JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2022, Vol. 57 ›› Issue (7): 73-84.doi: 10.6040/j.issn.1671-9352.0.2021.453

Previous Articles    

Trust management optimization of wireless sensor network nodes based on blockchain using equilibrium evaluation algorithm

LIU Yun, SONG Kai*, CHEN Lu-yao, ZHU Peng-jun   

  1. Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming 650500, Yunnan, China
  • Published:2022-06-29

Abstract: An equilibrium evaluation algorithm to enhance the trust relationship between beacon nodes by eliminating malicious nodes in wireless sensor networks in the blockchain is proposed. The sensor node information is first packaged to generate a block according to the node number order, behavior, feedback and data-based trust value, the three trust values are weighted to obtain the balanced trust value of each beacon node, broadcast to the base station; in the end, the beacon nodes with small trust values are regarded as malicious nodes and removed from the blockchain. Simulation results show that the equilibrium evaluation algorithm has been well improved in terms of average positioning error, detection accuracy and average energy consumption, while ensuring the safety and traceability of the trust evaluation management process.

Key words: equilibrium evaluation algorithm, wireless sensing network, trust relationship, beacon node, malicious node

CLC Number: 

  • TP393
[1] 邓玉静,王倩悦,尹荣荣,等.考虑级联失效的有向WSNs节点重要度评估模型[J]. 小型微型计算机系统, 2020, 41(1):111-116. DENG Yujing, WANG Qianyue, YIN Rongrong, et al. Evaluation model of node importance considering cascading failures in directed WSNs[J]. Journal of Chinese Computer Systems, 2020, 41(1):111-116.
[2] 滕志军,庞宝贺,孙铭阳,等. 基于环境参数优化和时间信誉序列的恶意节点识别模型[J]. 西北工业大学学报, 2020, 38(3):634-642. TENG Zhijun, PANG Baohe, SUN Mingyang, et al. Model for malicious node recognition based on environmental parameter optimization and time reputation sequence[J]. Journal of Northwestern Polytechnical University, 2020, 38(3):634-642.
[3] 周文雄,林穗. 无线传感网络恶意节点识别算法[J]. 计算机系统应用, 2020, 29(2):175-180. ZHOU Wenxiong, LIN Sui. Malicious node recognition algorithm in wireless sensor networks[J]. Computer Systems & Applications, 2020,29(2):175-180.
[4] 夏伟. 基于传感器的无线网络恶意节点检测研究[J]. 西安文理学院学报(自然科学版), 2020, 23(4):41-46. XIA Wei. Research on sensor-based malicious node detection in wireless networks[J]. Journal of Xi an University(Natural Science Edition), 2020,23(4):41-46.
[5] WEI She, LIU Qi, ZHAO Tian, et al. Blockchain trust model for malicious node detection in wireless sensor networks[J]. IEEE Access, 2019, 7:38947-38956.
[6] TIAN Y L, WANG Z, XIONG J B, et al. A blockchain-based secure key management scheme with trustworthiness in DWSNs[J]. IEEE Transactions on Industrial Informatics, 2020, 16(9):6193-6202.
[7] WU D, ANSARI N. A Trust-evaluation-enhanced blockchain-secured industrial IoT system[J]. IEEE Internet of Things Journal, 2021, 8(7):5510-5517.
[8] WANG G, LU S W, YU F, et al. A method to improve the security of information diffusion in complex networks——node trust-value management mechanism[J]. IEEE Access, 2019, 7:138175-138191.
[9] 周远林,陶洋,李正阳,等. 基于双簇头的无线传感器网络反馈信任模型[J]. 计算机工程, 2021, 47(3):174-182. ZHOU Yuanlin, TAO Yang, LI Zhengyang, et al. Double cluster head-based feedback trust model for wireless sensor network[J]. Computer Engineering, 2021, 47(3):174-182.
[10] YU J Y, LEE E, OH S, et al. A survey on security requirements for WSNs: focusing on the characteristics related to security[J]. IEEE Access, 2020, 8:45304-45324.
[11] ADERIBOLE A, ALJARWAN A, UR REHMAN M H, et al. Blockchain technology for smart grids: decentralized NIST conceptual model[J]. IEEE Access, 2020, 8:43177-43190.
[12] 于戈,聂铁铮,李晓华,等. 区块链系统中的分布式数据管理技术:挑战与展望[J]. 计算机学报, 2021, 44(1):28-53. YU Ge, NIE Tiezheng, LI Xiaohua, et al. The challenge and prospect of distributed data management techniques in blockchain systems[J]. Chinese Journal of Computers, 2021, 44(1):28-53.
[13] KIM T, GOYAT R, RAI M K, et al. A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks[J]. IEEE Access, 2019, 7:184133-184144.
[14] LIANG J B, ZHANG M, LEUNG V C M. A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud[J]. IEEE Internet of Things Journal, 2020, 7(6):5481-5490.
[15] YAN X Z, LUO Q H, YANG Y P, et al. ITL-MEPOSA: improved trilateration localization with minimum uncertainty propagation and optimized selection of anchor nodes for wireless sensor networks[J]. IEEE Access, 2019,(7):53136-53146.
[1] Pei-ming WANG,Xing-shu CHEN,Hai-zhou WANG,Wen-xian WANG. Research on microblog data collection based on multiple hybrid strategy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(5): 28-36, 43.
[2] Zhen-peng LIU,Wen-sheng WANG,Yu-peng HE,Jing-wei SUN,Bin ZHANG. A deployment strategy for fault recovery of SDN control nodes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(5): 21-27.
[3] Hai-yan KANG,Wan-xiang ZHU. Privacy preservation for location-based services [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(11): 35-50.
[4] LI Yan-ping, QI Yan-jiao, ZHANG Kai, WEI Xu-guang. Multi-authority and revocable attribute-based encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 75-84.
[5] LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88.
[6] ZHANG Guang-zhi, CAI Shao-bin, MA Chun-hua, ZHANG Dong-qiu. Application of maximum distance separable codes in the error correction of the network coding [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 75-82.
[7] ZHAO Guang-yuan, QIN Feng-lin, GUO Xiao-dong. Design and implementation of P2P-based network measurement cloud platform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 104-110.
[8] HUANG Shu-qin, XU Yong, WANG Ping-shui. User similarity calculation method based on probabilistic matrix factorization and its recommendation application [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 37-43.
[9] WANG Ya-qi, WANG Jing. Rumor spreading on dynamic complex networks with curious psychological mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 99-104.
[10] ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming. A time-relevant network traffic anomaly detection approach [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 68-73.
[11] CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67.
[12] SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie. P2P botnet detection method based on fractal and adaptive data fusion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 74-81.
[13] LIN Li. News event extraction based on kernel dependency graph [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 121-126.
[14] . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100.
[15] ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!