Heterogeneous mobile network access control technology based on mutual trust mechanism

被引:1
|
作者
Wang, Feng [1 ]
Liu, Shaojiang [2 ]
Ni, Weichuan [2 ]
Xu, Zhiming [1 ]
Wan, Zhiping [1 ]
机构
[1] Sun Yat Sen Univ, Dept Informat Sci, Xinhua Coll, Guangzhou, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Dept Equipment & Lab Management, Xinhua Coll, Guangzhou, Guangdong, Peoples R China
关键词
Heterogeneous mobile network; Mutual trust mechanism; Naive Bayes; Hidden Markov model; Abnormal node detection; MALICIOUS NODE DETECTION; SCHEME; AUTHENTICATION;
D O I
10.1007/s12083-019-00771-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of mobile communication equipment, the application scope of heterogeneous mobile networks is expanding. The diversity of network types and access methods of heterogeneous mobile networks also increases the number of security problems that exist in the network. In order to ensure the security of the heterogeneous mobile network, it is necessary to perform effective authentication and status monitoring on the mobile communication device requesting access to the heterogeneous mobile network. To this end, this paper proposes a heterogeneous mobile network access control technology based on mutual trust mechanism. Firstly, this technology designs a network system model based on mutual trust system. In this network structure, the mobile communication node needs to pass the verification of the security service system before access the network, which guarantees the security of the heterogeneous mobile network to a certain extent. In order to meet the network service quality requirements of mobile communication nodes, this paper adopts a naive Bayesian-based machine learning method to select the optimal access network in heterogeneous networks for mobile communication nodes. In order to prevent malicious nodes in abnormal state from destroying network security, this paper adopts the hidden node detection method based on hidden Markov model. The security service system is suspended to provide a trust service for the detected abnormal node, to make the security service system stop providing trust services for exception nodes and the exception nodes unable to continue using network services. In the simulation experiment, the security analysis of the algorithm and the effectiveness evaluation of the performance were carried out.
引用
收藏
页码:1489 / 1498
页数:10
相关论文
共 50 条
  • [31] Access Control for hybrid Femtocell Network based on AGV Mechanism
    Li, Chengmei
    Duan, Hexiang
    Ba, Hongbo
    Zhang, Xiaoning
    Wu, Jianjun
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 1055 - 1058
  • [32] Application of Fuzzy Neural Network in the Trust-Based Access Control Model
    Su, Rina
    Zhang, Yongping
    Fan, Jianbo
    Wang, Yu
    2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1273 - 1276
  • [33] Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust Framework
    Li, Yong
    Chen, Lu
    Li, Nige
    Lu, Ziang
    Dai, Zaojian
    Wu, Fan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 612 - 624
  • [34] Trusted Access in Wireless Network on Mutual Interactive Authentication Mechanism
    Zhu, Dali
    Pang, Na
    Fan, Zheming
    Ou, Changhai
    PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 776 - 781
  • [35] Study on access technology of storage data in heterogeneous network
    Zhang Huili
    Ren Wenxia
    Lv Wenzhe
    Gao Guanwang
    Yue Yongzhe
    ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL III, 2007, : 769 - +
  • [36] Exploring a Context-based Network Access Control for Mobile Devices
    Mowafi, Yaser
    Abou-Tair, Dhiah el Diehn I.
    Zmily, Ahmad
    Al-Aqarbeh, Tareq
    Abilov, Marat
    Dmitriyevr, Viktor
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND SOFTWARE ENGINEERING (SCSE'15), 2015, 62 : 547 - 554
  • [37] Decentralized Trust Driven Access Control for Mobile Content Sharing
    Vidyalakshmi, B. S.
    Wong, Raymond K.
    Chi, Chi-Hung
    2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 239 - 246
  • [38] A Flexible Access Control Mechanism for Mobile Commerce
    Lo, Chi-Chun
    Huang, Chun-Chieh
    Chang, Chung-Huan
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 145 - 146
  • [39] An access network selection mechanism for heterogeneous wireless environments
    Li, W. (wjli@bupt.edu.cn), 1799, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [40] Collaborative Mechanism Based on Trust Network
    Wei Hantian
    Wang Furong
    INFORMATION AND MANAGEMENT ENGINEERING, PT VI, 2011, 236 : 445 - +