共查询到19条相似文献,搜索用时 187 毫秒
1.
针对无线传感器网络中节点的安全性及覆盖问题,提出基于节点信任度的三维覆盖算法(Three Dimensional Coverage Algorithm Based on Node Trust,简称NTA3D),该算法依据虚拟力、网格划分及节点信任度的思想,引入吸引源联合信任度。将待监测区域划分成网格,并在每个网格中心部署吸引源。吸引源可以根据网格中的活跃节点计算该网格的联合信任度,并根据联合信任度调度节点,调度结束后工作节点根据其所受合力的大小和方向重新部署。通过实验仿真,证明了本文算法能够在保证安全性的前提下有效地提高覆盖率,降低网络能耗。 相似文献
2.
为了防止网络中存在的潜在恶意节点被加入到机会路由的候选转发集中,减少网络能量的消耗,并保证数据的可靠传输,提出了一种在无线传感器网络中基于信任度的节能机会路由(Trust Based Energy Efficient Opportunistic Routing in Wireless Sensor Networks,TBEEOR)算法。该算法根据网络的拓扑结构计算节点的代数连通度,进而计算节点的连通度诚意;再联合节点的转发诚意和ACK诚意,利用信息熵的概念计算综合信任度;最后,用节点的综合信任度来计算节点之间通信和协作造成的能量消耗,从而得到网络的预期成本。此外,该算法能够有效地识别和判断网络中的恶意节点,进一步减小了恶意节点对网络性能的影响。实验结果表明,TBEEOR算法有效地保证了数据传输的可靠性,有助于延长网络生命周期,从而增加了网络吞吐量,减少了网络能量消耗。 相似文献
3.
为了解决P2P网络系统中节点频繁退出和加入引起的系统数据信息误差,并针对数据获取对中心节点依赖度较大和系统中节点的数据信息获取不完整等问题,提出了进化算法迭代优化的P2P网络信任模型.首先将P2P网络系统中节点数据信息获取的系统信任度估计模型转化为从源节点到目标节点最优信任关系的路径寻优问题;然后利用改进的粒子群算法对信任关系路径方案进行粒子映射,并通过对粒子粒距聚集度和粒子信息熵进行计算而修正粒子权值,再对粒子局部最优解和全局最优解进行更新;最后迭代的对信任关系路径解空间中的最优解进行搜索,并对最优路径的节点进行推荐信任度加权.仿真结果表明,改进算法具有较好的收敛速度和较强的有效性,且当节点跳级数较少时,可使系统数据信息估算获得最优的系统信任度. 相似文献
4.
在无线传感器网络中,针对异常事件监测时会出现大量数据发送引起网络拥塞、数据包无法可靠传输的问题,提出一种基于信任机制的可靠传输路由协议(RTRPT)。该协议提出了梯度分簇模型以选取簇头节点。在无异常事件发生时,通过转发能量阈值找出传输数据的邻居节点,进行数据传输。同时对这些节点进行转发概率与历史信任度计算得到直接信任度,再通过这些节点交互间接评价得到间接信任度。将直接信任度、间接信任度、距离度量和剩余能量作为评价指标,量化后通过熵权法得到邻居节点的综合信任。在异常事件发生时,节点仅需选择综合信任度最大的邻居节点作为转发节点,建立路由路径。使用OMNeT++进行仿真验证,RTRPT与TSRP、ESRT相比,在传输大量数据包时节点丢包率分别降低69.4%、52.7%;节点传输延迟分别降低53.6%、34.8%;网络生命周期分别延长32.5%、15.7%。仿真结果表明,RTRPT能有效减少丢包、降低传输延迟、延长生命周期。 相似文献
5.
6.
7.
8.
根据语义网中信息拥有的属性特征以及节点之间交互方式,在将信息语义信任度定义为传播节点信任度和传播信息内容信任度基础上,提出了一种信息语义信任度计算算法。该算法由三部分组成:一是每个节点通过自身本体对知识的形式化说明计算信息内容信任度;二是通过节点之间信息交互计算节点信任度;三是在前两种计算基础上综合计算得到最终信息语义可信任度。进而提出一种信息传播动态信任控制机制。最后进行了仿真实验,实验结果表明,本论文研究成果能够使信息在语义信任计算基础上进行有效传播。 相似文献
9.
针对P2P网络中交易的安全性问题,提出了一种基于资源评价的信任管理模型。首先给出评价节点行为信任的好评度的概念,用模糊综合评判的方法计算节点对交易的单次好评度,每次交易后的交易记录表由提供资源的节点的母节点进行管理和存储;当节点选择提供资源的节点时,不仅考虑对目标节点的直接信任度,还考虑此次交易资源的总好评度,在计算直接信任度时考虑了时效性和交易资源的重要程度两个因素,交易资源的总好评度的计算数据来源于该资源的评价节点给出的以往评价;最后引入了基于虚拟货币的激励机制,以有效地提高节点参与的积极性。仿真实验表明,该模型能有效抵制恶意节点的攻击,提高网络交易的成功率。 相似文献
10.
在物联网中节点恶意行为会促使节点的信任度大幅降低,如何确保高信任度并加强网络安全性已经成为首要问题,提出一种物联网节点动态行为信任度评估方法。首先依据多实体贝叶斯建立信任模型,可以控制恶意节点对物联网的攻击和入侵;采用贡献资源数值权重来抑制自私节点,并对其初始化处理;通过对信任的传递与合成计算出推荐信任值,能够减少运算复杂度;并利用综合信任度调高可信任的阈值,最后根据节点间直接的交互记录,来完成信任度的评估。仿真结果表明,所提方法可以较好地识别恶意节点和抑制恶意推荐行为,能够保证信任评估的有效性、可靠性以及安全性。 相似文献
11.
为解决物联网数据源头的可靠问题,构建一种基于感知源的数据驱动信任评测模型.模型以监测模块为评测单元,由中继节点完成其所在监测模块内感知节点的信任评测,通过感知节点自身数据之间的关系实现直接信任的计算,利用监测模块内各邻居节点之间关系实现推荐信任的计算,再结合历史信任,输出感知节点的综合信任.同时与模型预设的可疑阈值和异常阈值进行对比,更新历史信任和信任列表,实现感知节点的异常检测,利用预警检测误差和失信检测误差对模型的检测效果进行评价,统计结果表明模型能够保持较低的平均误差.将信任机制引入到数据融合过程,用综合信任作为加权因子,从而提高了数据融合的准确度.最后,通过实验仿真对信任评测模型进行评价,结果表明引入信任评测模型后延长了节点开始死亡的时间,随着节点的更新迭代,失信节点越来越少,在一定程度上提高了节点的存活率,延长了网络的生命周期. 相似文献
12.
G. Indirani K. Selvakumar 《International Journal of Parallel, Emergent and Distributed Systems》2014,29(1):90-103
In mobile ad hoc network (MANET), the issues such as limited bandwidth availability, dynamic connectivity and so on cause the process of intrusion detection to be more complex. The nodes that monitor the malicious nodes should have necessary residual bandwidth and energy and should be trustable. In order to overcome these drawbacks, in this paper, we propose a swarm-based efficient distributed intrusion detection system for MANET. In this technique, swarm agents are utilised to select the nodes with highest trust value, residual bandwidth and residual energy as active nodes. Each active node monitors its neighbour nodes within its transmission range and collects the trust value from all monitored nodes. The active nodes adaptively change as per the trust thresholds. Upon collaborative exchange of the trust values of the monitored nodes among the active nodes, if the active node finds any node below a minimum trust threshold, then the node is marked as malicious. When the source receives alert message about the malicious node, a defence technique is deployed to filter the corresponding malicious node from the network. By simulation results, we show that the proposed approach is efficient intrusion detection mechanism for MANET. 相似文献
13.
Asma Adnane Christophe Bidan Rafael Timóteo de Sousa Júnior 《Computer Communications》2013,36(10-11):1159-1171
The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities.In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR. 相似文献
14.
Towards reliable self-clustering Mobile Ad Hoc Networks 总被引:1,自引:0,他引:1
Wei WangAuthor Vitae Guosun ZengAuthor Vitae Jing YaoAuthor VitaeHanli WangAuthor Vitae Daizhong TangAuthor Vitae 《Computers & Electrical Engineering》2012,38(3):551-562
With the introduction of Mobile Ad Hoc Networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. In this paper, we present a novel approach to improve the search efficiency and scalability of MANETs by clustering nodes based on trust mechanism. In our method, the trust relationship is formed by evaluating the level of trust using Bayesian statistic analysis, and clusters can be formed and maintained autonomously by nodes with only partial knowledge. Simulation results show that each node can form and join proper clusters based on their trust degree, and the cluster-based search algorithm with trust mechanism outperforms over those in current popular clustering models. 相似文献
15.
16.
Reinaldo B. Braga Igor A. Chaves Carina T. de Oliveira Rossana M.C. Andrade José Neuman de Souza Hervé Martin Bruno Schulze 《Journal of Network and Computer Applications》2013,36(1):274-283
In ad hoc grid environments, resources are not always available since nodes can spontaneously connect and disconnect at any time. Thus, these environments demand the correct execution of tasks to guarantee good performance. However, there are malicious users that affect the normal operation of these grids. These users modify tasks results and even cheat security mechanisms. Therefore, to assure high performance in these grid computing scenarios, it is essential to use punishment procedures based on trust models. These solutions have been used in wireless ad hoc networks, but not in the context of ad hoc grid computing. Thus, in this paper, we first present an analysis of mathematical trust models in ad hoc grid scenarios, using different ways to treat detection information passed on by other nodes. Then, we provide a comparison and a performance evaluation of these models using a grid simulator platform. Besides that, we choose the most accurate trust model among the evaluated ones to propose RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments. Simulation results demonstrate the effectiveness of the proposed approach in detecting and punishing up to 100% of malicious nodes without generating false-positives. The results can be a valuable tool for network designers in planning trust models in ad hoc grid network deployments. 相似文献
17.
针对无线传感器网络存在恶意或妥协节点导致通信数据被攻击的问题,提出一种基于双簇头的反馈信任模型,以保障数据在传输、感知以及融合等环节的可靠性与完整性。利用节点间直接交互结果评估节点的直接信任,同时考虑通信、数据感知和融合信任,通过贝叶斯公式评估邻居节点的通信信任,使用时间滑动窗将节点历史信任作为直接信任的补充,动态调整直接与间接信任权重使综合信任评价更客观和准确。在此基础上,引入双簇头交互监测和基站信任反馈机制,主簇头和监督簇头根据本地数据空间相关性独立评估成员数据感知信任,基站利用双簇头数据融合结果的时间相关性评估数据融合信任,并将最终信任结果反馈到所有节点。仿真结果表明,该模型能有效检测异常数据和恶意节点,成功抵御选择性转发攻击、伪造本地数据攻击以及伪造融合数据攻击,在网络安全与能耗间实现良好的平衡。 相似文献
18.
IEEE802.15.4e是工业物联网中最新的MAC层标准,其采用时间同步技术实现高可靠、低功耗的无线网络。由于时间同步机制是工业无线网络中的核心支撑技术,因此其往往成为攻击者的首选攻击目标。针对IEEE802.15.4e标准的多跳时间同步协议存在安全性不足的问题,提出了一个多跳时间同步安全策略 SMTSF。SMTSF 安全策略主要采用基于异常的入侵检测算法、基于信任模型的多路径时间同步方法和加密与认证等关键技术,有效保障了节点之间安全地进行多跳时间同步。在基于入侵检测的算法中,边界路由器对节点的 Rank 值进行规则验证,可以有效检测出时间同步树攻击;同时设计了轻量级防火墙来抵御来自互联网的恶意主机攻击。在基于信任模型的多路径时间同步方法中,通过建立节点之间的信任模型来保障网络中节点可以找到一条安全多跳同步路径。仿真结果表明,SMTSF 能有效检测时间同步树攻击并抵御捕获攻击。 相似文献