Computer Science ›› 2014, Vol. 41 ›› Issue (7): 162-166.doi: 10.11896/j.issn.1002-137X.2014.07.033

Previous Articles     Next Articles

Multidimensional Node Reputation Management Scheme for Clustered Wireless Sensor Networks

FANG Fang,LI Jing-feng and LI Jie   

  • Online:2018-11-14 Published:2018-11-14

Abstract: At present there are problems in reputation management mechanism for wireless sensor networks (WSNs),such as high cost of calculation,update and maintenance of reputation,poor resistance to “bad mouthing” and “ballot stuffing”.Taking the clustered wireless sensor network as the background,sensor nodes were divided into cluster head nodes and ordinary sensor nodes.According to the behaviors of sensor nodes on event perception,packet forwarding and data aggregation,a multidimensional node reputation management scheme was put forward.Applying the scheme to reactive multi-path routing protocol AOMDV,this paper proposed a reliable routing protocol called STA based on trusted nodes.The simulation results show that in distrusted environment,the proposed protocol improves the data forwarding rate and delivery success rate in WSNs.

Key words: Wireless sensor network,Reputation,Trust,Sensing,Delivery,Aggregation

[1] 杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2010
[2] Carruthers R,Nikolaidis I.Certain limitations of reputation-based schemes in mobile environments[C]∥Proc of the 8th ACM international symposium Symposium on MSWiM.2005:2-11
[3] Sen J,Chowdhury P R,Senfupta I.A Distributed Trust Establishment Scheme for Mobile Ad hoc Networkss[C]∥Proc of International Conference on Computing:Theory and Applications.2007:51-58
[4] Ozdemir S.Functional reputation based data aggregation forwireless sensor networks[C]∥Proc of IEEE International Conference on Wireless and Mobile Computing,Networking and Communications.Avignon,France,2008:592-597
[5] Raha A,Naskar M K,Chakraborty A.A Novel Indirect Trust based Link State Routing Scheme using a Robust Route Trust Method for Wireless Sensor Networks[C]∥Proc of International Conference on Mobility and Security.Istanbul,Turkey,May 2012:1-5
[6] Ganeriwal S,Srivastava M.Reputation based framework forhigh integrity sensor networks[C]∥Proc of the 2nd ACM Workshop on Security of Ad hoc and Sensor networks.Was-hington D C,2004:66-77
[7] Ganeriwal S,Balzano L K,Srivastava M.Reputation basedframe-work for high integrity sensor networks[J].ACM Transactions on Sensor Networks,2008,4(3):1-37
[8] 杨光,印桂生,杨武,等.无线传感器网络基于节点行为的信誉评测模型[J].通信学报,2009,30(12):18-26
[9] Marina M K,Das S R.On demand multipath distance vector routing for ad hoc networks[C]∥Proceedings of IEEE International Conference on Network Protocols.Vancouver,Canada:IEEE Computer Society Press,2001:14-23
[10] Frideman E,Resnick P.The social cost of cheap pseudonyms[J].Journal of Economics and Management Strategy,2001,10(2):177-199
[11] Hani A.Secure data aggregation in wireless sensor networks[D].Queensland University,2011

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!