[1]姚放吾 张文超.基于信任贴近度的无线传感器网络信誉模型[J].计算机技术与发展,2012,(07):24-28.
 YAO Fang-wu,ZHANG Wen-chao.Reputation Model Based on Similarity Measure of Trust Value in Wireless Sensor Networks[J].,2012,(07):24-28.
点击复制

基于信任贴近度的无线传感器网络信誉模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年07期
页码:
24-28
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Reputation Model Based on Similarity Measure of Trust Value in Wireless Sensor Networks
文章编号:
1673-629X(2012)07-0024-05
作者:
姚放吾12 张文超1
[1]南京邮电大学计算机学院[2]南京邮电大学计算机技术研究所
Author(s):
YAO Fang-wu ZHANG Wen-chao
[1]Computer School, Nanjing University of Posts and Telecommunications[2]Institute of Computer Technology, Nanjing University of Posts and Telecommunications
关键词:
无线传感器网络安全信誉模型RMSMTV模糊贴近度理论簇型结构
Keywords:
wireless sensor networks security reputation model RMSMTV fuzzy similarity measure theory cluster-type network topoi-ogy
分类号:
TP31
文献标志码:
A
摘要:
信誉评估模型作为传统密钥安全机制的有效补充,对无线传感器网络的可靠运行和安全保障具有重要意义。文中提出了一种基于信任贴近度的无线传感器网络信誉模型RMSMTV。本模型建立在簇型网络拓扑结构上,利用模糊贴近度理论衡量邻居节点推荐的信任值的可信度,并运用矩阵论方法实现了信任值整合过程中自适应分配权重,最终得到了节点综合信任值。考虑到无线传感器网络节点能量有限的特性,还对簇头节点轮换策略进行了讨论。最后通过实验验证了RMSMTV具有良好的容错性和鲁棒性,能实时、准确地发现恶意节点的攻击,有效提高了无线传感器网络的安全性
Abstract:
Reputation evaluation model, the supplement to the traditional key security mechanism, has significant meaning to guarantee re- liable operation and security to the wireless sensor network. It proposes a reputation model based on similarity measure of trust value in wireless sensor networks. This model,constructed on the cluster-type network topology, uses the fuzzy similarity measure theory to evalu- ate the reliability of the recommended trust values of neighbor nodes. Then use the matrix theory method to realize the adaptive value dis- tribufion weight in the integration process of trust value. Finally, get the comprehensive trust value of a node by combining two values. Taking the consideration of limitation of the energy in the wireless sensor network node, it also has the discussion of the node rotation strategy. Finally the experiment proves that RMSMTV has good fault tolerance and robustness,can find the attack of malicious node in re- al-time and accurately, and effectively improve the security of wireless sensor networks

相似文献/References:

[1]李雷 付东阳.基于分层模型的无线传感器网络分簇路由算法[J].计算机技术与发展,2010,(01):132.
 LI Lei,FU Dong-yang.Clustering Protocol Algorithm of Wireless Sensor Networks Based on Level Model[J].,2010,(07):132.
[2]程思 程家兴[].VPN中的隧道技术研究[J].计算机技术与发展,2010,(02):156.
 CHENG Si,CHENG Jia-xing[].A Brief Discussion on Tunnel Technical of VPN[J].,2010,(07):156.
[3]魏烨嘉 王汝传[] 李伟伟 黄海平[] 孙力娟[].基于普适计算环境的三维空间RSSI位置感知研究[J].计算机技术与发展,2010,(04):183.
 WEI Ye-jia,WANG Ru-ehuan[],LI Wei-wei,et al.Research on RSSI- Based Location- Aware in Three- Dimensional Space for Pervasive Computing Environment[J].,2010,(07):183.
[4]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
 DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(07):159.
[5]杜鹏雷 吴晓 杨丽平 江涌.面向精准农业的感知节点传感器驱动与控制[J].计算机技术与发展,2010,(06):233.
 DU Peng-lei,WU Xiao,YANG Li-ping,et al.Drive and Control of Sensor Node Facing Precision Agriculture[J].,2010,(07):233.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(07):170.
[7]程佳 支小莉 大贝 晴俊.基于无线传感器网络和ICA的桥梁诊断系统[J].计算机技术与发展,2009,(06):1.
 CHENG Jia,ZHI Xiao-li,OGAI Harutoshi.A Bridge Diagnosis System Based on Wireless Sensor Network and Independent Component Analysis[J].,2009,(07):1.
[8]张俊妍 陈启买.SOAP协议性能与安全的研究进展[J].计算机技术与发展,2009,(06):163.
 ZHANG Jun-yan,CHEN Qi-mai.Survey on Performance and Safety of SOAP[J].,2009,(07):163.
[9]汪小龙[] 方潜生 葛运建 张伟林[] 周学海[].基于WSN的智能建筑综合控制系统研究[J].计算机技术与发展,2009,(07):48.
 WANG Xiao-long,FANG Qian-sheng,GE Yun-jian,et al.Research on Integrated- Control- System of Intelligent- Building Based on WSN[J].,2009,(07):48.
[10]支萌萌 王汝传.一种新的P2P安全积分机制[J].计算机技术与发展,2009,(08):137.
 ZHI Meng-meng,WANG Ru-chuan.A New Secure Incentive Mechanism in Peer- to- Peer System[J].,2009,(07):137.
[11]杨剑 杨铭熙 李腊元.增强安全性的IEEE802.15.4协议研究[J].计算机技术与发展,2007,(12):136.
 YANG Jian,YANG Ming-xi,LI La-yuan.Research of Security Enhanced IEEE802.15.4 Protocol[J].,2007,(07):136.
[12]郑彦 王汝传 高冉 孙力娟.无线传感器网络中密钥管理机制约束因素研究[J].计算机技术与发展,2006,(10):118.
 ZHENG Yan,WANG Ru-chuan,GAO Ran,et al.Constrains of Key Management in Wireless Sensor Network[J].,2006,(07):118.

备注/Memo

备注/Memo:
江苏高校优势学科建设工程资助项目(yx002001)姚放吾(1953-),男,教授,硕士生导师,CCF会员,研究方向为并行计算机及其体系结构、嵌入式技术和计算机在通信中的应用;张文超(1986-),男,硕士研究生,研究方向为嵌入式技术在通信中的应用
更新日期/Last Update: 1900-01-01