您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(工学版)》

山东大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (5): 29-34.doi: 10.6040/j.issn.1672-3961.0.2013.286

• 控制科学与工程 • 上一篇    下一篇

基于链接的无线传感器网络簇中可信模型

程添亮, 翟玉庆   

  1. 东南大学计算机科学与工程学院, 江苏 南京 211189
  • 收稿日期:2013-10-14 修回日期:2014-05-16 发布日期:2013-10-14
  • 通讯作者: 翟玉庆(1966-), 男, 江苏南京人, 教授, 博士, 硕士研究生导师, 主要研究方向为信任机制和回答集逻辑推理.E-mail:yqzhai@seu.edu.cn E-mail:yqzhai@seu.edu.cn
  • 作者简介:程添亮(1989-), 男, 江苏连云港人, 硕士研究生, 主要研究方向为无线传感器网络中的信任机制.E-mail:875612962@qq.com
  • 基金资助:
    国家自然科学基金资助项目(6509000059)

Link-based trusted cluster model for wireless sensor network

CHENG Tianliang, ZHAI Yuqing   

  1. College of Computer Science and Engineering, Southeast University, Nanjing 211189, Jiangsu, China
  • Received:2013-10-14 Revised:2014-05-16 Published:2013-10-14

摘要: 通过引入社会网络中链接的概念,提出1种无线传感器网络簇中可信模型,以更有效地检测非正常节点。模型把对节点的信任分成持久信任和即时信任,在即时信任和持久信任的基础上计算每个节点的信誉,利用信誉检测非正常节点。通过实验分析了阀值的取值并将本研究模型与其他模型进行比较。实验结果表明,在检测非正常节点方面,基于链接的簇中可信模型比GTMS(group-based trust management scheme)和RFSN(reputation-based framework for sensor network)更为优秀。

关键词: 链接, 非正常节点检测, 无线传感器网络, 信任, 信誉,

Abstract: The trusted cluster model for wireless sensor network was proposed to detect the abnormal nodes effectively by using link of social network. Trust was divided into permanent trust and temporary trust. Each nodes reputation was calculated to detect the abnormal nodes combining permanent trust with temporary trust. In the experiments, the threshold value was discussed and the proposed model was compared with other models. The results showed the link-based trusted cluster model for wireless sensor network was better than GTMS(group-based trust management scheme)and RFSN(reputation-based framework for sensor network)in detecting the abnormal nodes.

Key words: cluster, link, wireless sensor network, trust, detection of abnormal node, reputation

中图分类号: 

  • TP391
[1] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al.Wireless sensor networks: a survey[J].Computer Networks, 2002, 38(4):393-422.
[2] HAENGGI M, REUTHER A I, GOODMAN J I, et al.Handbook of sensor networks:compact wireless and wired sensing systems[M].Boca Raton:CRC Press, 2004:27-59.
[3] POTTIE G J, KAISER W J.Wireless integrated network sensors[J].Communications of the ACM, 2000, 43(5):51-58.
[4] SU W T, CHANG K M, KUO Y H.eHIP:an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J].Computer Networks, 2007, 51(4):1151-1168.
[5] YAO Z, KIM D, DOH Y.PLUS:parameterized and localized trust management scheme for sensor networks security[C]//Mobile Ad Hoc and Sensor Systems (MASS).Hong Kong:Springer, 2006:437-446.
[6] FENG R, XU X, ZHOU X, et al.A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory[J].Sensors, 2011, 11(2):1345-1360.
[7] YICK J, MUKHERJEE B, GHOSAL D.Wireless sensor network survey[J].Computer Networks, 2008, 52(12):2292-2330.
[8] KIM T K, SEO H S.A trust model using fuzzy logic in wireless sensor networks[J].World Academy of Science, Engineering and Technology, 2008, 42(4):63-66.
[9] GANERIWAL S, SRIVASTAVA M B.Reputation-based framework for high integrity sensor networks[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM, 2004:66-77.
[10] SHAIKH R A, JAMEEL H, D'AURIOL B J, et al.Group-based trust management scheme for clustered wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems, 2009, 20(11):1698-1712.
[11] ZAHARIADIS T, LELIGOU H C, TRAKADAS P, et al.Trust management in wireless sensor networks[J].European Transactions on Telecommunications, 2010, 21(4):386-395.
[12] LIU D, NING P, DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington, D C, USA:IEEE, 2005:609-619.
[13] CHO Y, QU G, WU Y.Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks[C]//IEEE Symposium on Security and Privacy Workshops (SPW) San Francisco.CA, USA:IEEE, 2012:134-141.
[14] PIRESJR W R, DE PAULA FIGUEIREDO T H, WONG H C, et al.Malicious node detection in wireless sensor networks[C]//Proceedings of the 18th Conference on International Parallel and Distributed Processing Symposium.[S.l]:IEEE, 2004:24-35.
[15] VARLAMIS I, EIRINAKI M, LOUTA M.Application of social network metrics to a trust-aware collaborative model for generating personalized user recommendations [M].Vienna:Springer, 2013:49-74.
[16] VARLAMIS I, LOUTA M.Towards a personalized blog site recommendation system:a collaborative rating approach[C]//4th International Workshop on Semantic Media Adaptation and Personalization.San Sebastain, Spain:IEEE, 2009:38-43.
[17] KALE A.Modeling trust and influence on blogosphere using link polarity[D].Washington:MaryLand University, 2007.
[18] MASSA P, AVESANI P.Controversial users demand local trust metrics:an experimental study on Epinions.com community[C]//Proceedings of the National Conference on Artificial Intelligence.Menlo Park, CA:AAAI Press, 2005:121-127.
[19] YU B, SINGH M P.A social mechanism of reputation management in electronic communities [M]//Cooperative Information Agents IV-The Future of Information Agents in Cyberspace.Berlin:Springer, 2000:154-165.
[20] 张润萌.基于可信机制的个性化推荐技术及其应用研究[D].南京:东南大学, 2011.ZHANG Runmeng.Personalized recommendation technology and its application based on credible mechanism[D].Nanjing:Southeast University, 2011.
[21] 孔德华.基于信任的云服务推荐系统的研究与实现[D].南京:东南大学,2013.KONG Dehua.Research and implementation of a trusted recommendation system based on cloud services[D].Nanjing:Southeast University, 2013.
[22] 张彭成.基于信任的云服务组合机制的研究[D].南京:东南大学,2013.ZHANG Pengcheng.A combination of cloud services mechanism based on trust[D].Nanjing:Southeast University, 2013.
[23] Leon Gu.Dirichlet distribution, dirichlet process and dirichlet process Mixture[R/OL].[2013-10-10].http://www.cs.cmu.edu/~epxing/Class/10701-08s/recitation/dirichlet.pdf.
[24] WERNER-ALLEN G, JOHNSON J, RUIZ M, et al.Monitoring volcanic eruptions with a wireless sensor network[C]//Proceedings of the Second European Workshop on Wireless Sensor Networks.Turkey:IEEE, 2005:108-120.
[25] ZHANG Y, LEE W.Intrusion detection in wireless ad-hoc networks[C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston:ACM, 2000:275-283.
[1] 褚佳静,潘庆先,潘亚楠,刘庆菊. 基于信誉模型的众包质量控制算法[J]. 山东大学学报 (工学版), 2023, 53(2): 93-101.
[2] 王冰,马文明,武聪,郝昱猛. 融合信任相似度的偏置概率矩阵分解算法[J]. 山东大学学报 (工学版), 2022, 52(4): 110-117.
[3] 田明明,叶继华,王仕民,万叶晶. 一种复杂环境下多传感器数据融合方法[J]. 山东大学学报 (工学版), 2019, 49(3): 32-38.
[4] 胡云,张舒,李慧,佘侃侃,施珺. 基于信任网络重构的推荐算法[J]. 山东大学学报 (工学版), 2019, 49(2): 42-46.
[5] 卢文羊, 徐佳一, 杨育彬. 基于LDA主题模型的社会网络链接预测[J]. 山东大学学报(工学版), 2014, 44(6): 26-31.
[6] 姚华传, 王丽珍, 吴萍萍, 邹目权. AC_SAR:基于强关联规则的可行动分簇算法[J]. 山东大学学报(工学版), 2014, 44(6): 38-46.
[7] 张欣怡,翟玉庆*. 基于证据理论的信任模型中冲突证据[J]. 山东大学学报(工学版), 2013, 43(1): 48-53.
[8] 孙香花. 基于距离向量的改进WSN路由算法[J]. 山东大学学报(工学版), 2012, 42(6): 25-30.
[9] 鲁松1,徐文春2,杨云2. 一种分环多跳的无线传感器网络分簇路由加权算法[J]. 山东大学学报(工学版), 2012, 42(4): 24-28.
[10] 蒋盛益1,罗方伦1,余雯2. 基于视觉原理的密度聚类算法的改进[J]. 山东大学学报(工学版), 2011, 41(4): 85-90.
[11] 雷小锋1,庄伟1,程宇1,丁世飞1,谢昆青2. OPHCLUS:基于序关系保持的层次聚类算法[J]. 山东大学学报(工学版), 2010, 40(5): 48-55.
[12] 夏少波1,许娥2. 无线传感器网络节点定位算法[J]. 山东大学学报(工学版), 2010, 40(3): 143-147.
[13] 冯爱民1,刘学军1,陈斌2. 结构大间隔单类分类器[J]. 山东大学学报(工学版), 2010, 40(3): 6-12.
[14] 陈冬岩. 基于多信道的MAC层协议在无线传感器网络中的应用[J]. 山东大学学报(工学版), 2009, 39(1): 41-49.
[15] 李梁,罗奇鸣,陈恩红. 对象级搜索中基于图的对象排序模型(英文)[J]. 山东大学学报(工学版), 2009, 39(1): 15-21.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 陈华鑫, 陈拴发, 王秉纲. 基质沥青老化行为与老化机理[J]. 山东大学学报(工学版), 2009, 39(2): 125 -130 .
[2] 许延生,刘兴芳 . 模糊聚类迭代模型在水资源承载能力评价中的应用[J]. 山东大学学报(工学版), 2007, 37(3): 100 -104 .
[3] 张承慧,宁勇,姬鹏 . 一种改进的FCM聚类算法及其在赤潮预测中的应用[J]. 山东大学学报(工学版), 2007, 37(6): 1 -4 .
[4] 姜国新 .

关于衍射原理应用的设计性实验

[J]. 山东大学学报(工学版), 2008, 38(1): 105 -108 .
[5] 王佰伟,曹升乐 . 工业废水治理效果多目标评价方法研究[J]. 山东大学学报(工学版), 2007, 37(3): 89 -92 .
[6] 徐奴文 唐春安 周济芳 唐烈先 梁正召. 锦屏二级水电站施工排水洞岩爆数值模拟[J]. 山东大学学报(工学版), 2009, 39(4): 134 -139 .
[7] 姚福安,庞向坤,焦营营,王忠林,张锡满 . 基于三色法和BP神经网络的回转窑温度检测[J]. 山东大学学报(工学版), 2008, 38(2): 61 -65 .
[8] 黄劲潮. 基于快速区域建议网络的图像多目标分割算法[J]. 山东大学学报(工学版), 2018, 48(4): 20 -26 .
[9] 赵永国,贾磊,蔡文剑 . 一种积分过程PID自整定方法[J]. 山东大学学报(工学版), 2008, 38(1): 48 -51 .
[10] 薛一冰 孟光 张乐. 两种太阳能空气集热器性能比较研究[J]. 山东大学学报(工学版), 2009, 39(6): 147 -149 .