检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:周远林 陶洋[1] 李正阳 杨柳 ZHOU Yuanlin;TAO Yang;LI Zhengyang;YANG Liu(School of Communication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)
机构地区:[1]重庆邮电大学通信与信息工程学院,重庆400065
出 处:《计算机工程》2021年第3期174-182,共9页Computer Engineering
基 金:国家自然科学基金(61801072);重庆市自然科学基金(cstc2018jcyjAX0344)。
摘 要:针对无线传感器网络存在恶意或妥协节点导致通信数据被攻击的问题,提出一种基于双簇头的反馈信任模型,以保障数据在传输、感知以及融合等环节的可靠性与完整性。利用节点间直接交互结果评估节点的直接信任,同时考虑通信、数据感知和融合信任,通过贝叶斯公式评估邻居节点的通信信任,使用时间滑动窗将节点历史信任作为直接信任的补充,动态调整直接与间接信任权重使综合信任评价更客观和准确。在此基础上,引入双簇头交互监测和基站信任反馈机制,主簇头和监督簇头根据本地数据空间相关性独立评估成员数据感知信任,基站利用双簇头数据融合结果的时间相关性评估数据融合信任,并将最终信任结果反馈到所有节点。仿真结果表明,该模型能有效检测异常数据和恶意节点,成功抵御选择性转发攻击、伪造本地数据攻击以及伪造融合数据攻击,在网络安全与能耗间实现良好的平衡。To address the attacks on the communication data by malicious or compromised nodes in Wireless Sensor Network(WSN),this paper proposes a feedback trust model based on double cluster head to ensure the reliability and integrity of data in transmission,perception and fusion.The results of direct interactions between nodes are used to evaluate their direct trust,and the communication,data perception and fusion trust are considered at the same time.The communication trust of neighbor nodes is evaluated by using the Bayesian formula.The historical trust of nodes is used as the supplement of direct trust by using time sliding window,and the weights of direct and indirect trust are adjusted dynamically to make the comprehensive trust evaluation more objective and accurate.On this basis,the monitoring mechanism for interactions between double cluster head and the feedback mechanism for base station trust are introduced.The primary cluster head and the supervisory cluster head independently evaluate the data perception trust of the members according to the spatial correlation of the local data.The base station uses the temporal correlation of the data fusion results of the dual cluster head to evaluate the data fusion trust,and feeds back the final trust results to all nodes.Simulation results show that the model can effectively detect abnormal data and malicious nodes,successfully resist selective forwarding attacks,forgery local data attacks and forgery fusion data attacks,achieving a good balance between network security and energy consumption.
关 键 词:传感器网络 信任模型 恶意节点 双簇头 数据安全
分 类 号:TP212[自动化与计算机技术—检测技术与自动化装置]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222