计算机科学 ›› 2013, Vol. 40 ›› Issue (10): 61-64.

• 网络与通信 • 上一篇    下一篇

一种基于Bayes估计的WSN节点信任度计算模型

刘涛,熊焰,黄文超,陆琦玮,关亚文   

  1. 安徽工程大学计算机与信息学院 芜湖241000;中国科学技术大学计算机科学与技术学院 合肥230027;中国科学技术大学计算机科学与技术学院 合肥230027;中国科学技术大学计算机科学与技术学院 合肥230027;安徽工程大学计算机与信息学院 芜湖241000
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金青年科学基金(61300170,61202404), 国家自然科学基金(61170233,61232018),安徽省教育厅自然科学基金(KJ2013A040,KJ2012B012),安徽省自然科学基金(1308085MF88)资助

Trust Computation Model of Nodes Based on Bayes Estimation in Wireless Sensor Networks

LIU Tao,XIONG Yan,HUANG Wen-chao,LU Qi-wei and GUAN Ya-wen   

  • Online:2018-11-16 Published:2018-11-16

摘要: 鉴于传统网络安全策略无法阻止或识别传感器网络内部节点的攻击或异常行为,结合节点资源受限的特点,提出了一种无线传感器网络节点信任度计算模型。该模型采用Bayes估计方法,通过求解基于Beta分布的节点行为信誉函数的期望值得到直接信任并将其作为Bayes估计的先验信息,将来自邻居节点的推荐信息作为其样本信息。仿真实验表明,本方案有较好的稳定性,能够有效识别异常节点,从而阻止内部节点对网络的攻击,与RFSN相比,不仅节约了存储空间、运算时间与通信量,而且能够避免恶评现象对节点信任度计算的影响。

关键词: 无线传感器网络,信任度计算模型,Bayes估计,先验信息,信誉,Beta分布

Abstract: Traditional network security policy can not prevent attack or identify abnormal behavior of the internal nodes in the sensor network.This paper presented a trust computation model of nodes based on Bayes estimation in wireless sensor networks(Abbreviates as TCM-BE)according to the node resource-constrained characteristics.The direct trust which calculates the expectations of the reputation function on nodes behavior based on beta distribution is priori information and the recommendation information from neighbor nodes as sample information in Bayes estimation method.The simulation shows that the scheme has good stability,can effectively identify abnormal node,thereby can prevent attack from the internal nodes of the network.The analysis shows that compared with RFSN scheme it not only can save storage space and computing time with traffic,but also can avoid the phenomenon of malicious evaluation on the node trust.

Key words: Wireless sensor networks,Trust computation model,Bayes estimation,Priori information,Reputation,Beta distribution

[1] 李建中,高宏.无线传感器网络的研究进展[J].计算机研究与发展,2008,5(1):1-15
[2] Lopez J,Roman R,Agudo I,et al.Trust management systems for wireless sensor networks:Best practices[J].Computer Communications,2010,33:1086-1093
[3] Jsang A,Ismail R.The Beta Reputation System[C]∥15th Bled Electronic Commerce Conference.Bled,Slovenia,June 2002:41-55
[4] Ganeriwal S,Srivastava M B.Reputation-based framework for high integrity sensor networks[C]∥Proceedings of the 2nd ACM Workshop on Se curity of Ad-hoc and Sensor Networks(SASN’04).Washington DC,USA,2004:66-77
[5] 肖德琴,冯健昭,杨波,等.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87,0
[6] 谢福鼎,周晨光,张永,等.应用主观逻辑的无线传感器网络信任更新算法[J].计算机科学,2011,38(9):50-54
[7] Theodorakpoulos G,Baras J S.On Trust models and trust evaluation metrics for ad-hoc networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
[8] 王良民,郭渊博,詹永照.容忍入侵的无线传感器网络模糊信任评估模型[J].通信学报,2010,2(12):37-45
[9] Ahmed M R,Huang Xu,Sharma D.A Novel Misbehavior Eva-luation with Dempster-Shafer Theory in Wireless Sensor Networks[C]∥MobiHoc’12.Hilton Head,South Carolina,USA,June 2012:259-260
[10] Yussoff Y M,Hashim H,Baba M D.Identity-based Trusted Au-thentication in Wireless Sensor Network[J].International Journal of Computer Science Issues,2012,9(3):1694-0814
[11] Grawrock D.TCG specification architecture overview [EB/OL].Technology Report.Trusted Computing Group Revision 1.4(2007),http:// www.trustedcomputinggroup.org/resources/tcg_architecture_overview_version_14,2012
[12] 张兴,黄强,沈昌祥.一种基于无干扰模型的信任链传递分析方法[J].软件学报,2010,3(1):74-81
[13] 数理统计编写组.数理统计[M].西安:西北工业大学出版社,1997:42-49
[14] 陈希孺,倪国熙.数理统计学教程[M].合肥:中国科学技术出版社,2009:189-211
[15] 杨光,印桂生,杨武,等.无线传感器网络基于节点行为的信誉评测模型[J].通信学报,2009,0(12):18-26
[16] 王卫生,张永.WSN中一种高效鲁棒的对等认证方案[J].计算机工程与应用,2012,8(5):65-70
[17] 蹇波,郭永辉,罗长远,等.基于ECC的无线传感器网络密钥管理协议[J].计算机工程,2010,6(3):142-144

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!