Computer Science ›› 2017, Vol. 44 ›› Issue (5): 37-41, 60.doi: 10.11896/j.issn.1002-137X.2017.05.007

Previous Articles     Next Articles

Trust and Weight Based Data Fusion Model in Wireless Sensor Networks

ZHANG Feng, ZHENG Hong-yuan and DING Qiu-lin   

  • Online:2018-11-13 Published:2018-11-13

Abstract: In wireless sensor networks,the reliability of data fusion is a very important issue.It has been widely concerned.Thus,a trust and weight based data fusion model (TWDFM) was proposed in this paper.In this model,sensor nodes elect reliable cluster head by building trust tables,and cluster head detects abnormal nodes according to the weights and fuses the credible data.The results of simulation show that this model can effectively improve the safety and accuracy of data fusion.

Key words: Wireless sensor network,Trust,Weight,Data fusion

[1] ISHMANOV F,MALIK A S,KIM S W.Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs):a comprehensive overview[J].European Tran-sactions on Telecommunications,2011,22(4):151-167.
[2] LI L,LI W J.The analysis of data fusion energy consumption in WSN[C]∥System Science,Engineering Design and Manufacturing Informatization (ICSEM).Guiyang:IEEE,2011:310-313.
[3] KUMAR M,DUTTA K.A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks[M].Springer India,2015:1-15.
[4] KUMAR V,JAIN A,BARWALP N.Wireless sensor networkssecurity issues,challenges and solutions[J].International Journal of Information & Computation Technology,2014,4(8):859-868.
[5] BALLAV B,RANA G.A Review of Routing Attacks in MANET and WSN[C]∥International Journal of Engineering Development and Research(IJEDR).2015:1401-1406.
[6] HAYOUNI H,HAMDI M,KIM T H.A Survey on Encryption Schemes in Wireless Sensor Networks[C]∥Advanced Software Engineering and Its Applications (ASEA).Haikou:IEEE,2014:39-43.
[7] IZADI D,ABAWAJY J H,GHANAVATI S,et al.A Data Fusion Method in Wireless Sensor Networks[J].Sensors,2015,15(2):2964-2979.
[8] HEINZELMAN W R,CHANDRAKASAN A,BALAKRISH-NAN H.Energy-efficient communication protocol for wireless sensor networks[C]∥Hawaii International Conference on System Sciences.Hawaii:IEEE,2000:10.
[9] ZHOU J M,LIU F,LU Q Y.Data Fusion Based on Node Trust Evaluation in Wireless Sensor Networks[J].Journal of Sensors,2014,68(9):907-913.
[10] CROSBY G V,PISSINOU N,GADZE J.A framework for trust-based cluster head election in wireless sensor networks[C]∥Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.Columbia,MD:IEEE,2006:13-22.
[11] ATAKLI I M,HU H,CHEN Y,et al.Malicious node detection in wireless sensor networks using weighted trust evaluation[C]∥Proceedings of the 2008 Spring Simulation Multiconference.Ottawa,Canada:2008:836-843.
[12] FU J S,LIU Y.Double cluster heads model for secure and accu-rate data fusion in wireless sensor networks[J].Sensors,2015,15(1):2021-2040.
[13] VAZIFEHDAN J,PRASAD R V,NIEMEGEERS I.Energy-efficient reliable routing considering residual energy in wireless ad hoc networks[J].IEEE Transactions on Mobile Computing,2014,13(2):434-447.
[14] ANJALI,SHIKHA,SHARMA M.Wireless sensor networks:Routing protocols and security issues[C]∥2014 5th International Conference on Computing,Communication and Networking Technologies (ICCCNT).Hefei:IEEE Computer Society,2014:1-5.
[15] LU X,WANG X,WANG H.Optimal information fusion Kal-man filtering for WSNs with multiplicative noise[C]∥2012 International Conference on System Science and Engineering (ICSSE).Liaoning:IEEE,2012:152-157.
[16] RIBEIRO A,SCHIZAS I D,ROUMELIOTIS S,et al.Kalmanfiltering in wireless sensor networks[J].Control Systems,IEEE,2010,30(2):66-86.
[17] KHAN T A,BEG M T,KHAN M A.Performance Analysis of WLAN using OPNET[J].International Journal of Innovative Technology and Exploring Engineering,2013,2(5):2278-2375.
[18] MAO Y M,ZHANG D W,KAN F L.Simulation Research on MAC Layer Protocol Base on OPNET Modeler[J].Advanced Materials Research,2014,945:2349-2352.
[19] POTTIE G J,KAISER W J.Wireless integrated network sen-sors[J].Communications of the ACM,2000,43(5):51-58.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .