Heterogeneous mobile network access control technology based on mutual trust mechanism

被引:1
|
作者
Wang, Feng [1 ]
Liu, Shaojiang [2 ]
Ni, Weichuan [2 ]
Xu, Zhiming [1 ]
Wan, Zhiping [1 ]
机构
[1] Sun Yat Sen Univ, Dept Informat Sci, Xinhua Coll, Guangzhou, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Dept Equipment & Lab Management, Xinhua Coll, Guangzhou, Guangdong, Peoples R China
关键词
Heterogeneous mobile network; Mutual trust mechanism; Naive Bayes; Hidden Markov model; Abnormal node detection; MALICIOUS NODE DETECTION; SCHEME; AUTHENTICATION;
D O I
10.1007/s12083-019-00771-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of mobile communication equipment, the application scope of heterogeneous mobile networks is expanding. The diversity of network types and access methods of heterogeneous mobile networks also increases the number of security problems that exist in the network. In order to ensure the security of the heterogeneous mobile network, it is necessary to perform effective authentication and status monitoring on the mobile communication device requesting access to the heterogeneous mobile network. To this end, this paper proposes a heterogeneous mobile network access control technology based on mutual trust mechanism. Firstly, this technology designs a network system model based on mutual trust system. In this network structure, the mobile communication node needs to pass the verification of the security service system before access the network, which guarantees the security of the heterogeneous mobile network to a certain extent. In order to meet the network service quality requirements of mobile communication nodes, this paper adopts a naive Bayesian-based machine learning method to select the optimal access network in heterogeneous networks for mobile communication nodes. In order to prevent malicious nodes in abnormal state from destroying network security, this paper adopts the hidden node detection method based on hidden Markov model. The security service system is suspended to provide a trust service for the detected abnormal node, to make the security service system stop providing trust services for exception nodes and the exception nodes unable to continue using network services. In the simulation experiment, the security analysis of the algorithm and the effectiveness evaluation of the performance were carried out.
引用
收藏
页码:1489 / 1498
页数:10
相关论文
共 50 条
  • [41] Access Security Based on Bayesian Trust Network
    Liu, Yichun
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 292 - 294
  • [42] Research and Application of Power Terminal Communication Access System Based on Heterogeneous Network Technology
    Li Huan
    Sun Feng
    He Lishuai
    Lu Bin
    Wang Dongdong
    Meng Fanbo
    Zhu Wenjia
    Liu Chuanbo
    Zhu Qiang
    Li Nan
    Zhang Wenxiao
    Zhang Dongfang
    Wang Bolong
    2020 4TH INTERNATIONAL WORKSHOP ON RENEWABLE ENERGY AND DEVELOPMENT (IWRED 2020), 2020, 510
  • [43] Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control
    Abdul, Arif Mohammad
    Mohammad, Arshad Ahmad Khan
    Venkat Reddy, P.
    Nuthakki, Praveena
    Kancharla, Rakesh
    Joshi, Rahul
    Kannaiya Raja, N.
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [44] DEVICE-TO-DEVICE-BASED HETEROGENEOUS RADIO ACCESS NETWORK ARCHITECTURE FOR MOBILE CLOUD COMPUTING
    Jo, Minho
    Maksymyuk, Taras
    Strykhalyuk, Bohdan
    Cho, Choong-Ho
    IEEE WIRELESS COMMUNICATIONS, 2015, 22 (03) : 50 - 58
  • [45] The Trust-Based Access Control Model in the Wireless Sensor Network<bold> </bold>
    Luo Jing-tang
    Yao Shi-ying
    Gou Ji-jun
    Xu Qi-yang
    2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 112 - 116
  • [46] Mobile Multicast Mechanism based MIH for Efficient Network Resource Usage in Heterogeneous Networks
    Jang, In-Seop
    Kim, Won-Tae
    Park, Jae-Man
    Park, Yong-Jin
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 850 - 854
  • [47] Access Control for Software-Defined Heterogeneous Wireless Access Network
    Xu, Fangmin
    Qiu, Chao
    Guo, Andong
    Zhao, Chenglin
    2016 16TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2016, : 520 - 524
  • [48] A privacy preserving access control mechanism for network-based database
    Rui, Fan
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 435 - 439
  • [49] Dynamic Game Access Control based on Trust
    Ma, Shunan
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1369 - 1373
  • [50] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514