Computer Science ›› 2013, Vol. 40 ›› Issue (10): 61-64.

Previous Articles     Next Articles

Trust Computation Model of Nodes Based on Bayes Estimation in Wireless Sensor Networks

LIU Tao,XIONG Yan,HUANG Wen-chao,LU Qi-wei and GUAN Ya-wen   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Traditional network security policy can not prevent attack or identify abnormal behavior of the internal nodes in the sensor network.This paper presented a trust computation model of nodes based on Bayes estimation in wireless sensor networks(Abbreviates as TCM-BE)according to the node resource-constrained characteristics.The direct trust which calculates the expectations of the reputation function on nodes behavior based on beta distribution is priori information and the recommendation information from neighbor nodes as sample information in Bayes estimation method.The simulation shows that the scheme has good stability,can effectively identify abnormal node,thereby can prevent attack from the internal nodes of the network.The analysis shows that compared with RFSN scheme it not only can save storage space and computing time with traffic,but also can avoid the phenomenon of malicious evaluation on the node trust.

Key words: Wireless sensor networks,Trust computation model,Bayes estimation,Priori information,Reputation,Beta distribution

[1] 李建中,高宏.无线传感器网络的研究进展[J].计算机研究与发展,2008,5(1):1-15
[2] Lopez J,Roman R,Agudo I,et al.Trust management systems for wireless sensor networks:Best practices[J].Computer Communications,2010,33:1086-1093
[3] Jsang A,Ismail R.The Beta Reputation System[C]∥15th Bled Electronic Commerce Conference.Bled,Slovenia,June 2002:41-55
[4] Ganeriwal S,Srivastava M B.Reputation-based framework for high integrity sensor networks[C]∥Proceedings of the 2nd ACM Workshop on Se curity of Ad-hoc and Sensor Networks(SASN’04).Washington DC,USA,2004:66-77
[5] 肖德琴,冯健昭,杨波,等.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87,0
[6] 谢福鼎,周晨光,张永,等.应用主观逻辑的无线传感器网络信任更新算法[J].计算机科学,2011,38(9):50-54
[7] Theodorakpoulos G,Baras J S.On Trust models and trust evaluation metrics for ad-hoc networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
[8] 王良民,郭渊博,詹永照.容忍入侵的无线传感器网络模糊信任评估模型[J].通信学报,2010,2(12):37-45
[9] Ahmed M R,Huang Xu,Sharma D.A Novel Misbehavior Eva-luation with Dempster-Shafer Theory in Wireless Sensor Networks[C]∥MobiHoc’12.Hilton Head,South Carolina,USA,June 2012:259-260
[10] Yussoff Y M,Hashim H,Baba M D.Identity-based Trusted Au-thentication in Wireless Sensor Network[J].International Journal of Computer Science Issues,2012,9(3):1694-0814
[11] Grawrock D.TCG specification architecture overview [EB/OL].Technology Report.Trusted Computing Group Revision 1.4(2007),http:// www.trustedcomputinggroup.org/resources/tcg_architecture_overview_version_14,2012
[12] 张兴,黄强,沈昌祥.一种基于无干扰模型的信任链传递分析方法[J].软件学报,2010,3(1):74-81
[13] 数理统计编写组.数理统计[M].西安:西北工业大学出版社,1997:42-49
[14] 陈希孺,倪国熙.数理统计学教程[M].合肥:中国科学技术出版社,2009:189-211
[15] 杨光,印桂生,杨武,等.无线传感器网络基于节点行为的信誉评测模型[J].通信学报,2009,0(12):18-26
[16] 王卫生,张永.WSN中一种高效鲁棒的对等认证方案[J].计算机工程与应用,2012,8(5):65-70
[17] 蹇波,郭永辉,罗长远,等.基于ECC的无线传感器网络密钥管理协议[J].计算机工程,2010,6(3):142-144

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!