Researches on Trust Building Scheme Relevant Issues in Wireless Self-Organizing Network
作者: 王海涛 ：解放军理工大学通信工程学院;
Abstract: Building trust relationship in acentric and distributed wireless self-organizing network (WSON) is vital for ensuring network security, but it still faces many new problems and challenges. In this paper neces-sity of introducing trust schemes in WSON is introduced firstly. Then, concepts and functions of trust are expounded. Based on above elaboration, trust building methods, trust models and trust assisted secure routing schemes are explained. Finally, various attacks faced by trust building scheme are countermeasures are summed up.
文章引用: 王海涛 (2011) 无线自组网中的信任建立机制相关问题研究。 无线通信， 1， 6-10. doi: 10.12677/hjwc.2011.11002
 郑少仁, 王海涛, 赵志峰等. Ad Hoc网络技术[M]. 北京: 人民邮电出版社, 2005.
 A. Josang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 2005, 43(2): 618-644.
 M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In: J. Dale, G. Dinolt, eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996: 164-173.
 Y. Sun, Z. Han, and R. Liu. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 2008, 46(4): 112-119.
 J. Li, R. D. Li. Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine, 2008, 46(4): 108-114.
 H. Yang, H. Luo. Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications Magazine, 2004, 11(1): 38-47.
 M. Lima, A. Santos, and G. Pujolle. A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 2009, 11(1): 66-77.
 D. Joshi, K. Namuduri. Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis. Journal of Wireless Communications and Networking, 2005, 2005(4): 579-589.
 N. Boudriga, M. Obaidat. Fault and intrusion tolerance in wireless ad hoc networks. Washington: Wireless Communications and Networking Conference, 2005, 4: 2281-2286.
 王良民, 郭渊博. 容忍入侵的无线传感网络模糊信任评估模型[J]. 通信学报, 2010, 31(12): 37-44.