Heterogeneous mobile network access control technology based on mutual trust mechanism

被引:1
|
作者
Wang, Feng [1 ]
Liu, Shaojiang [2 ]
Ni, Weichuan [2 ]
Xu, Zhiming [1 ]
Wan, Zhiping [1 ]
机构
[1] Sun Yat Sen Univ, Dept Informat Sci, Xinhua Coll, Guangzhou, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Dept Equipment & Lab Management, Xinhua Coll, Guangzhou, Guangdong, Peoples R China
关键词
Heterogeneous mobile network; Mutual trust mechanism; Naive Bayes; Hidden Markov model; Abnormal node detection; MALICIOUS NODE DETECTION; SCHEME; AUTHENTICATION;
D O I
10.1007/s12083-019-00771-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of mobile communication equipment, the application scope of heterogeneous mobile networks is expanding. The diversity of network types and access methods of heterogeneous mobile networks also increases the number of security problems that exist in the network. In order to ensure the security of the heterogeneous mobile network, it is necessary to perform effective authentication and status monitoring on the mobile communication device requesting access to the heterogeneous mobile network. To this end, this paper proposes a heterogeneous mobile network access control technology based on mutual trust mechanism. Firstly, this technology designs a network system model based on mutual trust system. In this network structure, the mobile communication node needs to pass the verification of the security service system before access the network, which guarantees the security of the heterogeneous mobile network to a certain extent. In order to meet the network service quality requirements of mobile communication nodes, this paper adopts a naive Bayesian-based machine learning method to select the optimal access network in heterogeneous networks for mobile communication nodes. In order to prevent malicious nodes in abnormal state from destroying network security, this paper adopts the hidden node detection method based on hidden Markov model. The security service system is suspended to provide a trust service for the detected abnormal node, to make the security service system stop providing trust services for exception nodes and the exception nodes unable to continue using network services. In the simulation experiment, the security analysis of the algorithm and the effectiveness evaluation of the performance were carried out.
引用
收藏
页码:1489 / 1498
页数:10
相关论文
共 50 条
  • [1] Heterogeneous mobile network access control technology based on mutual trust mechanism
    Feng Wang
    Shaojiang Liu
    Weichuan Ni
    Zhiming Xu
    Zhiping Wan
    Peer-to-Peer Networking and Applications, 2019, 12 : 1489 - 1498
  • [2] Smart Mobile RouterWireless Heterogeneous Network Access Mechanism
    Li, Dezhen
    Qiao, Wenxuan
    Ren, Xiangyu
    Zhang, Yuyang
    Zhang, Xiaoya
    Dong, Ping
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 221 - 232
  • [3] Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment
    Yoon, Sunghyun
    Lee, Soon Seok
    Kim, Sang-Ha
    TELECOMMUNICATION SYSTEMS, 2015, 60 (02) : 275 - 284
  • [4] Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment
    Sunghyun Yoon
    Soon Seok Lee
    Sang-Ha Kim
    Telecommunication Systems, 2015, 60 : 275 - 284
  • [5] Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks
    Kim, Dae-Young
    Ko, Dae-sik
    Kim, Seokhoon
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [6] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162
  • [7] Mobile Internet Access Control Strategy Based on Trust Perception
    Chen, Lu
    Zhao, Xinjian
    Zhao, Ran
    Yuan, Guoquan
    Zhang, Song
    Chen, Shi
    Wu, Fan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 598 - 611
  • [8] An adaptive mutual trust based access control model for electronic healthcare system
    Singh, Ashish
    Chatterjee, Kakali
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) : 2117 - 2136
  • [9] An adaptive mutual trust based access control model for electronic healthcare system
    Ashish Singh
    Kakali Chatterjee
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 2117 - 2136
  • [10] An IEEE 802.21 Based Heterogeneous Access Network Selection Mechanism
    Wang, Renzheng
    Wang, Xingwei
    Li, Fuliang
    Huang, Min
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, ICIC 2015, PT III, 2015, 9227 : 574 - 585