Welcome![Sign In][Sign Up]
Location:
Search - attack nodes

Search list

[P2PANewTrustModelBasedonReputationandRiskEvaluation.r

Description: 针对目前大规模 P2P 系统不能有效处理恶意节点攻击的问题,该文提出一种新的基于信誉与风险评价的 P2P 系统信任模型,该模型考虑到节点的动态行为影响信任度计算的不确定性,引入风险因素,并提出采用信息 熵理论来量化风险,将实体之间的信任程度和信任的不确定性统一起来。仿真试验及分析表明,该信任模型能够有 效识别恶意节点,相比已有的一些信任模型较大程度地提高了系统成功交易率,可以使节点之间更有效地建立信任 关系。 -View of the current large-scale P2P systems can not effectively deal with malicious nodes to attack the problem, the paper presents a new risk assessment based on credibility and trust model of P2P system, the model taking into account the impact of the dynamic behavior of nodes trust the calculation of uncertainty, the introduction of risk factors, and to make use of information entropy theory to quantify the risks, will be the degree of trust between the entities and trust uncertainty unified. Simulation and analysis show that the trust model can effectively identify the malicious node, compared to some of the existing trust model to a greater extent to improve the system the rate of successful transactions, you can make between nodes more effectively to establish a relationship of trust.
Platform: | Size: 97280 | Author: 刘峰 | Hits:

[OtherGraph

Description: 复杂网络的一些节点面对攻击的代码,包括模型的产生。-Some of the complexity of the network nodes of the face of attack code, including the selection of models.
Platform: | Size: 2784256 | Author: mackey | Hits:

[Internet-NetworkSensor-Network-Security-A-Survey

Description: 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become a central concern, especially in mission-criticaltasks.In this paper,we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analys is ?rst.Then we give a holistic overview of security issues.These issues are divided into seven categories:cryptography,keymanage- ment,attack detections and preventions,securer outing,secure location security,secure data fusion,and other security issues. Along the way we analyze thead vantages and disadvantages of current secure schemes in each category.Inaddition,we also summarize the techniques and methods used in these categories,and point out the open research issues and directions in each area.
Platform: | Size: 348160 | Author: 马宁 | Hits:

[Internet-Networkaodvattacker

Description: AODV attacker ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently improves the overall performance of (normal) AODV in presence of black hole attack.
Platform: | Size: 4096 | Author: madhuri | Hits:

[Internet-NetworkInternet-attack

Description: 研究Ienternet的鲁棒性,对某些节点进行蓄意攻击,研究网络的生命周期。-Research Ienternet robustness, deliberate attack on some nodes, research the life cycle of the network.
Platform: | Size: 1438720 | Author: 刘莉莉 | Hits:

[OS programtrust-value

Description: 本文提出一种改进模糊评判理论的网络攻 击中的节点可信度评估方法,先利用模糊综合评判理论得到影响网络攻击中的节点可靠度因素集、评判集和仿真单因素可靠度评判方程,构成一个网络攻击中的节点可靠度初始模糊综合评判模型。-This paper presents a method to assess the credibility of nodes in the network attacks fuzzy uation theory in improvements to the fuzzy comprehensive uation theory has been affecting the reliability factor set node network attacks, the judge sets the reliability uation and simulation of single factor equation form a network node reliability of the initial attack in the fuzzy comprehensive uation model.
Platform: | Size: 270336 | Author: shaoqian | Hits:

CodeBus www.codebus.net