期刊文献+

无线传感器网络中基于网格信任度的可靠覆盖算法研究 被引量:3

Research on reliable coverage algorithm based on grid trust value for wireless sensor networks
下载PDF
导出
摘要 针对节点的覆盖优化过程极易受到各种攻击的问题,通过从信任管理的框架内深入探索可靠覆盖技术,提出了一种基于网格信任度的可靠覆盖算法。该算法对节点进行可靠性筛选和轮换调度,以并行覆盖的方式对覆盖区域内的网格点实施基于信任度的覆盖。对节点信任阈值的取值进行讨论,分析得出信任阈值的大小对整个覆盖区域的安全性和覆盖质量有很大影响。经过仿真与传统的单一覆盖机制作比较,该算法能有效提高网络安全性和延长网络寿命。仿真结果验证了算法的有效性和分析的正确性。 To solve the problem that nodes can easily suffer from various attacks during the process of coverage optimization, this paper discussed reliable coverage technology on the basis of the trust management system framework, and proposed a reliable coverage algorithm based on grid trust value. The algorithm performed the reliability screening and rotation scheduling on nodes, and the coverage based on the credibility of grid point by the way of parallel coverage. After discussing the value of the trust threshold, the paper found that it had a significant influence on the security of whole coverage area and the coverage quality. By comparing the new algorithm with traditional single coverage algorithms, the algorithm can improve the security and network lifetime effectively. Simulation experiments show the effectiveness of this algorithm and reflect the correctness of the analysis.
出处 《计算机应用研究》 CSCD 北大核心 2014年第1期253-256,260,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61063040) 广西可信软件重点实验室开放课题(kx201305) 桂林市科学研究与技术开发项目(20100104-1)
关键词 信任管理 可靠覆盖 轮换调度 网格点 信任阈值 trust management reliable coverage rotation scheduling grid point trust threshold
  • 相关文献

参考文献15

  • 1唐秋玲,杨柳青,覃团发,张淑仪.无线传感器网络中PPM节能调制方案[J].中国科学(E辑),2007,37(12):1583-1596. 被引量:3
  • 2荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730. 被引量:62
  • 3QIN Ya-juan, ZHANG Si-dong, ZHENG Tao, et al. Issues of trust management for mobile wireless sensor networks [ C ]//Proc of the 7 th International Conference on Wireless Communications, Networking and Mobile Computing. Piscataway : IEEE Press ,2011 : 1-4.
  • 4AGARATHNA K,MALLAPUR J D, HIREMATH S. Trust based se- cured routing in wireless multimedia sensor networks [ C ]//Proe of the 4th International Conference on Computational Intelligence, Commu- nication Systems and Networks. Piscataway:IEEE Press,2012:53-58.
  • 5马守明,王汝传,叶宁.基于信誉度集对分析的WSN安全数据融合[J].计算机研究与发展,2011,48(9):1652-1658. 被引量:6
  • 6ZENG Ying-pei, CAO Jian-nong, HONG Jue,et al. Secure localization and location verification in wireless sensor networks[ C ]//Proc of the 6th International Conference on Mobile Ad boc and Sensor Systems. Piscataway: IEEE Press,2009 : 864- 869.
  • 7YANG Ya-feng, SUN Yan. Securing time-synchronization protocols in sensor networks : attack detection and self-healing [ C ]//Proc of Global Telecommunications Conference. Piscataway : IEEE Press,2008 : 1 - 6.
  • 8WANG Jiong, MEDIDI S. Topology control for reliable sensor-to-sink data transport in sensor networks [ C ]//Proc of IEEE International Conference on Communications. Piscataway : IEEE Press, 2008 : 3215- 3219.
  • 9徐强,汪芸.容错节能无线WSN中可靠覆盖问题的解决方案[J].软件学报,2006,17(11):184-191.
  • 10李小龙,林亚平,易叶青,余建平,卢新国.传感器网络中基于虚拟坐标的节点调度方案[J].软件学报,2008,19(8):2089-2101. 被引量:8

二级参考文献63

  • 1毛莺池,刘明,陈力军,陈道蓄,谢立.DELIC:一种高效节能的与节点位置无关的传感器网络覆盖协议[J].计算机研究与发展,2006,43(2):187-195. 被引量:33
  • 2任彦,张思东,张宏科.无线传感器网络中覆盖控制理论与算法[J].软件学报,2006,17(3):422-433. 被引量:156
  • 3张建明,祝恩,周四望,欧阳竟成.无线传感器网络中一种安全的数据汇聚与认证协议[J].计算机工程与应用,2006,42(31):101-104. 被引量:1
  • 4周四望,林亚平,张建明,欧阳竞成,卢新国.传感器网络中基于环模型的小波数据压缩算法[J].软件学报,2007,18(3):669-680. 被引量:41
  • 5Damiani E, Vimercati S, Paraboschi S, et al. Managing and sharing servents'reputations in P2P systems[J].IEEE Trans on Knowledge and Data Engineering, 2003, 15(4): 840-854.
  • 6Cam H, Ozdemir S, Nair P, et al. ESPDA: Energy-efficient and secure pattern-based data aggregation for wireless sensor networks [C] //Proc of the 2nd IEEE Conf on Sensors. Piscataway, NJ: IEEE, 2003:732-736.
  • 7Przydatek B, Song D, Perrig A. SIA: Secure information aggregation in sensor networks [C] //Proc of the 1st ACM Int Conf on Embedded Networked Sensor System. New York: ACM, 2003:255-265.
  • 8Mahimkar A, Rappapaport T S. SecureDAV.. A secure data aggregation and verification protocol for sensor networks [C]//Proc of IEEE Global Telecommunications Conf (Globecom). Piscataway, NJ: IEEE, 2004: 2175-2179.
  • 9Sanli H O, Ozdemir S, Cam H. SRDA: Secure reference-based data aggregation protocol for wireless sensor networks [C] //Proc of IEEE VTC 2004. Piscataway, NJ: IEEE, 2004:4650-4654.
  • 10Zhu Cheng, Zhou Mingzheng, Xu Jinsheng, et al. A secure data fusion algorithm based on behavior trust in wireless sensor networks [C] //Proc of the 4th Int Conf on Wireless Communications, Networking and Mobile Computing. Piscataway, NJ: IEEE, 2008:1-4.

共引文献75

同被引文献32

  • 1Han Guangjie, Jiang Jinfang, Shu Lei, et al. Management and applications of trust in wireless sensor networks:a survey[J] . Journal of Computer and System Sciences, 2014, 80(3):602-617.
  • 2Zhang B, Huang Zhenhua, Xiang Yang. A novel multiple-level trust management framework for wireless sensor networks[J] . Computer Networks, 2014, 72(1):45-61. [6] Fabrice L F, Antonis P, Aline C V, et al. A sinkhole resilient protocol for wireless sensor networks:performance and security analysis[J] . Computer Communications, 2012, 35(2):234-248.
  • 3Fabrice L F, Antonis P, Aline C V, et al. A sinkhole resilient proto- col for wireless sensor networks: performance and security analysis [J]. Computer Communications,2012,35(2) :234-248.
  • 4Oussama S, Mounir F, Mahmoud B H. Load-balancing in MANET shortest-path routing protocols[J] . Ad hoc Networks, 2009, 7(2):431-442.
  • 5Liu Anfeng, Zhang Penghui, Chen Zhigang. Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks[J] . Journal of Parallel and Distributed Computing, 2011, 71(10):1327-1355.
  • 6Yu Yanli, Li Keqiu, Zhou Wanlei, et al. Trust mechanisms in wireless sensor networks:attack analysis and countermeasures[J] . Journal of Network and Computer Applications, 2012, 35(3):867-880.
  • 7Leligou H C, Trakadas P, Maniatis S, et al. Combining trust with location information for routing in wireless sensor networks[J] . Wireless Communications and Mobile Computing, 2012, 12(12):1091-1103.
  • 8Govind P G, Manoj M, Kumkum G. Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks[J] . Journal of Network and Computer Applications, 2014, 41(2):300-311.
  • 9Hsieh M Y, Huang Y M, Chao H C. Adaptive security design with malicious node detection in cluster-based sensor networks[J] . Computer Communications, 2007, 30(1):2385-2400.
  • 10Zhan Guoxing, Shi Weisong, Deng Julia. Design and implementation of TARF:a trust-aware routing framework for WSNs[J] . IEEE Trans on Dependable and Secure Computing, 2012, 9(2):184-197.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部