Font Size: a A A

Research On Reputation Model And Application In Self-Organized Network

Posted on:2009-10-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:F WangFull Text:PDF
GTID:1118360275470993Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Recently, communication network have been spread widely and rapidly, the informational level of society have been improved continuously, communication network have posed an important part of people's life. With the requirement of personal communication, network is being more and more marginal and socialized, and the combination of heterogeneous network is an important direction. In the progress of combination, many techniques about Self-Organized Network (SON) are implemented. So, management of next generation mobile network isn't completely central, closed and controllable. According to this background, the study of security of SON is urgently.So, this dissertation provides reputation based distributed management in SON according to its uncentralization, self-organization, dynamical topology, and cooperation among all nodes. We will study the reputation evaluation, recommendation model, mechanism of recommendation management. Further, we attempt to study the application of reputation model in the mobile Ad Hoc network and distributed VoIP network.Firstly, we give the definition of reputation of SON according to the researching of sociology, economics about reputation, and the properties of SON. Refer to the definition, we deeply analyze its attributes of subjectivity, dynamics, multi-facets, chronergy, context dependence, asymmetry and irreversibility.According to the definition of reputation and its properties, we provide a novel general reputation model of SON, called SONR (Self-Organized Network Reputation). We think the reputation of the SON includes 3 parts: subjective evaluation, objective statistics and recommendation. Hence, SONR divides reputation into direct reputation and indirect reputation. The direct reputation is based on Beyasian theory. It describes the objective statistics and subjective evaluation of target node's history behaviour. The indirect reputation is the combination of a set of recommendation about target node by evidence theory. To assure that evaluation of reputation is objective and fair, SONR designs the mechanisms of recommendation transmission, adjusting of recommendation collision and recommendation fading. To promote the efficiency of reputation evaluation and reduce the consumption of recommendation combination, we give the recursion algorithm of recommendation combination. The algorithm reduces the complexity of recommendation combination, and makes SONR be more universal.A Game theory based recommendation model is presented. Reputation model also has inner threat that is false recommendation. As recommendation is the core element of reputation, it is obviously that false recommendation will destroy the reputation model. After doing a research about its characteristic, emergence pattern, and the behaviour of liars, we present a Game theory based recommendation model. The model defines recommendation game, called RG. And, it constructs the strategies and payoffs of plauers. Especially, RG establish the strategy of"Tit fot Tat"for recommendation requester against false recommendation. Any node would be published for its lying. The strategy reduces the number of false recommendation, and pushes the nodes be more cooperative on providing recommendation.A distributed strorage algorithm and a secure exchanging protocol are presented. There are a lot of threat when recommendation storing and exchanging, especially in the self-organized network. According to the possible security problem, we provide cryptography and digital signature based distributed strorage algorithm and secure exchanging protocol. They are used to protect recommendation from tampering and denying when stroring and exchanging. Furthermore, we provide trust flooding based recommendation searching algorithm. It promotes hit rate and efficiency of recommendation searching.Finally, we implement SONR model into mobile Ad Hoc network and distributed VoIP network. We present a secure route protocol, called COSR (Cooperative On-demand Secure Route), in the mobile Ad Hoc network, and design a P2P-SIP based distributed VoIP spam filtering system, called DAVS (Distributed Anti Voice Spam). The SONR integrates with application sytems, and plays important role to the system security.
Keywords/Search Tags:Self-Organized Network, Network Security, Reputation, Game, Secure Route, SPIT
PDF Full Text Request
Related items