]   LAZY propagation: A junction tree inference algorithm based on lazy evaluation [J].
Madsen, AL ;
Jensen, FV .
ARTIFICIAL INTELLIGENCE, 1999, 113 (1-2) :203-245
[9]  
Mundinger J., 2005, PERFORM EVALUATION, V3, P212
[10]   Performance comparison of trust-based reactive routing protocols [J].
Pirzada, AA ;
McDonald, C ;
Datta, A .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (06) :695-710