Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 388-392.

Previous Articles     Next Articles

Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network

YANG Yong-fei, LIU Guang-jie and DAI Yue-wei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: As the supplementary measure of the traditional encryption-based security system for wireless sensor network,trust evaluation of nodes can be employed to recognize the malicious nodes and conduct the attacks from inside of the network.With the temporal correlation and spatial correlation of the data gathered by nodes in clustered WSN for data acquisition,standard cloud benchmark was implemented with the construction of standard cloud model,the self trust and adjacent trust were computed respectively,and a two-tiered trust evaluation mechanism for nodes was proposed based on trust-feedback cloud model.Simulation results show that the proposed scheme can detect both single-node attack and inner-cluster multi-node collusive attack effectively.

Key words: Wireless sensor networks,Trust evaluation,Trust-feedback cloud model,Self trust,Adjacent trust

[1] 荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理 [J].软件学报,2008,19(7):1716-1730
[2] 邵斐.基于模糊综合评判的主观信任模型研究[J].通信技术,2009,42(12):98-100
[3] 王建新,张亚男,王伟平,等.移动自组网中基于声誉机制的安全路由协议设计与分析[J].电子学报,2005,33(4):596-601
[4] Ganeriwal S,Balzano L K,Srivastava M B.Reputation-basedframework for high integrity sensor networks[J].ACM Transactions on Sensor Networks(TOSN),2008,4(3):15
[5] 马守明,王汝传,叶宁.基于信誉度集对分析的 WSN 安全数据融合[J].计算机研究与发展,2011(9):1652-1658
[6] 肖德琴,冯健昭,周权,等.基于高斯分布的传感器网络信誉模型[J].通信学报,2008,29(3):47-53
[7] 刘涛,熊焰,黄文超,等.一种基于 Bayes 估计的 WSN 节点信任度计算模型[J].计算机科学,2013,40(10):61-64
[8] 刘涛,关亚文,熊焰,等.无人值守 WSN 中一种具有激励机制的信任管理模型[J].武汉大学学报:理学版,2013(6):578-582
[9] Hongjun D,Zhiping J,Xiaona D.An entropy-based trust modeling and evaluation for wireless sensor networks[C]∥International Conference on Embedded Software and Systems(ICESS’08).IEEE,2008:27-34
[10] 马彬,谢显中.无线传感器网络云信任模型[J].计算机科学,2010,37(3):128-132
[11] 蔡绍滨,韩启龙,高振国,等.基于云模型的无线传感器网络恶意节点识别技术的研究[J].电子学报,2012,40(11):2232-2238
[12] 徐晓斌,张光卫,王尚广,等.基于轻量云模型的 WSN 不确定性信任表示方法[J].通信学报,2014,35(2):63-69
[13] 徐晓斌,张光卫,王尚广,等.基于群体信任的WSN异常数据过滤方法[J].通信学报,2014,35(5):108-117.
[14] 李德毅,孟海军.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20
[15] 李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34
[16] 冯清青,李霁野.无线传感器网络节点分簇与非分簇性能比较[J].计算机应用研究,2009(11):4244-4247
[17] 李捷,韩志杰.一种基于预测的 WSN 非均衡分簇路由算法[J].计算机研究与发展,2010(8):1459-1465
[18] http://db.lcs.mit.edu/labdata/labdata.html
[19] Sun Y L,Han Z,Liu K J R.Defense of trust management vulnerabilities in distributed networks[J].Communications Magazine,IEEE,2008,46(2):112-119

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .