Font Size: a A A

The Research On Trusted Authentication And Assessment Of Trusted Network

Posted on:2012-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:S Y XiaFull Text:PDF
GTID:2248330374979585Subject:Safety engineering
Abstract/Summary:PDF Full Text Request
The development of computer and network technology has been expanding itsapplication field and the network system structure becomes more and more complex.Dependability evaluation has been a hot point of research. This paper systematicallyanalyzes and summarizes some new results on the basis of credibility network, the keyproblem is studied. Mainly work is following:First, the related concepts of trusted network are introduced. A summary ofcredibility network content and the research achievements is induced. It is pointed outthat deficiency of the current research on the credibility of the network.Second, after analyzing of the existing basis of the research, the trusted networkauthentication frame and the trusted authentication method based on integration oftrusted identity and access management method of trusted network framework are putforward. The framework provides a mechanism of flexible modeling and describingdigital user identity. It can support transaction-based privacy protection, personal dataacquisition, and a flexible third party accountability mechanism and end-to-end securecommunication. The experimental results show that the proposed trusted networkauthentication system framework improves security of trust and reliability.Third, a new certainty-based authentication model is proposed. Theauthentication certainty and condition of system are induced. The essential frame andexact description are given. By uncertainty reasoning in A.I, the authentication rulesformalization and measurement formula are given. To be more adaptive, model withweighted factors is proposed and can solve the problem that all conditions havedifferent importance. Fourth, a credible method based on report to evaluate the credibility of theinformation and information release node is presented. In the assessment reliability ofthe information source, two factors are considered: path similarity and the similarityinformation. In the multi-hop network, the flow of information goes through multi-hopand multi path. The similarity between different paths for transferring the same eventinformation is modeled. Similarly, the similarity between two information item fromdifferent paths for the same events is modeled. Path and information similarity factorsare considered as the factors of trust decision information. Trust is as a adaptivelyfeedback factor for adjusting the value of network node trust. The experimental resultsshow that the method of information is very close to the actual information trust value.
Keywords/Search Tags:Trusted Network, Assessment, Certification, Access management
PDF Full Text Request
Related items