您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(工学版)》

山东大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (5): 29-34.doi: 10.6040/j.issn.1672-3961.0.2013.286

• 控制科学与工程 • 上一篇    下一篇

基于链接的无线传感器网络簇中可信模型

程添亮, 翟玉庆   

  1. 东南大学计算机科学与工程学院, 江苏 南京 211189
  • 收稿日期:2013-10-14 修回日期:2014-05-16 发布日期:2013-10-14
  • 通讯作者: 翟玉庆(1966-), 男, 江苏南京人, 教授, 博士, 硕士研究生导师, 主要研究方向为信任机制和回答集逻辑推理.E-mail:yqzhai@seu.edu.cn E-mail:yqzhai@seu.edu.cn
  • 作者简介:程添亮(1989-), 男, 江苏连云港人, 硕士研究生, 主要研究方向为无线传感器网络中的信任机制.E-mail:875612962@qq.com
  • 基金资助:
    国家自然科学基金资助项目(6509000059)

Link-based trusted cluster model for wireless sensor network

CHENG Tianliang, ZHAI Yuqing   

  1. College of Computer Science and Engineering, Southeast University, Nanjing 211189, Jiangsu, China
  • Received:2013-10-14 Revised:2014-05-16 Published:2013-10-14

摘要: 通过引入社会网络中链接的概念,提出1种无线传感器网络簇中可信模型,以更有效地检测非正常节点。模型把对节点的信任分成持久信任和即时信任,在即时信任和持久信任的基础上计算每个节点的信誉,利用信誉检测非正常节点。通过实验分析了阀值的取值并将本研究模型与其他模型进行比较。实验结果表明,在检测非正常节点方面,基于链接的簇中可信模型比GTMS(group-based trust management scheme)和RFSN(reputation-based framework for sensor network)更为优秀。

关键词: 链接, 非正常节点检测, 无线传感器网络, 信任, 信誉,

Abstract: The trusted cluster model for wireless sensor network was proposed to detect the abnormal nodes effectively by using link of social network. Trust was divided into permanent trust and temporary trust. Each nodes reputation was calculated to detect the abnormal nodes combining permanent trust with temporary trust. In the experiments, the threshold value was discussed and the proposed model was compared with other models. The results showed the link-based trusted cluster model for wireless sensor network was better than GTMS(group-based trust management scheme)and RFSN(reputation-based framework for sensor network)in detecting the abnormal nodes.

Key words: cluster, link, wireless sensor network, trust, detection of abnormal node, reputation

中图分类号: 

  • TP391
[1] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al.Wireless sensor networks: a survey[J].Computer Networks, 2002, 38(4):393-422.
[2] HAENGGI M, REUTHER A I, GOODMAN J I, et al.Handbook of sensor networks:compact wireless and wired sensing systems[M].Boca Raton:CRC Press, 2004:27-59.
[3] POTTIE G J, KAISER W J.Wireless integrated network sensors[J].Communications of the ACM, 2000, 43(5):51-58.
[4] SU W T, CHANG K M, KUO Y H.eHIP:an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J].Computer Networks, 2007, 51(4):1151-1168.
[5] YAO Z, KIM D, DOH Y.PLUS:parameterized and localized trust management scheme for sensor networks security[C]//Mobile Ad Hoc and Sensor Systems (MASS).Hong Kong:Springer, 2006:437-446.
[6] FENG R, XU X, ZHOU X, et al.A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory[J].Sensors, 2011, 11(2):1345-1360.
[7] YICK J, MUKHERJEE B, GHOSAL D.Wireless sensor network survey[J].Computer Networks, 2008, 52(12):2292-2330.
[8] KIM T K, SEO H S.A trust model using fuzzy logic in wireless sensor networks[J].World Academy of Science, Engineering and Technology, 2008, 42(4):63-66.
[9] GANERIWAL S, SRIVASTAVA M B.Reputation-based framework for high integrity sensor networks[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM, 2004:66-77.
[10] SHAIKH R A, JAMEEL H, D'AURIOL B J, et al.Group-based trust management scheme for clustered wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems, 2009, 20(11):1698-1712.
[11] ZAHARIADIS T, LELIGOU H C, TRAKADAS P, et al.Trust management in wireless sensor networks[J].European Transactions on Telecommunications, 2010, 21(4):386-395.
[12] LIU D, NING P, DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington, D C, USA:IEEE, 2005:609-619.
[13] CHO Y, QU G, WU Y.Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks[C]//IEEE Symposium on Security and Privacy Workshops (SPW) San Francisco.CA, USA:IEEE, 2012:134-141.
[14] PIRESJR W R, DE PAULA FIGUEIREDO T H, WONG H C, et al.Malicious node detection in wireless sensor networks[C]//Proceedings of the 18th Conference on International Parallel and Distributed Processing Symposium.[S.l]:IEEE, 2004:24-35.
[15] VARLAMIS I, EIRINAKI M, LOUTA M.Application of social network metrics to a trust-aware collaborative model for generating personalized user recommendations [M].Vienna:Springer, 2013:49-74.
[16] VARLAMIS I, LOUTA M.Towards a personalized blog site recommendation system:a collaborative rating approach[C]//4th International Workshop on Semantic Media Adaptation and Personalization.San Sebastain, Spain:IEEE, 2009:38-43.
[17] KALE A.Modeling trust and influence on blogosphere using link polarity[D].Washington:MaryLand University, 2007.
[18] MASSA P, AVESANI P.Controversial users demand local trust metrics:an experimental study on Epinions.com community[C]//Proceedings of the National Conference on Artificial Intelligence.Menlo Park, CA:AAAI Press, 2005:121-127.
[19] YU B, SINGH M P.A social mechanism of reputation management in electronic communities [M]//Cooperative Information Agents IV-The Future of Information Agents in Cyberspace.Berlin:Springer, 2000:154-165.
[20] 张润萌.基于可信机制的个性化推荐技术及其应用研究[D].南京:东南大学, 2011.ZHANG Runmeng.Personalized recommendation technology and its application based on credible mechanism[D].Nanjing:Southeast University, 2011.
[21] 孔德华.基于信任的云服务推荐系统的研究与实现[D].南京:东南大学,2013.KONG Dehua.Research and implementation of a trusted recommendation system based on cloud services[D].Nanjing:Southeast University, 2013.
[22] 张彭成.基于信任的云服务组合机制的研究[D].南京:东南大学,2013.ZHANG Pengcheng.A combination of cloud services mechanism based on trust[D].Nanjing:Southeast University, 2013.
[23] Leon Gu.Dirichlet distribution, dirichlet process and dirichlet process Mixture[R/OL].[2013-10-10].http://www.cs.cmu.edu/~epxing/Class/10701-08s/recitation/dirichlet.pdf.
[24] WERNER-ALLEN G, JOHNSON J, RUIZ M, et al.Monitoring volcanic eruptions with a wireless sensor network[C]//Proceedings of the Second European Workshop on Wireless Sensor Networks.Turkey:IEEE, 2005:108-120.
[25] ZHANG Y, LEE W.Intrusion detection in wireless ad-hoc networks[C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston:ACM, 2000:275-283.
[1] 卢文羊, 徐佳一, 杨育彬. 基于LDA主题模型的社会网络链接预测[J]. 山东大学学报(工学版), 2014, 44(6): 26-31.
[2] 姚华传, 王丽珍, 吴萍萍, 邹目权. AC_SAR:基于强关联规则的可行动分簇算法[J]. 山东大学学报(工学版), 2014, 44(6): 38-46.
[3] 张欣怡,翟玉庆*. 基于证据理论的信任模型中冲突证据[J]. 山东大学学报(工学版), 2013, 43(1): 48-53.
[4] 孙香花. 基于距离向量的改进WSN路由算法[J]. 山东大学学报(工学版), 2012, 42(6): 25-30.
[5] 鲁松1,徐文春2,杨云2. 一种分环多跳的无线传感器网络分簇路由加权算法[J]. 山东大学学报(工学版), 2012, 42(4): 24-28.
[6] 蒋盛益1,罗方伦1,余雯2. 基于视觉原理的密度聚类算法的改进[J]. 山东大学学报(工学版), 2011, 41(4): 85-90.
[7] 雷小锋1,庄伟1,程宇1,丁世飞1,谢昆青2. OPHCLUS:基于序关系保持的层次聚类算法[J]. 山东大学学报(工学版), 2010, 40(5): 48-55.
[8] 冯爱民1,刘学军1,陈斌2. 结构大间隔单类分类器[J]. 山东大学学报(工学版), 2010, 40(3): 6-12.
[9] 夏少波1,许娥2. 无线传感器网络节点定位算法[J]. 山东大学学报(工学版), 2010, 40(3): 143-147.
[10] 陈冬岩. 基于多信道的MAC层协议在无线传感器网络中的应用[J]. 山东大学学报(工学版), 2009, 39(1): 41-49.
[11] 李梁,罗奇鸣,陈恩红. 对象级搜索中基于图的对象排序模型(英文)[J]. 山东大学学报(工学版), 2009, 39(1): 15-21.
[12] 蔡忠欣,张华忠 . 一种基于睡眠和网关选择机制的分簇协议[J]. 山东大学学报(工学版), 2008, 38(1): 56-60 .
[13] 谢楠 . 济南市大气细颗粒物水溶性组分及大气传输的研究[J]. 山东大学学报(工学版), 2007, 37(4): 0-0 .
[14] 杨凌霄,侯鲁健,吕波,王文兴,周学华,王哲,周杨,程淑会 . 济南市大气细颗粒物水溶性组分及大气传输的研究[J]. 山东大学学报(工学版), 2007, 37(4): 98-103 .
[15] 黄玉,王剑 . 无线传感器网络中的能量分布[J]. 山东大学学报(工学版), 2006, 36(6): 42-45 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!