检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:徐小龙[1] 林亚平[1,2] 朱铁军[1] 申帅[1]
机构地区:[1]湖南大学计算机与通信学院,长沙410082 [2]湖南大学软件学院,长沙410082
出 处:《计算机工程与应用》2010年第12期79-81,84,共4页Computer Engineering and Applications
基 金:国家高技术研究发展计划(863)No.2006AA01Z227~~
摘 要:针对无线传感器网络中单个节点容易受到恶意攻击的妥协性和各个节点能量消耗的非均衡性,提出了一种基于正反馈的信任模型。该模型基于正反馈思想,在簇头节点的任期结束时对簇内节点进行信任考核,并将考核的结果称之为信任列表传给下一轮簇头。因为信任考核包括是否发送正确数据的历史行为和节点剩余能量的个体属性,基于正反馈的思想使得考核结果能在簇头间可靠轮转和增量累积。模拟实验与分析表明:该模型能有效剔除节点发送的虚假数据,并准确识别出失效节点,优化网络的性能,为拓扑控制算法、数据收集压缩算法等提供一个可信的支撑环境。Considering a single node in the wireless sensor networks can be compromised to malicious attacks and energy con-sumption for each node in the cluster can not be balanced,this paper proposes a trust model which is based on positive feedback. The model is based on positive feedback,because the cluster head gives the other node in the cluster a trust evaluation when it is at the end of cluster head.The trust evaluation result called trust list is sent to the candidate cluster immediately.For the trust list includes the history behavior of sending correct data and residual energy attribute,the trust evaluation result based on positive feedback is rotated reliably and cumulated incrementally.Simulation results and analysis show that:This trust model can eliminate the false data which are sent by malicious nodes effectively and identify failure nodes accurately,thereby optimizes the performance,provides a credible supporting environment for topology algorithm,data collection algorithm or compression algorithm etc.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.40