Font Size: a A A

The Study Of Trust Management Model On MANET

Posted on:2007-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y WuFull Text:PDF
GTID:2178360212459176Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Ad hoc is different from the other network. Because it has good mobile and agility of forming network, it has become a focus of research. Ad hoc network can adapt urgency such as war command and disaster aid as it's forming don't need foundational equipment. But it exist serious security problem as it's nature open of communication and freedom of mobility. Hence, it's very important to study security mechanism on ad hoc.There are many attacks include stoping setting up of route,changing aim of packet, and so on. Among these attacks, frangibility and limition of security mechanism are main cause. If an effective trust mechanism can be set up, and this mechanism can distinguish normal or evil point and can insulate evil point from normal point, thus ad hoc netwok can ensure the security, at present, There are two kind of technology: Authentication and IDS, however authentication often need the third issue the digital certificate, which isn't a fit choose in ad hoc network, and the process of encryption reduce inevitably work efficiency of network and form blind trust. There are many wrong reports in IDS ,moreover the IDS can only trace partially, therefore, it's difficult to solve the security on ad hoc. This paper investigate the characters of ad hoc and indicate that employment of proper trust manager model is chief issue, thus, A new and positive security mechanism is brought forward to ad hoc network, which is Local Dynamic Trust Managent Model. Further a dynamic feedback formula on trust valuation is put forward. Because a dependable trust chain has been set up,the trust relationship can be transfered among all point. This model superior to IDS in strategy and effectively solve the problem of blind trust. In addition, a clustering algorithm on trust is put forward. The model is proved by simulation to have better adaptability for ad hoc security.
Keywords/Search Tags:Ad hoc network, Model of Trust, Local mangement of Trust, Zone, Cluster, Algorithm
PDF Full Text Request
Related items