您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (09): 123-128.doi: 10.6040/j.issn.1671-9352.2.2014.333

• 论文 • 上一篇    下一篇

无线传感器网络基于联系数的信任评估模型

李国庆   

  1. 许昌学院信息工程学院, 河南 许昌 461000
  • 收稿日期:2014-06-24 修回日期:2014-08-27 出版日期:2014-09-20 发布日期:2014-09-30
  • 作者简介:李国庆(1980-),男,讲师,硕士,研究方向为无线传感器网络、分布式系统及其应用.E-mail:lgq_xc@163.com
  • 基金资助:
    河南省科技攻关资助项目(132102210491)

A trust evaluation model based on connection number for wireless sensor networks

LI Guo-qing   

  1. School of Information Engineering, Xuchang University, Xuchang 461000, Henan, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

摘要: 针对无线传感器网络(wireless sensor network,WSN)的特点以及面临的网络安全问题,提出了一个基于联系数的信任评估模型。系统节点通过该信任模型对邻居节点的网络行为进行监测,再利用基于联系数的信任多属性决策方法选取最优的可信节点后进行数据包的转发。实验结果表明,该模型计算开销少,符合WSN能量受限的特点,且能较好地实现入侵检测,提高检测的准确率,防范路由攻击。

关键词: 安全评价, 无线传感器网络, 联系数, 信任模型

Abstract: According to the characteristics of WSN and network security problems, a trust evaluation model based on connection number was proposed. By monitoring the behavior of neighboring nodes, the optimal trustful node can be selected for data forwarding in accordance with the multi-attributes decision making. Experimental results show that the model has low computational overhead and meet with the characteristics of the energy-constrained for wireless sensor network. Also, it can achieve better performance for improving detection accuracy and reduce false positives to prevent routing attacks.

Key words: connection number, security evaluation, wireless sensor networks, trust model

中图分类号: 

  • TP393
[1] TAO Shu, KRUNZ M, LIU Si. Secure data collection in wireless sensor networks using randomized dispersive routes[J]. IEEE Transactions on Mobile Computing, 2010, 9(7): 941-954.
[2] PROBST M J, KASERA S K. Statistical trust establishment in wireless sensor networks[C]//Proceedings of 2007 International Conference on Parallel and Distributed Systems. Washington: IEEE Computer Society, 2007: 1-8.
[3] GANERIWAL S, BALZANO L K, SRIVASTAVA M B. Reputation-based framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks, 2008, 4(3): 1-37.
[4] 成坚,冯仁剑,许小丰,等.基于D-S证据理论的无线传感器网络信任评估模型[J].传感技术学报,2009, 22(12):1802-1807. CHENG Jian, FENG Renjian, XU Xiaofeng, et al. Trust evaluation model based on D-S evidence theory in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators, 2009, 22(12): 1802-1807.
[5] 高建斌,娄渊胜.基于模糊逻辑分类的WSN Sinkhole侦测[J].计算机工程,2011, 39(9):178-180. GAO Jianbin, LOU Yuansheng. Sinkhole detection based on fuzzy logic classification for WSN [J]. Computer Engineering, 2011, 39(9): 178-180.
[6] 冯欣,杨华民,宋小龙.WSN中改进的节点复制攻击检测方法[J].计算机工程,2011, 37(23):121-123, 134. FENG Xin, YANG Huamin, SONG Xiaolong. Improved detection method of node replication attack in wireless sensor network[J]. Computer Engineering, 2011, 37(23): 121-123, 134.
[7] KHALIL I, BAGCHI S, ROTARU C N, et al. UNMASK:utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks[J]. Ad Hoc Networks, 2010, 8(1): 148-164.
[8] MADRIA S, YIN Jian. SeRWA: a secure routing protocol against wormhole attacks in sensor networks[J]. Ad Hoc Networks, 2009, 7(6): 1051-1063.
[9] 王万军.不确定集对分析探索[J].河北理工大学学报:自然科学版,2008, 30(3):67-69. WANG Wanjun. On uncertain set pair analysis [J]. Journal of Hebei Institute of Technology: Natural Science Edition, 2008, 30(3): 67-69.
[10] ROMAN R, ZHOU Jianying, LOPEZ J. Applying intrusion detection systems to wireless sensor networks[C]//Proceedings of the 3rd IEEE Consumer Communications and Networking Conference(CCNC 2006). Washington: IEEE Computer Society, 2006: 640-644.
[11] BANERJEE S, GROSAN C, ABRAHAM A. IDEAS: intrusion detection based on emotional ants for sensors[C]//Proceedings of 2005 International Conference on Intelligent Systems Design and Applications (ISDA '05). Wroclaw,Poland:[s.n.], 2005: 344-349.
[1] 及歆荣,侯翠琴,侯义斌,赵斌. 基于筛选机制的L1核学习机分布式训练方法[J]. 山东大学学报(理学版), 2016, 51(9): 137-144.
[2] 周先存, 黎明曦, 李瑞霞, 徐明鹃, 凌海波. 多点协作复制攻击检测研究[J]. 山东大学学报(理学版), 2015, 50(07): 54-65.
[3] 万智萍. 一种混合Das协议的无线传感器网络身份验证协议[J]. 山东大学学报(理学版), 2015, 50(05): 12-17.
[4] 张晶, 薛冷, 崔毅, 容会, 王剑平. 基于无线传感器网络的双混沌数据加密算法建模与评价[J]. 山东大学学报(理学版), 2015, 50(03): 1-5.
[5] 赵泽茂1,刘洋1,张帆1,2,周建钦1,张品1. 基于角度和概率的WSN源位置隐私保护路由研究[J]. J4, 2013, 48(09): 1-9.
[6] 万润泽1,雷建军1,袁操2. 基于模糊聚类理论的无线传感器节点休眠优化策略[J]. J4, 2013, 48(09): 17-21.
[7] 吕家亮1,2,3,王英龙1,3,崔焕庆1,魏诺2,3,郭强2,3. 基于微粒群优化的三维无线传感网定位算法研究[J]. J4, 2013, 48(05): 78-82.
[8] 崔焕庆1,2,王英龙1*,吕家亮1,2,魏诺1. 基于随机微粒群算法的分布式节点定位方法[J]. J4, 2012, 47(9): 51-55.
[9] 郭晓东1,杜鹏1,张雪芬2. 一种WSN中能量有效的分布式检测和功率分配算法[J]. J4, 2012, 47(9): 60-64.
[10] 刘梦君,刘树波*,刘泓晖,蔡朝晖,涂国庆. 异构无线传感器网络动态混合密钥管理方案研究[J]. J4, 2012, 47(11): 67-73.
[11] 姚武军1,丁谊1,魏立线1,杨晓元1,2. 基于RSSI的无线传感器网络ARQ差错控制策略[J]. J4, 2011, 46(9): 61-66.
[12] 李桂青,高仲合,王楠楠. 基于簇头集的无线传感器网络定向扩散协议[J]. J4, 2010, 45(11): 37-42.
[13] 周书旺1,2,3,王英龙1,3,郭强1,2,魏诺1,2,郭文娟1,3. 一种考虑可能区域和智能搜索相结合的定位算法[J]. J4, 2010, 45(11): 27-31.
[14] 郭文娟1,2,王英龙1,2,魏诺1,3,郭强1,3,周书旺1,2,3. 基于卡尔曼滤波的无线传感器网络时钟同步协议[J]. J4, 2010, 45(11): 32-36.
[15] 周书旺 王英龙 郭强 魏诺. 基于微粒群算法的无线传感器网络节点定位方法[J]. J4, 2009, 44(9): 52-55.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!