JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2014, Vol. 44 ›› Issue (5): 29-34.doi: 10.6040/j.issn.1672-3961.0.2013.286

Previous Articles     Next Articles

Link-based trusted cluster model for wireless sensor network

CHENG Tianliang, ZHAI Yuqing   

  1. College of Computer Science and Engineering, Southeast University, Nanjing 211189, Jiangsu, China
  • Received:2013-10-14 Revised:2014-05-16 Published:2013-10-14

Abstract: The trusted cluster model for wireless sensor network was proposed to detect the abnormal nodes effectively by using link of social network. Trust was divided into permanent trust and temporary trust. Each nodes reputation was calculated to detect the abnormal nodes combining permanent trust with temporary trust. In the experiments, the threshold value was discussed and the proposed model was compared with other models. The results showed the link-based trusted cluster model for wireless sensor network was better than GTMS(group-based trust management scheme)and RFSN(reputation-based framework for sensor network)in detecting the abnormal nodes.

Key words: cluster, link, wireless sensor network, trust, detection of abnormal node, reputation

CLC Number: 

  • TP391
[1] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al.Wireless sensor networks: a survey[J].Computer Networks, 2002, 38(4):393-422.
[2] HAENGGI M, REUTHER A I, GOODMAN J I, et al.Handbook of sensor networks:compact wireless and wired sensing systems[M].Boca Raton:CRC Press, 2004:27-59.
[3] POTTIE G J, KAISER W J.Wireless integrated network sensors[J].Communications of the ACM, 2000, 43(5):51-58.
[4] SU W T, CHANG K M, KUO Y H.eHIP:an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J].Computer Networks, 2007, 51(4):1151-1168.
[5] YAO Z, KIM D, DOH Y.PLUS:parameterized and localized trust management scheme for sensor networks security[C]//Mobile Ad Hoc and Sensor Systems (MASS).Hong Kong:Springer, 2006:437-446.
[6] FENG R, XU X, ZHOU X, et al.A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory[J].Sensors, 2011, 11(2):1345-1360.
[7] YICK J, MUKHERJEE B, GHOSAL D.Wireless sensor network survey[J].Computer Networks, 2008, 52(12):2292-2330.
[8] KIM T K, SEO H S.A trust model using fuzzy logic in wireless sensor networks[J].World Academy of Science, Engineering and Technology, 2008, 42(4):63-66.
[9] GANERIWAL S, SRIVASTAVA M B.Reputation-based framework for high integrity sensor networks[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM, 2004:66-77.
[10] SHAIKH R A, JAMEEL H, D'AURIOL B J, et al.Group-based trust management scheme for clustered wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems, 2009, 20(11):1698-1712.
[11] ZAHARIADIS T, LELIGOU H C, TRAKADAS P, et al.Trust management in wireless sensor networks[J].European Transactions on Telecommunications, 2010, 21(4):386-395.
[12] LIU D, NING P, DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington, D C, USA:IEEE, 2005:609-619.
[13] CHO Y, QU G, WU Y.Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks[C]//IEEE Symposium on Security and Privacy Workshops (SPW) San Francisco.CA, USA:IEEE, 2012:134-141.
[14] PIRESJR W R, DE PAULA FIGUEIREDO T H, WONG H C, et al.Malicious node detection in wireless sensor networks[C]//Proceedings of the 18th Conference on International Parallel and Distributed Processing Symposium.[S.l]:IEEE, 2004:24-35.
[15] VARLAMIS I, EIRINAKI M, LOUTA M.Application of social network metrics to a trust-aware collaborative model for generating personalized user recommendations [M].Vienna:Springer, 2013:49-74.
[16] VARLAMIS I, LOUTA M.Towards a personalized blog site recommendation system:a collaborative rating approach[C]//4th International Workshop on Semantic Media Adaptation and Personalization.San Sebastain, Spain:IEEE, 2009:38-43.
[17] KALE A.Modeling trust and influence on blogosphere using link polarity[D].Washington:MaryLand University, 2007.
[18] MASSA P, AVESANI P.Controversial users demand local trust metrics:an experimental study on Epinions.com community[C]//Proceedings of the National Conference on Artificial Intelligence.Menlo Park, CA:AAAI Press, 2005:121-127.
[19] YU B, SINGH M P.A social mechanism of reputation management in electronic communities [M]//Cooperative Information Agents IV-The Future of Information Agents in Cyberspace.Berlin:Springer, 2000:154-165.
[20] 张润萌.基于可信机制的个性化推荐技术及其应用研究[D].南京:东南大学, 2011.ZHANG Runmeng.Personalized recommendation technology and its application based on credible mechanism[D].Nanjing:Southeast University, 2011.
[21] 孔德华.基于信任的云服务推荐系统的研究与实现[D].南京:东南大学,2013.KONG Dehua.Research and implementation of a trusted recommendation system based on cloud services[D].Nanjing:Southeast University, 2013.
[22] 张彭成.基于信任的云服务组合机制的研究[D].南京:东南大学,2013.ZHANG Pengcheng.A combination of cloud services mechanism based on trust[D].Nanjing:Southeast University, 2013.
[23] Leon Gu.Dirichlet distribution, dirichlet process and dirichlet process Mixture[R/OL].[2013-10-10].http://www.cs.cmu.edu/~epxing/Class/10701-08s/recitation/dirichlet.pdf.
[24] WERNER-ALLEN G, JOHNSON J, RUIZ M, et al.Monitoring volcanic eruptions with a wireless sensor network[C]//Proceedings of the Second European Workshop on Wireless Sensor Networks.Turkey:IEEE, 2005:108-120.
[25] ZHANG Y, LEE W.Intrusion detection in wireless ad-hoc networks[C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston:ACM, 2000:275-283.
[1] LI Xiaohui, LIU Xiaofei, SUN Weitong, ZHAO Yi, DONG Yuan, JIN Yinli. An inspection task assignment and path planning algorithm based on vehicles-UAVs collaboration [J]. Journal of Shandong University(Engineering Science), 2025, 55(5): 101-109.
[2] CHEN Sugen, ZHAO Zhizhong. Density peak clustering combining local truncation distance and small clusters merging [J]. Journal of Shandong University(Engineering Science), 2025, 55(2): 58-70.
[3] ZHU Hengdong, MA Yingcang, DAI Xuezhen. Adaptive semi-supervised neighborhood clustering algorithm [J]. Journal of Shandong University(Engineering Science), 2021, 51(4): 24-34.
[4] ZHU Changming, YUE Wen, WANG Panhong, SHEN Zhenyu, ZHOU Rigui. Global and local multi-view multi-label learning with active three-way clustering [J]. Journal of Shandong University(Engineering Science), 2021, 51(2): 34-46.
[5] XIE Ziqi, WANG Lihong, LI Man. Active learning of pairwise constraints in block diagonal subspace clustering [J]. Journal of Shandong University(Engineering Science), 2021, 51(2): 65-73.
[6] Bei LI,Song ZHAO,Zhijia XIE,Meng NIU. Electric vehicle virtual energy storage available capacity modeling [J]. Journal of Shandong University(Engineering Science), 2020, 50(6): 101-111.
[7] Yun HU,Shu ZHANG,Hui LI,Kankan SHE,Jun SHI. Recommendation algorithm based on trust network reconfiguration [J]. Journal of Shandong University(Engineering Science), 2019, 49(2): 42-46.
[8] Xinyu DONG,Hanyue CHEN,Jiaguo LI,Qingyan MENG,Shihe XING,Liming ZHANG. An unsupervised color image segmentation method based on fusion of multiple methods [J]. Journal of Shandong University(Engineering Science), 2019, 49(2): 96-101.
[9] Jun QIN,Yuanpeng ZHANG,Yizhang JIANG,Wenlong HANG. Transfer fuzzy clustering based on self-constraint of multiple medoids [J]. Journal of Shandong University(Engineering Science), 2019, 49(2): 107-115.
[10] Yingxue ZHU,Ruizhang HUANG,Can MA. A short text dynamic clustering approach bias on new topic [J]. Journal of Shandong University(Engineering Science), 2018, 48(6): 8-18.
[11] Qiyue SONG, Xuewen MU, Huan CHENG. Segmentation of connected characters based on improved drop-fall algorithm [J]. Journal of Shandong University(Engineering Science), 2018, 48(6): 89-94.
[12] WANG Huan, ZHOU Zhongmei. An over sampling algorithm based on clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 134-139.
[13] LI Shijin, WANG Shengte, HUANG Leping. Change detection with remote sensing images based on forward-backward heterogenicity [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 1-9.
[14] ZHANG Peirui, YANG Yan, XING Huanlai, YU Xiuying. Incremental multi-view clustering algorithm based on kernel K-means [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 48-53.
[15] DU Xixi, LIU Huafeng, JING Liping. An additive co-clustering for recommendation of integrating social network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 96-102.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] CHEN Huaxin, CHEN Shuanfa, WANG Binggang. The aging behavior and mechanism of base asphalts[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 125 -130 .
[2] XU Yan-sheng,LIU Xing-fang . Application of the fuzzy clustering iterative model to the evalution of water resource carrying capacity[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(3): 100 -104 .
[3] ZHANG Cheng-hui,NING Yong,JI Peng . Improved FCM clustering algorithm and its application inred tide prediction[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(6): 1 -4 .
[4] JIANG Guo-xin . A new design experiment for diffraction theory application [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(1): 105 -108 .
[5] WANG Bai-wei,CAO Sheng-le . A mult-objective assessment method of the effects of industrial waste-water management[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(3): 89 -92 .
[6] XU Nu-Wen, TANG Chun-An, ZHOU Ji-Fang, TANG Lie-Xian, LIANG Zheng-Shao. Numerical simulation of rockburst on the drain tunnel in  the Jinping Second Level Hydropower Station[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(4): 134 -139 .
[7] YAO Fu-an,PANG Xiang-kun,JIAO Ying-ying,WANG Zhong-lin,ZHANG Xi-man . Temperature detection of a rotary kiln based on three-color measurement and the BP neural network[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(2): 61 -65 .
[8] HUANG Jinchao. A new method for muti-objects image segmentation based on faster region proposal networks[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(4): 20 -26 .
[9] ZHAO Yong-guo,JIA Lei,CAI Wen-jian . A PID tuning method for integrating processes[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(1): 48 -51 .
[10] XUE Yi-Bing, MENG Guang, ZHANG Le. A comparison study of two types of solar air collector performance[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(6): 147 -149 .