Báo cáo hóa học: Call admission control with heterogeneous mobile stations in cellular/WLAN interworking systems

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Call admission control with heterogeneous mobile stations in cellular/WLAN interworking systems | Akbani and Korkmaz EURASIP Journal on Wireless Communications and Networking 2011 2011 90 EURASIP Journal on . http content 2011 1 90 Wireless Communications and Networking a SpringerOpen Journal RESEARCH Open Access Enhancing role-based trust management with a reputation system for MANETs Rehan Akbani and Turgay Korkmaz Abstract We start with role-based trust management RBTM and address some of the challenges associated with using RBTM in mobile ad hoc networks MANETs . We then enhance RBTM with reputation systems RSs and propose a new hybrid trust management system HTMS . In HTMS the privilege level of an entity is determined not only by its role in the system but also by its reputation score which in turn is based on its behavior. If a privileged node becomes compromised and conducts several malicious or risky transactions then its privilege level is quickly reduced to limit its access to resources and minimize the damage it can inflict further. The system uses a global network-wide perspective to thwart global attacks. Such fine-grained variations of access control and dynamically assigning privilege levels would be very difficult to accomplish manually. We evaluated HTMS by comparing an implementation of it against an ideal response. We show that HTMS performs very close to the ideal if we can accurately estimate the proportion of malicious nodes in the network. We suggest using sampling to estimate this proportion. However even if this estimate is not accurate the results are still much better than using RBTM by itself. EDICS SYS-ARCH SYS-PROT FOR-DETE SYS-INTR. Keywords MANETs trust management access control machine learning I. Introduction A typical organization may have many resources and entities which want to access those resources. For example in a military setting there may be resources such as battle plans communication systems surveillance equipment and weapons systems that may need to be accessed by different personnel at .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.