Font Size: a A A

The Research And Implementation Of Security Mapping System Based On The Normal Distribution

Posted on:2016-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:B R FuFull Text:PDF
GTID:2428330542989590Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the internet technology and communication technology,the demand for network communication is expanding constantly,while in recent years,many new technologies are widely used,such as the internet multi-homed end to end transmission mechanism,traffic engineering,independent operator address,so that the number of default free zone routing area presents a super-linear growth trend,which also lead to much more time in routing addressing,sharp decline in network stability and a sharp increase in the consumption of routers and other intermediate devices.The main reason for these problems is the semantic overload of IP address.For this problem,people proposed progressive programs and innovative solutions respectively,in which the identity and location-based solutions were studied most deeply.However,due to the separation of the identity identification and location identification,the single namespace of the traditional internet transforms to the double namespace based on identity identification and location identification,which requires the introduction of a basic component mapping system.The system is used to transform the identity identification namespace to location identification namespace.The mapping system works as the basic component of identity identification and location identification in the next generation network,so that the importance of security is obvious.In this thesis,we firstly analyze the impact of IP address semantic overloaded to the normal internet,and then analyze the scheme of identity identification and location identification for this problem.Furthermore,we analyze the potential security threats with the introduction of the basic component in identity identification and location identification scheme in depth.Finally,we obtain the new security requirement in the program with new component.For this requirement,we propose a mapping system security mechanism based on the normal distribution,this mechanism can defend potential network deception brought by network mapping.The method brings the trust model which is based on tree filtration.We use the dynamic feedback in the internet communication and classification,filtering,sorting of the recognition to increase the security and credibility of the item in the mapping system.At the same time,we analyze the performance of the trust model and do the simulate experiment in the NS2 simulator.The simulation results show that the proposed trust model based on the normal distribution can provide more a more secure and reliable protection,compared with the existing Beta distribution model.The physical nodes in the network can be set to different trust thresholds,according to the requirement of the environment.This can reduce the malicious mapping information use of a physical node,furthermore reducing the damage caused by the mapping deception.
Keywords/Search Tags:trust model, mapping system, security mechanism, normal distribution, recognition
PDF Full Text Request
Related items