Heterogeneous mobile network access control technology based on mutual trust mechanism

被引:1
|
作者
Wang, Feng [1 ]
Liu, Shaojiang [2 ]
Ni, Weichuan [2 ]
Xu, Zhiming [1 ]
Wan, Zhiping [1 ]
机构
[1] Sun Yat Sen Univ, Dept Informat Sci, Xinhua Coll, Guangzhou, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Dept Equipment & Lab Management, Xinhua Coll, Guangzhou, Guangdong, Peoples R China
关键词
Heterogeneous mobile network; Mutual trust mechanism; Naive Bayes; Hidden Markov model; Abnormal node detection; MALICIOUS NODE DETECTION; SCHEME; AUTHENTICATION;
D O I
10.1007/s12083-019-00771-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of mobile communication equipment, the application scope of heterogeneous mobile networks is expanding. The diversity of network types and access methods of heterogeneous mobile networks also increases the number of security problems that exist in the network. In order to ensure the security of the heterogeneous mobile network, it is necessary to perform effective authentication and status monitoring on the mobile communication device requesting access to the heterogeneous mobile network. To this end, this paper proposes a heterogeneous mobile network access control technology based on mutual trust mechanism. Firstly, this technology designs a network system model based on mutual trust system. In this network structure, the mobile communication node needs to pass the verification of the security service system before access the network, which guarantees the security of the heterogeneous mobile network to a certain extent. In order to meet the network service quality requirements of mobile communication nodes, this paper adopts a naive Bayesian-based machine learning method to select the optimal access network in heterogeneous networks for mobile communication nodes. In order to prevent malicious nodes in abnormal state from destroying network security, this paper adopts the hidden node detection method based on hidden Markov model. The security service system is suspended to provide a trust service for the detected abnormal node, to make the security service system stop providing trust services for exception nodes and the exception nodes unable to continue using network services. In the simulation experiment, the security analysis of the algorithm and the effectiveness evaluation of the performance were carried out.
引用
收藏
页码:1489 / 1498
页数:10
相关论文
共 50 条
  • [21] Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID
    Chen, Bing-Chang
    Yang, Cheng-Ta
    Yeh, Her-Tyan
    Lin, Ching-Chao
    APPLIED SCIENCES-BASEL, 2016, 6 (08):
  • [22] Trust and Risk based Access Control and Access Control Constraints
    Helil, Nurmamat
    Kim, Mucheol
    Han, Sangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
  • [23] Access mechanism of TMP under mobile network
    Wu, Zhen-Qiang
    Zhou, Yan-Wei
    Qiao, Zi-Rui
    Tongxin Xuebao/Journal on Communications, 2010, 31 (10): : 158 - 169
  • [24] A HETEROGENEOUS NETWORK ACCESS CONTROL ALGORITHM BASED ON DS EVIDENCE THEORY
    Kang, Jianmin
    Ma, Lin
    Xu, Yubin
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [25] Reputation trust mechanism under the organizational-based access control model
    Toumi, Khalifa
    Sfar, Hela
    Alfaro, Joaquin Garcia
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5295 - 5310
  • [26] SATI: Sidechain-Based Access Control & Trust Mechanism for IoT Networks
    Pathak, Aditya
    Al-Anbagi, Irfan
    Hamilton, Howard J.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (05): : 5888 - 5903
  • [27] Trust based Authorization and Access Control
    Feng Fujun
    Li Junshan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 162 - 165
  • [28] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [29] Network Access Control Mechanism based on Locator/Identifier Split
    Tu Rui
    Su Jinshu
    Chen Feng
    NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, : 171 - 174
  • [30] Blockchain-Based Social Network Access Control Mechanism
    Dai, Minjun
    Li, Yongsheng
    Wen, Yong
    Liu, Dongyu
    Chen, Honglin
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 : 147 - 164