助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   信任评估 在 电信技术 分类中 的翻译结果: 查询用时:0.549秒
图标索引 在分类学科中查询
所有学科
电信技术
互联网技术
计算机软件及计算机应用
数学
宏观经济管理与可持续发展
企业经济
更多类别查询

图标索引 历史查询
 

信任评估
相关语句
  trust evaluation
    Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network
    移动自组网中一种基于分簇的信任评估方案
短句来源
    Defend against Wormhole Attack Based on Neighbor Trust Evaluation in MANET
    一种基于邻居信任评估的虫洞防御机制
短句来源
    On the basis of the intensive analysis of the trust management, trust evaluation model and clustering strategy which had been proposed for MANET, a novel trust-based clustering algorithm was proposed in this paper.
    本文首先从信任的概念入手,在详细分析信任管理、信任评估模型和已有移动ad hoc网络成簇算法的基础上,创新性地提出了基于信任的成簇策略。
短句来源
    In order to solve these problems, this dissertation integrates the trust evaluation mechanism to the identity trust model based on PKI, which will realize the identity trusted and behavior trusted among the network nodes.
    为了解决这些问题,本文将行为信任评估机制引入基于PKI的移动Ad Hoc网络身份信任模型,实现网络节点间的身份可信与行为可信。
短句来源
    The important intent of the trust evaluation scheme is to resist the secure risk of misbehavior of node in an ad hoc network, and a cluster-based trust evaluation scheme is proposed in this thesis.
    移动自组网中信任评估方案主要用来防止网络中不良行为节点的安全威胁,本文提出一种基于分簇的信任评估方案。
短句来源
  trust valuation
    A Trust Valuation Model in Mobile Ad hoc Networks
    移动Ad hoc网络中一种信任评估模型
短句来源
    Trust Valuation Model in Mobile Ad hoc Network
    移动Ad hoc网络中的一种信任评估模型
短句来源
    To partition structurally the mobile Ad hoc network(MANET) in view of its security management and ensure its effective operation and management,a trust valuation model was developed according to the definition of trust.
    为了实现从安全管理的角度划分移动Ad hoc网络的网络结构,保证移动Ad hoc网络的有效运行和管理,提出了一种信任评估模型.
短句来源
  “信任评估”译为未确定词的双语例句
    The model we improved uses behavior trust as the decision standard for updating and revocation of identity trust relationship. The model changes the CA nodes set dynamically through the behavior trust for better considering both the usability and security.
    改进后的模型将行为信任作为身份信任关系更新、撤销的决策标准,并通过行为信任评估动态的改变CA节点集合,力求更好的兼顾网络的可用性与安全性。
短句来源
    When finding the route, the node will choose the higher trust value neighbor to relay the packet.
    在具体的路由过程中,节点根据信任评估值选取高可信度的邻居作为下一跳的转发节点,从而避免虫洞攻击的危害。
短句来源
    In this model trust is defined as a multiple dynamic evaluation on the object,and a reasonable method is provided to combine the direct experience and the indirect experience.
    在这个模型中,信任被定义成信任评估主体对客体的一个多角度的动态的评价,同时模型提供了一个合理的方法用于综合直接经验和间接经验。
短句来源
查询“信任评估”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  trust evaluation
Trust evaluation is critical to peer-to-peer (P2P) e-commerce environments.
      
This may lead to the bias in transaction trust evaluation and risk the new transaction.
      
In this paper we present a novel model for transaction trust evaluation, which differentiates transaction amounts when computing trust values.
      
The trust evaluation is dependent on transaction history, the amounts of old transactions, and the amount of the new transaction.
      
Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion.
      
更多          


The important intent of the trust evaluation scheme is to resist the secure risk of misbehavior of node in an ad hoc network, and a cluster-based trust evaluation scheme is proposed in this thesis. The head issues a trust value certificate that can be referred to by its non-neighbor nodes. In this way, an evaluation of an unfamiliar node's trust can be done very efficiently and precisely. In this paper, we present a trust evaluation metric using this scheme and some operations for forming and managing a cluster....

The important intent of the trust evaluation scheme is to resist the secure risk of misbehavior of node in an ad hoc network, and a cluster-based trust evaluation scheme is proposed in this thesis. The head issues a trust value certificate that can be referred to by its non-neighbor nodes. In this way, an evaluation of an unfamiliar node's trust can be done very efficiently and precisely. In this paper, we present a trust evaluation metric using this scheme and some operations for forming and managing a cluster. In contrast to the traditional schemes, it overcomes the limited information about unfamiliar nodes and reduces the required memory space. An analysis of the proposed scheme over some security problems is also presented.

移动自组网中信任评估方案主要用来防止网络中不良行为节点的安全威胁,本文提出一种基于分簇的信任评估方案。节点通过参考簇首发放的信任值证书可以对陌生节点进行准确有效的信任评估,并给出了该方案所涉及的信任评估公式以及簇的形成与管理的部分具体措施。它克服了移动自组网内传统信任评估方案中陌生节点间受限的信息交流的问题,减少了所需的存储空间,最后针对移动自组网部分安全问题给出了方案分析。

Mobile Ad hoc Networks(MANET) is a new networking paradigm for wireless hosts. Because of self-organization, dynamic topology and openness of wireless links, the routing security in MANET is more seriously than in wired networks. Wormhole attack is one of the deadly attacks to the MANET, which is executed by two or more attackers by constructing a tunnel to replay the routing protocol. Under this attack, the routing protocol will not work, especially which rely heavily on the reception of broadcast packets as...

Mobile Ad hoc Networks(MANET) is a new networking paradigm for wireless hosts. Because of self-organization, dynamic topology and openness of wireless links, the routing security in MANET is more seriously than in wired networks. Wormhole attack is one of the deadly attacks to the MANET, which is executed by two or more attackers by constructing a tunnel to replay the routing protocol. Under this attack, the routing protocol will not work, especially which rely heavily on the reception of broadcast packets as a means for neighbor detection.In this paper we give a new definition of neighbor which stresses the neighbor's function as "the first relay". Then we introduce Marsh model. By gathering data from the neighbor's events the node can evaluate the trustiness of its neighbor. From building the neighbor's trustiness, the false neighbor formed by wormhole attack will be scored lower value because of transmission failures events in MAC layer. When finding the route, the node will choose the higher trust value neighbor to relay the packet. We apply the model in the OLSR protocol and simulate it in NS2.

移动ad hoc网是一种新型无线移动网络,具有无中心、自组织、拓扑结构变化频繁以及开放式通讯信道等特性,因此ad hoc网络下的路由协议所面临的安全问题比有线网环境中更为严重。虫洞攻击就是其中的一种,能够对ad hoc网络产生致命的影响。在这种攻击下,网络的路由机制将会紊乱,特别是那些依赖通过接收对方的广播报文进行邻居探测的路由协议。本文首先从虫洞形成的根源上入手,重新定义了邻居的概念,强调了邻居作为节点信息转发第一站的功能。然后根据邻居定义,引入简化的Marsh1信任模型,将邻居的以往表现作为信任评估的经验来源,再通过具体公式对邻居关系做出判定。在具体的路由过程中,节点根据信任评估值选取高可信度的邻居作为下一跳的转发节点,从而避免虫洞攻击的危害。为了验证方法的可行性,本文将模型应用于OLSR路由协议中并在NS2中进行了仿真。

Because of self-organization,dynamic topology and openness of wireless links,trust is an important thing for security and reliability of Mobile Ad hoc Network’s nodes. Then a trust valuation model is given to value trust relationships between nodes. In this model trust is defined as a multiple dynamic evaluation on the object,and a reasonable method is provided to combine the direct experience and the indirect experience. As example we apply the model in a routing protocol.

移动Ad hoc网络没有固定的网络基础设施、网络拓扑结构频繁动态变化、无线信道完全开放、网络缺乏自稳定性。在这样的网络中,节点之间的相互信任对网络的安全保障与可靠运行均具有重要的意义。本文提出一个模型,用于网络节点之间的信任评估。在这个模型中,信任被定义成信任评估主体对客体的一个多角度的动态的评价,同时模型提供了一个合理的方法用于综合直接经验和间接经验。最后,将模型应用于移动Ad hoc的一种路由协议中,以示举例。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关信任评估的内容
在知识搜索中查有关信任评估的内容
在数字搜索中查有关信任评估的内容
在概念知识元中查有关信任评估的内容
在学术趋势中查有关信任评估的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社