首页 | 本学科首页   官方微博 | 高级检索  
     

基于双簇头的无线传感器网络反馈信任模型
引用本文:周远林,陶洋,李正阳,杨柳.基于双簇头的无线传感器网络反馈信任模型[J].计算机工程,2021,47(3):174-182.
作者姓名:周远林  陶洋  李正阳  杨柳
作者单位:重庆邮电大学 通信与信息工程学院, 重庆 400065
基金项目:国家自然科学基金;重庆市自然科学基金
摘    要:针对无线传感器网络存在恶意或妥协节点导致通信数据被攻击的问题,提出一种基于双簇头的反馈信任模型,以保障数据在传输、感知以及融合等环节的可靠性与完整性。利用节点间直接交互结果评估节点的直接信任,同时考虑通信、数据感知和融合信任,通过贝叶斯公式评估邻居节点的通信信任,使用时间滑动窗将节点历史信任作为直接信任的补充,动态调整直接与间接信任权重使综合信任评价更客观和准确。在此基础上,引入双簇头交互监测和基站信任反馈机制,主簇头和监督簇头根据本地数据空间相关性独立评估成员数据感知信任,基站利用双簇头数据融合结果的时间相关性评估数据融合信任,并将最终信任结果反馈到所有节点。仿真结果表明,该模型能有效检测异常数据和恶意节点,成功抵御选择性转发攻击、伪造本地数据攻击以及伪造融合数据攻击,在网络安全与能耗间实现良好的平衡。

关 键 词:传感器网络  信任模型  恶意节点  双簇头  数据安全  
收稿时间:2020-02-13
修稿时间:2020-03-23

Double Cluster Head-based Feedback Trust Model for Wireless Sensor Network
ZHOU Yuanlin,TAO Yang,LI Zhengyang,YANG Liu.Double Cluster Head-based Feedback Trust Model for Wireless Sensor Network[J].Computer Engineering,2021,47(3):174-182.
Authors:ZHOU Yuanlin  TAO Yang  LI Zhengyang  YANG Liu
Affiliation:School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Abstract:To address the attacks on the communication data by malicious or compromised nodes in Wireless Sensor Network(WSN),this paper proposes a feedback trust model based on double cluster head to ensure the reliability and integrity of data in transmission,perception and fusion.The results of direct interactions between nodes are used to evaluate their direct trust,and the communication,data perception and fusion trust are considered at the same time.The communication trust of neighbor nodes is evaluated by using the Bayesian formula.The historical trust of nodes is used as the supplement of direct trust by using time sliding window,and the weights of direct and indirect trust are adjusted dynamically to make the comprehensive trust evaluation more objective and accurate.On this basis,the monitoring mechanism for interactions between double cluster head and the feedback mechanism for base station trust are introduced.The primary cluster head and the supervisory cluster head independently evaluate the data perception trust of the members according to the spatial correlation of the local data.The base station uses the temporal correlation of the data fusion results of the dual cluster head to evaluate the data fusion trust,and feeds back the final trust results to all nodes.Simulation results show that the model can effectively detect abnormal data and malicious nodes,successfully resist selective forwarding attacks,forgery local data attacks and forgery fusion data attacks,achieving a good balance between network security and energy consumption.
Keywords:sensor network  trust model  malicious node  double cluster head  data security
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号