山东大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (5): 29-34.doi: 10.6040/j.issn.1672-3961.0.2013.286
程添亮, 翟玉庆
CHENG Tianliang, ZHAI Yuqing
摘要: 通过引入社会网络中链接的概念,提出1种无线传感器网络簇中可信模型,以更有效地检测非正常节点。模型把对节点的信任分成持久信任和即时信任,在即时信任和持久信任的基础上计算每个节点的信誉,利用信誉检测非正常节点。通过实验分析了阀值的取值并将本研究模型与其他模型进行比较。实验结果表明,在检测非正常节点方面,基于链接的簇中可信模型比GTMS(group-based trust management scheme)和RFSN(reputation-based framework for sensor network)更为优秀。
中图分类号:
[1] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al.Wireless sensor networks: a survey[J].Computer Networks, 2002, 38(4):393-422. [2] HAENGGI M, REUTHER A I, GOODMAN J I, et al.Handbook of sensor networks:compact wireless and wired sensing systems[M].Boca Raton:CRC Press, 2004:27-59. [3] POTTIE G J, KAISER W J.Wireless integrated network sensors[J].Communications of the ACM, 2000, 43(5):51-58. [4] SU W T, CHANG K M, KUO Y H.eHIP:an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J].Computer Networks, 2007, 51(4):1151-1168. [5] YAO Z, KIM D, DOH Y.PLUS:parameterized and localized trust management scheme for sensor networks security[C]//Mobile Ad Hoc and Sensor Systems (MASS).Hong Kong:Springer, 2006:437-446. [6] FENG R, XU X, ZHOU X, et al.A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory[J].Sensors, 2011, 11(2):1345-1360. [7] YICK J, MUKHERJEE B, GHOSAL D.Wireless sensor network survey[J].Computer Networks, 2008, 52(12):2292-2330. [8] KIM T K, SEO H S.A trust model using fuzzy logic in wireless sensor networks[J].World Academy of Science, Engineering and Technology, 2008, 42(4):63-66. [9] GANERIWAL S, SRIVASTAVA M B.Reputation-based framework for high integrity sensor networks[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM, 2004:66-77. [10] SHAIKH R A, JAMEEL H, D'AURIOL B J, et al.Group-based trust management scheme for clustered wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems, 2009, 20(11):1698-1712. [11] ZAHARIADIS T, LELIGOU H C, TRAKADAS P, et al.Trust management in wireless sensor networks[J].European Transactions on Telecommunications, 2010, 21(4):386-395. [12] LIU D, NING P, DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington, D C, USA:IEEE, 2005:609-619. [13] CHO Y, QU G, WU Y.Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks[C]//IEEE Symposium on Security and Privacy Workshops (SPW) San Francisco.CA, USA:IEEE, 2012:134-141. [14] PIRESJR W R, DE PAULA FIGUEIREDO T H, WONG H C, et al.Malicious node detection in wireless sensor networks[C]//Proceedings of the 18th Conference on International Parallel and Distributed Processing Symposium.[S.l]:IEEE, 2004:24-35. [15] VARLAMIS I, EIRINAKI M, LOUTA M.Application of social network metrics to a trust-aware collaborative model for generating personalized user recommendations [M].Vienna:Springer, 2013:49-74. [16] VARLAMIS I, LOUTA M.Towards a personalized blog site recommendation system:a collaborative rating approach[C]//4th International Workshop on Semantic Media Adaptation and Personalization.San Sebastain, Spain:IEEE, 2009:38-43. [17] KALE A.Modeling trust and influence on blogosphere using link polarity[D].Washington:MaryLand University, 2007. [18] MASSA P, AVESANI P.Controversial users demand local trust metrics:an experimental study on Epinions.com community[C]//Proceedings of the National Conference on Artificial Intelligence.Menlo Park, CA:AAAI Press, 2005:121-127. [19] YU B, SINGH M P.A social mechanism of reputation management in electronic communities [M]//Cooperative Information Agents IV-The Future of Information Agents in Cyberspace.Berlin:Springer, 2000:154-165. [20] 张润萌.基于可信机制的个性化推荐技术及其应用研究[D].南京:东南大学, 2011.ZHANG Runmeng.Personalized recommendation technology and its application based on credible mechanism[D].Nanjing:Southeast University, 2011. [21] 孔德华.基于信任的云服务推荐系统的研究与实现[D].南京:东南大学,2013.KONG Dehua.Research and implementation of a trusted recommendation system based on cloud services[D].Nanjing:Southeast University, 2013. [22] 张彭成.基于信任的云服务组合机制的研究[D].南京:东南大学,2013.ZHANG Pengcheng.A combination of cloud services mechanism based on trust[D].Nanjing:Southeast University, 2013. [23] Leon Gu.Dirichlet distribution, dirichlet process and dirichlet process Mixture[R/OL].[2013-10-10].http://www.cs.cmu.edu/~epxing/Class/10701-08s/recitation/dirichlet.pdf. [24] WERNER-ALLEN G, JOHNSON J, RUIZ M, et al.Monitoring volcanic eruptions with a wireless sensor network[C]//Proceedings of the Second European Workshop on Wireless Sensor Networks.Turkey:IEEE, 2005:108-120. [25] ZHANG Y, LEE W.Intrusion detection in wireless ad-hoc networks[C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston:ACM, 2000:275-283. |
[1] | 卢文羊, 徐佳一, 杨育彬. 基于LDA主题模型的社会网络链接预测[J]. 山东大学学报(工学版), 2014, 44(6): 26-31. |
[2] | 姚华传, 王丽珍, 吴萍萍, 邹目权. AC_SAR:基于强关联规则的可行动分簇算法[J]. 山东大学学报(工学版), 2014, 44(6): 38-46. |
[3] | 张欣怡,翟玉庆*. 基于证据理论的信任模型中冲突证据[J]. 山东大学学报(工学版), 2013, 43(1): 48-53. |
[4] | 孙香花. 基于距离向量的改进WSN路由算法[J]. 山东大学学报(工学版), 2012, 42(6): 25-30. |
[5] | 鲁松1,徐文春2,杨云2. 一种分环多跳的无线传感器网络分簇路由加权算法[J]. 山东大学学报(工学版), 2012, 42(4): 24-28. |
[6] | 蒋盛益1,罗方伦1,余雯2. 基于视觉原理的密度聚类算法的改进[J]. 山东大学学报(工学版), 2011, 41(4): 85-90. |
[7] | 雷小锋1,庄伟1,程宇1,丁世飞1,谢昆青2. OPHCLUS:基于序关系保持的层次聚类算法[J]. 山东大学学报(工学版), 2010, 40(5): 48-55. |
[8] | 冯爱民1,刘学军1,陈斌2. 结构大间隔单类分类器[J]. 山东大学学报(工学版), 2010, 40(3): 6-12. |
[9] | 夏少波1,许娥2. 无线传感器网络节点定位算法[J]. 山东大学学报(工学版), 2010, 40(3): 143-147. |
[10] | 陈冬岩. 基于多信道的MAC层协议在无线传感器网络中的应用[J]. 山东大学学报(工学版), 2009, 39(1): 41-49. |
[11] | 李梁,罗奇鸣,陈恩红. 对象级搜索中基于图的对象排序模型(英文)[J]. 山东大学学报(工学版), 2009, 39(1): 15-21. |
[12] | 蔡忠欣,张华忠 . 一种基于睡眠和网关选择机制的分簇协议[J]. 山东大学学报(工学版), 2008, 38(1): 56-60 . |
[13] | 谢楠 . 济南市大气细颗粒物水溶性组分及大气传输的研究[J]. 山东大学学报(工学版), 2007, 37(4): 0-0 . |
[14] | 杨凌霄,侯鲁健,吕波,王文兴,周学华,王哲,周杨,程淑会 . 济南市大气细颗粒物水溶性组分及大气传输的研究[J]. 山东大学学报(工学版), 2007, 37(4): 98-103 . |
[15] | 黄玉,王剑 . 无线传感器网络中的能量分布[J]. 山东大学学报(工学版), 2006, 36(6): 42-45 . |
|