计算机科学 ›› 2017, Vol. 44 ›› Issue (5): 37-41.doi: 10.11896/j.issn.1002-137X.2017.05.007

• 网络与通信 • 上一篇    下一篇

基于信任和权重的无线传感器网络数据融合模型

张峰,郑洪源,丁秋林   

  1. 南京航空航天大学计算机科学与技术学院 南京210016,南京航空航天大学计算机科学与技术学院 南京210016,南京航空航天大学计算机科学与技术学院 南京210016
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受江苏省产学研联合创新资金项目(SBY201320423)资助

Trust and Weight Based Data Fusion Model in Wireless Sensor Networks

ZHANG Feng, ZHENG Hong-yuan and DING Qiu-lin   

  • Online:2018-11-13 Published:2018-11-13

摘要: 在无线传感器网络中,数据融合的可靠性是一个非常重要的问题并且受到了广泛的关注。为此,提出一种基于信任和权重的无线传感器网络数据融合模型(TWDFM)。在该模型中,传感器节点通过构建信任表选举可靠簇头,簇头根据权重检测异常节点并融合可信数据。仿真实验表明,该模型可以有效提高数据融合的安全性和准确性。

关键词: 无线传感器网络,信任,权重,数据融合

Abstract: In wireless sensor networks,the reliability of data fusion is a very important issue.It has been widely concerned.Thus,a trust and weight based data fusion model (TWDFM) was proposed in this paper.In this model,sensor nodes elect reliable cluster head by building trust tables,and cluster head detects abnormal nodes according to the weights and fuses the credible data.The results of simulation show that this model can effectively improve the safety and accuracy of data fusion.

Key words: Wireless sensor network,Trust,Weight,Data fusion

[1] ISHMANOV F,MALIK A S,KIM S W.Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs):a comprehensive overview[J].European Tran-sactions on Telecommunications,2011,22(4):151-167.
[2] LI L,LI W J.The analysis of data fusion energy consumption in WSN[C]∥System Science,Engineering Design and Manufacturing Informatization (ICSEM).Guiyang:IEEE,2011:310-313.
[3] KUMAR M,DUTTA K.A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks[M].Springer India,2015:1-15.
[4] KUMAR V,JAIN A,BARWALP N.Wireless sensor networkssecurity issues,challenges and solutions[J].International Journal of Information & Computation Technology,2014,4(8):859-868.
[5] BALLAV B,RANA G.A Review of Routing Attacks in MANET and WSN[C]∥International Journal of Engineering Development and Research(IJEDR).2015:1401-1406.
[6] HAYOUNI H,HAMDI M,KIM T H.A Survey on Encryption Schemes in Wireless Sensor Networks[C]∥Advanced Software Engineering and Its Applications (ASEA).Haikou:IEEE,2014:39-43.
[7] IZADI D,ABAWAJY J H,GHANAVATI S,et al.A Data Fusion Method in Wireless Sensor Networks[J].Sensors,2015,15(2):2964-2979.
[8] HEINZELMAN W R,CHANDRAKASAN A,BALAKRISH-NAN H.Energy-efficient communication protocol for wireless sensor networks[C]∥Hawaii International Conference on System Sciences.Hawaii:IEEE,2000:10.
[9] ZHOU J M,LIU F,LU Q Y.Data Fusion Based on Node Trust Evaluation in Wireless Sensor Networks[J].Journal of Sensors,2014,68(9):907-913.
[10] CROSBY G V,PISSINOU N,GADZE J.A framework for trust-based cluster head election in wireless sensor networks[C]∥Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.Columbia,MD:IEEE,2006:13-22.
[11] ATAKLI I M,HU H,CHEN Y,et al.Malicious node detection in wireless sensor networks using weighted trust evaluation[C]∥Proceedings of the 2008 Spring Simulation Multiconference.Ottawa,Canada:2008:836-843.
[12] FU J S,LIU Y.Double cluster heads model for secure and accu-rate data fusion in wireless sensor networks[J].Sensors,2015,15(1):2021-2040.
[13] VAZIFEHDAN J,PRASAD R V,NIEMEGEERS I.Energy-efficient reliable routing considering residual energy in wireless ad hoc networks[J].IEEE Transactions on Mobile Computing,2014,13(2):434-447.
[14] ANJALI,SHIKHA,SHARMA M.Wireless sensor networks:Routing protocols and security issues[C]∥2014 5th International Conference on Computing,Communication and Networking Technologies (ICCCNT).Hefei:IEEE Computer Society,2014:1-5.
[15] LU X,WANG X,WANG H.Optimal information fusion Kal-man filtering for WSNs with multiplicative noise[C]∥2012 International Conference on System Science and Engineering (ICSSE).Liaoning:IEEE,2012:152-157.
[16] RIBEIRO A,SCHIZAS I D,ROUMELIOTIS S,et al.Kalmanfiltering in wireless sensor networks[J].Control Systems,IEEE,2010,30(2):66-86.
[17] KHAN T A,BEG M T,KHAN M A.Performance Analysis of WLAN using OPNET[J].International Journal of Innovative Technology and Exploring Engineering,2013,2(5):2278-2375.
[18] MAO Y M,ZHANG D W,KAN F L.Simulation Research on MAC Layer Protocol Base on OPNET Modeler[J].Advanced Materials Research,2014,945:2349-2352.
[19] POTTIE G J,KAISER W J.Wireless integrated network sen-sors[J].Communications of the ACM,2000,43(5):51-58.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!