检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:成坚[1] 冯仁剑[1] 许小丰[2] 万江文[1]
机构地区:[1]北京航空航天大学仪器科学与光电工程学院,北京100191 [2]北京邮电大学计算机科学与技术学院,北京100876
出 处:《传感技术学报》2009年第12期1802-1807,共6页Chinese Journal of Sensors and Actuators
基 金:国家高技术研究发展计划资助(863计划)专项课题(2009AA01Z201);国家自然科学基金资助项目(60873240);北京市教育委员会共建项目专项资助
摘 要:信任评估模型对无线传感器网络的可靠运行和安全保障具有重要意义。提出了一种基于D-S证据理论的信任评估模型。模型给出了节点信任值的形式化定义;利用基本置信度函数计算直接信任值,通过邻居节点的推荐获取间接信任值;在此基础上,对直接、间接信任值进行基于权重的修正,并根据Dempster组合规则予以合成,最终得到节点综合信任值。仿真结果表明,该模型具有良好的动态适应性和容错性,能实时、准确地发现恶意节点,有效提高了无线传感器网络的安全性。Trust evaluation model plays a significant role in reliability and security of wireless sensor net- works. A trust evaluation model based on D-S evidence theory was proposed. Giving the formal definition of node's trust from the model, direct trust was calculated with basic probability assignment function and indirect trusts were obtained from neighbor nodes' recommendations. On this basis, the direct trust and indirect trusts were combined according to Dempster combination rule after being amended with weight, to obtain node's comprehensive trust finally. Simulation results show that the model has not only good dynamic adaptability and fault tolerance, but also real-time, accurate discovery of malicious nodes, so as to improve the security of wireless sensor networks effectively.
关 键 词:无线传感器网络 信任评估 D-S证据理论 网络安全
分 类 号:TN393[电子电信—物理电子学]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222