JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2014, Vol. 44 ›› Issue (5): 29-34.doi: 10.6040/j.issn.1672-3961.0.2013.286

Previous Articles     Next Articles

Link-based trusted cluster model for wireless sensor network

CHENG Tianliang, ZHAI Yuqing   

  1. College of Computer Science and Engineering, Southeast University, Nanjing 211189, Jiangsu, China
  • Received:2013-10-14 Revised:2014-05-16 Published:2013-10-14

Abstract: The trusted cluster model for wireless sensor network was proposed to detect the abnormal nodes effectively by using link of social network. Trust was divided into permanent trust and temporary trust. Each nodes reputation was calculated to detect the abnormal nodes combining permanent trust with temporary trust. In the experiments, the threshold value was discussed and the proposed model was compared with other models. The results showed the link-based trusted cluster model for wireless sensor network was better than GTMS(group-based trust management scheme)and RFSN(reputation-based framework for sensor network)in detecting the abnormal nodes.

Key words: cluster, link, wireless sensor network, trust, detection of abnormal node, reputation

CLC Number: 

  • TP391
[1] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al.Wireless sensor networks: a survey[J].Computer Networks, 2002, 38(4):393-422.
[2] HAENGGI M, REUTHER A I, GOODMAN J I, et al.Handbook of sensor networks:compact wireless and wired sensing systems[M].Boca Raton:CRC Press, 2004:27-59.
[3] POTTIE G J, KAISER W J.Wireless integrated network sensors[J].Communications of the ACM, 2000, 43(5):51-58.
[4] SU W T, CHANG K M, KUO Y H.eHIP:an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J].Computer Networks, 2007, 51(4):1151-1168.
[5] YAO Z, KIM D, DOH Y.PLUS:parameterized and localized trust management scheme for sensor networks security[C]//Mobile Ad Hoc and Sensor Systems (MASS).Hong Kong:Springer, 2006:437-446.
[6] FENG R, XU X, ZHOU X, et al.A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory[J].Sensors, 2011, 11(2):1345-1360.
[7] YICK J, MUKHERJEE B, GHOSAL D.Wireless sensor network survey[J].Computer Networks, 2008, 52(12):2292-2330.
[8] KIM T K, SEO H S.A trust model using fuzzy logic in wireless sensor networks[J].World Academy of Science, Engineering and Technology, 2008, 42(4):63-66.
[9] GANERIWAL S, SRIVASTAVA M B.Reputation-based framework for high integrity sensor networks[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM, 2004:66-77.
[10] SHAIKH R A, JAMEEL H, D'AURIOL B J, et al.Group-based trust management scheme for clustered wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems, 2009, 20(11):1698-1712.
[11] ZAHARIADIS T, LELIGOU H C, TRAKADAS P, et al.Trust management in wireless sensor networks[J].European Transactions on Telecommunications, 2010, 21(4):386-395.
[12] LIU D, NING P, DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington, D C, USA:IEEE, 2005:609-619.
[13] CHO Y, QU G, WU Y.Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks[C]//IEEE Symposium on Security and Privacy Workshops (SPW) San Francisco.CA, USA:IEEE, 2012:134-141.
[14] PIRESJR W R, DE PAULA FIGUEIREDO T H, WONG H C, et al.Malicious node detection in wireless sensor networks[C]//Proceedings of the 18th Conference on International Parallel and Distributed Processing Symposium.[S.l]:IEEE, 2004:24-35.
[15] VARLAMIS I, EIRINAKI M, LOUTA M.Application of social network metrics to a trust-aware collaborative model for generating personalized user recommendations [M].Vienna:Springer, 2013:49-74.
[16] VARLAMIS I, LOUTA M.Towards a personalized blog site recommendation system:a collaborative rating approach[C]//4th International Workshop on Semantic Media Adaptation and Personalization.San Sebastain, Spain:IEEE, 2009:38-43.
[17] KALE A.Modeling trust and influence on blogosphere using link polarity[D].Washington:MaryLand University, 2007.
[18] MASSA P, AVESANI P.Controversial users demand local trust metrics:an experimental study on Epinions.com community[C]//Proceedings of the National Conference on Artificial Intelligence.Menlo Park, CA:AAAI Press, 2005:121-127.
[19] YU B, SINGH M P.A social mechanism of reputation management in electronic communities [M]//Cooperative Information Agents IV-The Future of Information Agents in Cyberspace.Berlin:Springer, 2000:154-165.
[20] 张润萌.基于可信机制的个性化推荐技术及其应用研究[D].南京:东南大学, 2011.ZHANG Runmeng.Personalized recommendation technology and its application based on credible mechanism[D].Nanjing:Southeast University, 2011.
[21] 孔德华.基于信任的云服务推荐系统的研究与实现[D].南京:东南大学,2013.KONG Dehua.Research and implementation of a trusted recommendation system based on cloud services[D].Nanjing:Southeast University, 2013.
[22] 张彭成.基于信任的云服务组合机制的研究[D].南京:东南大学,2013.ZHANG Pengcheng.A combination of cloud services mechanism based on trust[D].Nanjing:Southeast University, 2013.
[23] Leon Gu.Dirichlet distribution, dirichlet process and dirichlet process Mixture[R/OL].[2013-10-10].http://www.cs.cmu.edu/~epxing/Class/10701-08s/recitation/dirichlet.pdf.
[24] WERNER-ALLEN G, JOHNSON J, RUIZ M, et al.Monitoring volcanic eruptions with a wireless sensor network[C]//Proceedings of the Second European Workshop on Wireless Sensor Networks.Turkey:IEEE, 2005:108-120.
[25] ZHANG Y, LEE W.Intrusion detection in wireless ad-hoc networks[C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston:ACM, 2000:275-283.
[1] LI Shijin, WANG Shengte, HUANG Leping. Change detection with remote sensing images based on forward-backward heterogenicity [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 1-9.
[2] WANG Huan, ZHOU Zhongmei. An over sampling algorithm based on clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 134-139.
[3] ZHANG Peirui, YANG Yan, XING Huanlai, YU Xiuying. Incremental multi-view clustering algorithm based on kernel K-means [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 48-53.
[4] DU Xixi, LIU Huafeng, JING Liping. An additive co-clustering for recommendation of integrating social network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 96-102.
[5] YANG Tianpeng, XU Kunpeng, CHEN Lifei. Coefficient of variation clustering algorithm for non-uniform data [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 140-145.
[6] DAI Shiyu, LIU Shuqin. Estimation of speed and acceleration of the Maglev platform by state observer [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(2): 114-120.
[7] PANG Renming, WANG Bo, YE Hao, ZHANG Haifeng, LI Mingliang. Clustering of blast furnace historical data based on PCA similarity factor and spectral clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(5): 143-149.
[8] HAN Guangdong, ZHANG Tong, CHEN Haiquan, WANG Shenghai, ZHANG Jinnan. Payload pendulation dynamic analysis of ship-mounted crane [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(1): 112-118.
[9] WEI Lulu, LAI Yanhua, LU Yongda. The influence of transmission loss on the cold of Stirling cryocooler [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(5): 116-119.
[10] ZHOU Wang, ZHANG Chenlin, WU Jianxin. Qualitative balanced clustering algorithm based on Hartigan-Wong and Lloyd [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(5): 37-44.
[11] JI Xingquan, HAN Guozheng, LI Kejun, FU Rongrong, ZHU Yanghe. Application of improved K-means clustering algorithm based on density in distribution network block partitioning [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(4): 41-46.
[12] LI Shuo, SHI Yuliang. The method of spot cluster recommendation in location-based social networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(3): 44-50.
[13] JIANG Feng, DU Junwei, LIU Guozhu, SUI Yuefei. A weight-based initial centers selection algorithm for K-modes clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(2): 29-34.
[14] FAN Shuyan, DING Shifei. An improved multi-scale Graph cut algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(1): 28-33.
[15] XU Pingan, TANG Yan, SHI Jiaokai, ZHANG Huirong. K-Means clustering algorithm based on the Schrödinger equation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(1): 34-41.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!