CN101765231B - Wireless sensor network trust evaluating method based on fuzzy logic - Google Patents

Wireless sensor network trust evaluating method based on fuzzy logic Download PDF

Info

Publication number
CN101765231B
CN101765231B CN 200910244275 CN200910244275A CN101765231B CN 101765231 B CN101765231 B CN 101765231B CN 200910244275 CN200910244275 CN 200910244275 CN 200910244275 A CN200910244275 A CN 200910244275A CN 101765231 B CN101765231 B CN 101765231B
Authority
CN
China
Prior art keywords
node
trust
evaluated
assessment
vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 200910244275
Other languages
Chinese (zh)
Other versions
CN101765231A (en
Inventor
吴银锋
万江文
冯仁剑
于宁
成坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN 200910244275 priority Critical patent/CN101765231B/en
Publication of CN101765231A publication Critical patent/CN101765231A/en
Application granted granted Critical
Publication of CN101765231B publication Critical patent/CN101765231B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a wireless sensor network trust evaluating method based on a fuzzy logic, which comprises the following steps that: (1) an evaluating node initializes the direct trust vectors of evaluated nodes; (2) the evaluating node periodically updates the direct trust vectors of the evaluated nodes by using a fuzzy inference method; (3) the evaluating node collects the indirect trust vectors of recommended nodes on the evaluated nodes; (4) by utilizing the direct trust vectors and the indirect trust vectors of the evaluated nodes, the evaluating node calculates the comprehensive trust vectors of the evaluated nodes; and (5) according to the comprehensive trust vectors of the evaluated nodes, the evaluating node carries out the judgement of the trust classification and the decision of the network collaboration on the evaluated nodes. The invention realizes the trust quantification by adopting the trust value definition based on a fuzzy set theory and using a fuzzy inference algorithm, thereby effectively handling the problem of the subjective fuzziness of the trust and simulating the subjective cognitive process of the trust inference. Compared with the traditional algorithm, the wireless sensor network trust evaluating method has higher sensitivity, accuracy and generality.

Description

A kind of wireless sensor network trust evaluating method based on fuzzy logic
Technical field
The present invention relates to the trust evaluation in wireless sensor network trust the administrative skill field, particularly wireless sensor network, a kind of wireless sensor network trust evaluating method based on fuzzy logic.
Background technology
Wireless sensor network integrates sensor technology, micro electro mechanical system (MEMS) technology, embedded computing technique, wireless communication technology and distributed information processing, utilize the sensor node that is deployed in a large number in the monitored area, perception information in the collection network coverage, by the communication of multi-hop, the information after collecting, handling is offered the terminal use.Wireless sensor network does not need the network support fixed, has characteristics such as rapid deployment, survivability be strong, is widely used in a plurality of fields such as military surveillance, environmental monitoring, Industry Control, medical monitoring.
Wireless sensor network usually is applied to battlefield investigation or security monitoring, is deployed under the environment that lacks basic maintenance.Sensor node is very easily captured by the enemy, and is transformed into malicious node to network implementation attack and destruction.Traditional wireless sensor network security mechanism depends on key code system, grasps effective network security key owing to be captured node, and secret key safety mechanism can't solve its internal security problem that causes.And trust management system does not rely on netkey, can assess the credibility of node by observing behavior and the feature of node, and searches the enforcement of malicious node and the measure of adjustment network security by this, has effectively remedied the deficiency of secret key safety mechanism.Trust evaluation is core and the key of trust management, has determined the validity of whole trust management system.
Existing wireless sensor network trust evaluating method is broadly divided into three classes: 1. based on the trust evaluation of classic scheme.These class methods are added up corresponding trust-factor by the diverse network behavior of observing node, and with the weighted average of all trust-factor trust value as node.As, people such as Crosby propose to add up the trust-factor such as the rate of giving out a contract for a project, forward rate and packet percentage of head rice of node, obtain the node trust value by weighted average; 2. based on the trust evaluation of Bayes principle.This class methods are subjective hypothesis node prior distribution of trusting earlier, and the posteriority that utilizes the statistics of meshed network behavior quality that node is trusted distributes and carries out Bayesian inference, and the mathematic expectaion that the gained posteriority is distributed is as the node trust value.As, the RFSN trust evaluation framework that people such as Ganeriwal propose; 3. based on the trust evaluation of experience.These class methods are utilized the trust value of certain experience formula computing node according to the statistics of meshed network behavior performance.As, people such as Hur are by the trust value of the authenticity computing node of analysis node Monitoring Data.The simple statistical method of this three class methods utilization has realized the analysis of uncertainty to the node trust, satisfied the lightweight requirement of sensor node, but the uncertainty that will trust is equal to randomness fully, has ignored subjective ambiguity, has influenced the accuracy of trust evaluation.In addition, in the trust evaluation based on classic scheme, the weighted average of trust-factor finally makes trust management lower to the single malicious node sensitivity of attack form, and its trust-factor is calculated, and weight is also very difficult to be determined; In the method for evaluating trust based on Bayes principle, the subjectivity of prior distribution hypothesis has increased the weight of the uncertainty of trusting, and the quality classification simple to the meshed network behavior finally also makes trust management lower to the single malicious node sensitivity of attack form; Only investigate the single trust-factor of node based on the method for evaluating trust of experience, have one-sidedness, versatility is poor.
In scientific research, the blooming that is subjected to human subjective cognitive ability restriction and produces, U.S. cybernetist Zadeh has proposed fuzzy set theory as far back as nineteen sixty-five, he has set forth the implication of ambiguity exactly, formulated the mathematical method (degree of membership, membership function, fuzzy subset etc.) of dividing ambiguity, for the development of fuzzy theory necessary base.Fuzzy theory has caused that the experts and scholars of various fields pay close attention to, and develops very fastly, has derived a series of new branch of science such as fuzzy reasoning, fuzzy control, fuzzy statistics.Expression and processing that fuzzy set theory and fuzzy reasoning method are respectively subjective trust provide strong tool.In the trust evaluation of wireless sensor network, use fuzzy theory, can accurately express the subjective ambiguity of trust, the subjective cognitive process of reasoning is trusted in simulation, solves randomness and subjective uncertainty problem that node is trusted simultaneously, improves accuracy, versatility and the sensitivity of trust evaluation.
Summary of the invention
The purpose of this invention is to provide a kind of wireless sensor network trust evaluating method based on fuzzy logic, solve the problems referred to above that existing method for evaluating trust exists, realize the accurate assessment of subjective trust in the wireless sensor network.
A kind of wireless sensor network trust evaluating method based on fuzzy logic of the present invention adopts distributed algorithm, requires the assessment that adjacent node is trusted mutually in the network, and the main body of assessment is called the assessment node, and object is called evaluated node;
This appraisal procedure of the present invention, trust value employing confidence level and two kinds of representations of trust vector to node specifically are defined as:
If node j is the neighbor node of node i, node i is carried out trust evaluation to node j; Wherein, i and j represent the ID of node in the network, are natural number;
Confidence level t: the assessment node i is to the confidence level t of evaluated node j IjExpression, interval is [0,1], t IjBe worth more big, the assessment node i more high to the trusting degree of evaluated node j;
Trust vector T: trust the definition of vector based on fuzzy set theory.The trusted degree of node is divided into " insincere ", " uncertain ", " more credible " and " definitely credible " four ranks; Domain at node credibility marks off and four fuzzy subset L that rank is corresponding T1, L T2, L T3And L T4, and set up corresponding membership function μ T1(t), μ T2(t), μ T3(t) and μ T4(t); Consider the restriction of node resource, membership function adopts triangle or trapezoidal function form; Then the vector representation of node trust is T=(v 1, v 2, v 3, v 4), the individual component v of k (k=1,2,3,4) of vector kThe expression node is to the degree of membership of k level of trust; Among the present invention, DT, IT and CT represent respectively to assess node to the direct trust vector of evaluated node, trust vector sum indirectly and comprehensively trust vector; If the assessment node i is to the confidence level t of evaluated node j Ij=t *, then assess node i to the vectorial DT of direct trust of evaluated node j Ij=(μ T1(t *), μ T2(t *), μ T3(t *), μ T4(t *)).
A kind of wireless sensor network trust evaluating method based on fuzzy logic of the present invention, concrete steps are as follows:
Step 1: directly trusting of the evaluated node of assessment node initializing is vectorial, and concrete grammar is:
Owing to lack prior information, the assessment node i can't be determined the confidence level of evaluated node j fully, and the component assignment that therefore will directly trust corresponding " uncertain " level of trust in the vector is 1, and other component assignment is 0, then directly trusts the initial value of vector DT ij 0 = ( 0,1,0,0 ) .
Step 2: the assessment node uses fuzzy reasoning method to be updated periodically the direct trust vector of evaluated node, and the concrete practice is:
(1) establishing the assessment node i constantly finishes 0 evaluated node j is directly trusted vectorial DT IjInitialization, then assess node i and observe the network behavior of evaluated node j at l τ to (l+1) τ period (l 〉=0, τ is the update cycle of directly trusting vector), and add up evaluated node j trust-factor γ constantly at (l+1) τ 1, γ 2..., γ mThe changes delta γ of (trust-factor of establishing node has m) 1, Δ γ 2..., Δ γ mThe assessment node i adopts the communication pattern that mixes reception by the observation of monitor channel realization to evaluated node j network behavior;
(2) (l+1) τ constantly, the assessment node i dynamically arranges corresponding renewal weight according to the variation tendency of evaluated node j trust-factor, establishes trust-factor γ s(s=1,2 ..., m) be changed to Δ γ s, then it upgrades weights W sValue is:
Figure G2009102442759D00032
Wherein, 0<W L<<W H<1;
(3) the assessment node i is upgraded all trust-factor values of evaluated node j:
γ s l + 1 = ( 1 - W i ) × γ s l + W s × Δ γ s - - - ( 2 )
Wherein, γ s lAnd γ s L+1Be respectively l τ and (l+1) the τ trust-factor value of evaluated node j constantly;
(4) the assessment node i is according to γ 1 L+1, γ 2 L+1..., γ 3 L+1, fuzzy reasoning is from the confidence level t to evaluated node j in (l+1) τ moment Ij L+1, and with t Ij L+1The membership function of each level of trust correspondence of substitution, can obtain assessing node i to evaluated node j at (l+1) τ vectorial DT of direct trust constantly Ij L+1:
DT ij l + 1 = ( μ T 1 ( t ij l + 1 ) , μ T 2 ( t ij l + 1 ) , μ T 3 ( t ij l + 1 ) , μ T 4 ( t ij l + 1 ) ) - - - ( 3 )
Wherein, the assessment node i is according to the trust-factor value of evaluated node j, and fuzzy reasoning self to the concrete grammar of evaluated node j confidence level is:
1. assess node i and before trust evaluation, set up the fuzzy inference rule of node credibility in advance, and the fuzzy implication relation R between extraction trust-factor and the node credibility γ-t, be specially:
A. the fuzzy inference rule of node credibility must be set up before trust evaluation in advance, and concrete method for building up is:
At first, with trust-factor γ s(s=1,2 ..., m) be divided into " bad ", " generally " and " good " be totally three good and bad ranks, and set up corresponding fuzzy subset r at its domain S, 1, r S, 2, r S, 3And membership function μ Rs, 1s), μ Rs, 2s), μ Rs, 3s); Consider the restriction of node resource, membership function adopts triangle or trapezoidal function form;
Secondly, according to general knowledge and the experience of trusting reasoning, (Q=3 builds together to set up the fuzzy inference rule of node credibility mThe bar rule), the standard of foundation is:
When arbitrary trust-factor was " bad ", then the confidence level of node was " insincere ";
When the trust-factor of minority is " good ", and when not having trust-factor to be " bad ", then the confidence level of node is " uncertain ";
When most of trust-factor are " good ", and when not having trust-factor to be " bad ", then the confidence level of node is " more credible ";
When all trust-factor were " good ", then the confidence level of node was " definitely credible ";
B. assess node i according to fuzzy inference rule, extract fuzzy implication relation R between trust-factor and the node credibility γ-tConcrete grammar be:
At first, the implication of extracting under the wall scroll fuzzy rule concerns T α(α=1,2 ..., Q):
Figure G2009102442759D00041
Wherein, μ R1 α1), μ R2 α2) ..., μ Rm αm) be other membership function of the good and bad level of each trust-factor under the α bar fuzzy rule, μ T α(t) be the membership function of α bar fuzzy rule lower node level of trust;
Secondly, the implication relation under all fuzzy rules is carried out comprehensively obtaining implication relation R γ-t:
Figure G2009102442759D00042
2. assess node i with the trust-factor value γ of evaluated node j 1 *, γ 2 *..., γ m *With R γ-tIt is synthetic to carry out reasoning, obtains the fuzzy output μ of node credibility T *(t):
Figure G2009102442759D00043
3. assessing node i utilizes gravity model appoach with μ T *(t) the confidence level t to evaluated node j is tried to achieve in reverse gelatinization Ij:
t ij = COG = ∫ μ T * μ T * ( t ) · tdt / ∫ μ T * μ T * ( t ) dt - - - ( 7 )
Step 3: when needs carried out network cooperation with evaluated node, the assessment node was collected recommended node to the indirect trust vector of evaluated node, and concrete grammar is:
When the assessment node i need determine whether to carry out network cooperation with evaluated node j, broadcast the querying command that evaluated node is trusted vector indirectly towards periphery; Recommended node is after receiving querying command, and self is vectorial as trusting vector indirectly to directly trusting of assessment node j, sends to the assessment node i; Here, recommended node can only be the common neighbor node of assessment node and evaluated node.
Step 4: the assessment node is comprehensive weight with the confidence level of recommended node, and indirect trust vector and direct trust vector are synthesized, and obtains the comprehensive trust vector of evaluated node, and concrete grammar is:
If the assessment node i receives the individual recommended node of p (p 〉=0) to the indirect trust vector IT of evaluated node j 1j, IT 2j..., IT PjThe assessment node i is with self confidence level t to these recommended nodes I1, t I2..., t IpBe comprehensive weight, this p is trusted vector indirectly and directly trust vectorial DT IjSynthesize, calculate the vectorial CT of comprehensive trust to evaluated node j Ij:
CT ij = DT ij + Σ u = 1 p t iu · IT uj 1 + Σ u = 1 p t iu - - - ( 8 )
Step 5: the assessment node is vectorial according to comprehensive trusts of evaluated node, judges the level of trust of evaluated node, and adjusts network cooperation behavior between self and evaluated node flexibly, and concrete grammar is:
The assessment node i will comprehensively be trusted vectorial CT IjThe middle corresponding level of trust of largest component is as the level of trust under the evaluated node j; According to the level of trust of evaluated node j, whether the assessment node i determines the standard of carrying out network cooperation with evaluated node j to be: if evaluated node j belongs to " credible anything but " rank, then assess the node i refusal and cooperate with it; If evaluated node j belongs to " uncertain " rank, then assess node i and only carry out the lower network cooperation of risk with it; If evaluated node j belongs to " more credible " rank, then assess node and carry out the general network cooperation of risk with it; If evaluated node j belongs to " definitely credible " rank, then assess node i is carried out any risk with it network cooperation.
The invention has the advantages that:
(1) the present invention adopts fuzzy set theory that the node trust is carried out fuzzy classification, utilizes Fuzzy Logic Reasoning Algorithm to realize the quantification that node is trusted, and the subjective cognitive process of reasoning is trusted in simulation, has higher accuracy than conventional method;
(2) trust fuzzy inference rule based on the node of strictness, the malicious node single to the attack form has higher sensitivity than conventional method;
(3) at different network environments, can set up corresponding fuzzy rule according to practical experience, have stronger versatility.
Description of drawings
Fig. 1 is the wireless sensor network trust evaluating method of a kind of fuzzy logic of the present invention, the flow chart of trust evaluation;
Fig. 2 is for directly trusting the flow chart of vector period renewal among the present invention;
Fig. 3 is the schematic diagram of the evaluated node credibility of assessment node fuzzy reasoning among the present invention;
Fig. 4 obtains the schematic diagram of indirect trust for assessment node among the present invention;
Embodiment
The present invention is described in further detail below in conjunction with accompanying drawing.
A kind of wireless sensor network trust evaluating method based on fuzzy logic of the present invention adopts distributed algorithm, the assessment that requires the adjacent node in the network to trust mutually, and the main body of assessment is called the assessment node, and object is called evaluated node;
A kind of wireless sensor network trust evaluating method based on fuzzy logic of the present invention has provided confidence level and the expression mode of trusting two kinds of node trust values of vector, specifically is defined as:
If node j is the neighbor node of node i, node i is carried out trust evaluation to node j; Wherein, i and j represent the ID of node in the network, are natural number;
Confidence level t: the assessment node i is to the confidence level t of evaluated node j IjExpression, interval is [0,1], t IjBe worth more big, the assessment node i more high to the trusting degree of evaluated node j;
Trust vector T: trust the definition of vector based on fuzzy set theory.The trusted degree of node is divided into " insincere ", " uncertain ", " more credible " and " definitely credible " four ranks; Domain at node credibility marks off and four fuzzy subset L that rank is corresponding T1, L T2, L T3And L T4, and set up corresponding membership function μ T1(t), μ T2(t), μ T3(t) and μ T4(t); Consider the restriction of node resource, membership function adopts triangle or trapezoidal function form; Then the vector representation of node trust is T=(v 1, v 2, v 3, v 4), the individual component v of k (k=1,2,3,4) of vector kThe expression node is to the degree of membership of k level of trust; Among the present invention, DT, IT and CT represent respectively to assess node to the direct trust vector of evaluated node, trust vector sum indirectly and comprehensively trust vector; If the assessment node i is to the confidence level t of evaluated node j Ij=t *, then assess node i to the vectorial DT of direct trust of evaluated node j IjT1(t *), μ T2(t *), μ T3(t *), μ T4(t *));
A kind of wireless sensor network trust evaluating method based on fuzzy logic of the present invention, the assessment node is realized by following steps to the trust evaluation flow process of evaluated node as shown in Figure 1:
Step 1: directly trusting of the evaluated node of assessment node initializing is vectorial, and concrete grammar is:
Owing to lack prior information, the assessment node i can't be determined the trusted degree of evaluated node j fully, and the component assignment that therefore will directly trust corresponding " uncertain " level of trust in the vector is 1, and other component assignment is 0, then directly trusts the initial value of vector DT ij 0 = ( 0,1,0,0 ) .
Step 2: the assessment node use fuzzy reasoning method be updated periodically evaluated node directly trust vector flow process as shown in Figure 2, concrete steps are:
(1) establishing the assessment node i constantly finishes 0 evaluated node j is directly trusted vectorial DT IjInitialization, then assess node i and observe the network behavior of evaluated node j is observed to (l+1) τ period (l 〉=0, τ is the update cycle of directly trusting vector) at l τ, and add up evaluated node j trust-factor γ constantly at (l+1) τ 1, γ 2..., γ mThe changes delta γ of (trust-factor of establishing node has m, and initial value is 0) 1, Δ γ 2..., Δ γ mThe assessment node i adopts the communication pattern that mixes reception by the observation of monitor channel realization to evaluated node j network behavior;
(2) (l+1) τ constantly, the assessment node i dynamically arranges corresponding renewal weight according to the variation tendency of evaluated node j trust-factor, establishes trust-factor γ s(s=1,2 ..., m) be changed to Δ γ s, then it upgrades weights W sValue is:
Figure G2009102442759D00062
0<W wherein L<<W H<1;
(3) the assessment node i is upgraded all trust-factor values of evaluated node j:
γ s l + 1 = ( 1 - W i ) × γ s l + W s × Δ γ s - - - ( 2 )
Wherein, γ s lAnd γ s L+1Be respectively l τ and (l+1) the τ trust-factor value of evaluated node j constantly;
(4) the assessment node i is according to γ 1 L+1, γ 2 L+1..., γ 3 L+1, fuzzy reasoning is from the confidence level t to evaluated node j in (l+1) τ moment Ij L+1, and with t Ij L+1The membership function of each level of trust correspondence of substitution, can obtain assessing node i to evaluated node j at (l+1) τ vectorial DT of direct trust constantly Ij L+1:
DT ij l + 1 = ( μ T 1 ( t ij l + 1 ) , μ T 2 ( t ij l + 1 ) , μ T 3 ( t ij l + 1 ) , μ T 4 ( t ij l + 1 ) ) - - - ( 3 )
Wherein, the assessment node is according to the trust-factor value of evaluated node, the principle of the evaluated node credibility of fuzzy reasoning as shown in Figure 3, concrete grammar is:
1. according to the fuzzy inference rule of node credibility, the assessment node i is extracted the fuzzy implication relation R between trust-factor and the node credibility γ-t, be specially:
A. fuzzy inference rule is set up well before trust evaluation in advance, and concrete method for building up is:
At first, with trust-factor γ s(s=1,2 ..., m) be divided into " bad ", " generally " and " good " be totally three good and bad ranks, and set up corresponding fuzzy subset r at its domain S, 1, r S, 2, r S, 3And membership function μ Rs, 1s), μ Rs, 1s), μ Rs, 1s); Consider the restriction of node resource, membership function adopts triangle or trapezoidal function form;
Secondly, according to general knowledge and the experience of trusting reasoning, (Q=3 builds together to set up the fuzzy inference rule of node credibility mThe bar rule), the standard of foundation is:
When arbitrary trust-factor was " bad ", then the confidence level of node was " insincere ";
When the trust-factor of minority is " good ", and when not having trust-factor to be " bad ", then the confidence level of node is " uncertain ";
When most of trust-factor are " good ", and when not having trust-factor to be " bad ", then the confidence level of node is " more credible ";
When all trust-factor were " good ", then the confidence level of node was " definitely credible ";
B. assess node according to fuzzy inference rule, extract fuzzy implication relation R between trust-factor and the node credibility γ-tConcrete grammar be:
At first, the implication of extracting under the wall scroll fuzzy rule concerns T α(α=1,2 ..., Q):
Figure G2009102442759D00073
Wherein, μ R1 α1), μ R2 α2) ..., μ Rm αm) be other membership function of the good and bad level of each trust-factor under the α bar fuzzy rule, μ T α(t) be the membership function of α bar fuzzy rule lower node level of trust;
Secondly, the implication relation under all fuzzy rules is carried out comprehensively obtaining implication relation R γ-t:
Figure G2009102442759D00074
2. assess node i with the trust-factor actual value γ of evaluated node j 1 *, γ 2 *..., γ m *With R γ-tIt is synthetic to carry out reasoning, obtains the fuzzy output μ of node credibility T *(t):
3. assessing node i utilizes gravity model appoach with μ T *(t) the confidence level t to evaluated node j is tried to achieve in reverse gelatinization Ij:
t ij = COG = ∫ μ T * μ T * ( t ) · tdt / ∫ μ T * μ T * ( t ) dt - - - ( 7 )
Step 3: when needs carried out network cooperation with evaluated node, the assessment node was collected recommended node to the principle of the indirect trust vector of evaluated node as shown in Figure 4, and concrete grammar is:
When the assessment node need carry out network cooperation with evaluated node, broadcast the querying command that evaluated node is trusted vector indirectly towards periphery; Recommended node is after receiving querying command, and self is vectorial as trusting vector indirectly to directly trusting of assessment node, sends to the assessment node; Here, recommended node can only be the common neighbor node of assessment node and evaluated node.
Step 4: the assessment node is comprehensive weight with the confidence level of recommended node, will trust vector indirectly and synthesize with direct trust vector, obtains the comprehensive trust vector of evaluated node, and concrete grammar is:
If the assessment node i receives the individual recommended node of p (p 〉=0) to the indirect trust vector IT of evaluated node j 1j, IT 2j..., IT PjThe assessment node i is with self confidence level t to these recommended nodes I1, t I2..., t IpBe comprehensive weight, this p is trusted vector indirectly and directly trust vectorial DT IjSynthesize, calculate the vectorial CT of comprehensive trust to evaluated node j Ij:
CT ij = DT ij + Σ u = 1 p t iu · IT uj 1 + Σ u = 1 p t iu - - - ( 8 )
Step 5: the assessment node is vectorial according to comprehensive trusts of evaluated node, judges the level of trust of evaluated node, adjusts self and evaluated internodal network cooperation behavior flexibly, and concrete grammar is:
The assessment node i will comprehensively be trusted vectorial CT IjThe middle corresponding level of trust of largest component is as the level of trust under the evaluated node j; According to the level of trust of evaluated node j, whether the assessment node i determines the standard of carrying out network cooperation with evaluated node j to be: if evaluated node j belongs to " credible anything but " rank, then assess the node i refusal and cooperate with it; If evaluated node j belongs to " uncertain " rank, then assess node i and only carry out the lower network cooperation of risk with it; If evaluated node j belongs to " more credible " rank, then assess node and carry out the general network cooperation of risk with it; If evaluated node j belongs to " definitely credible " rank, then assess node i is carried out any risk with it network cooperation.
Eventually the above, the present invention proposes a kind of wireless sensor network trust evaluating method based on fuzzy theory, provided the vector form definition of node trust value based on fuzzy set theory, utilize fuzzy reasoning method to quantize node and directly trust vector, and by direct, indirect comprehensive trust value of trusting the synthetic computing node of weighting of vector; Simulated and trusted the subjective cognitive process of deriving, had stronger versatility, and have higher sensitivity and accuracy than conventional method.
It should be noted last that, above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although with reference to preferred embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that, can make amendment or be equal to replacement technical scheme of the present invention, and not break away from the spirit and scope of technical solution of the present invention.

Claims (1)

1. the wireless sensor network trust evaluating method based on fuzzy logic adopts distributed algorithm, requires the assessment that adjacent node is trusted mutually in the network, and the main body of assessment is called the assessment node, and object is called evaluated node;
Trust value to node adopts confidence level and trusts two kinds of representations of vector, specifically is defined as:
If node j is the neighbor node of node i, node i is carried out trust evaluation to node j; Wherein, i and j represent the ID of node in the network, are natural number;
Confidence level t: the assessment node i is to the confidence level t of evaluated node j IjExpression, interval is [0,1], t IjBe worth more big, the assessment node i more high to the trusting degree of evaluated node j;
Trust vector T: trust the definition of vector based on fuzzy set theory; The trusted degree of node is divided into " insincere ", " uncertain ", " more credible " and " definitely credible " four ranks; Domain at node credibility marks off and four fuzzy subset L that rank is corresponding T1, L T2, L T3And L T4, and set up corresponding membership function μ T1(t), μ T2(t), μ T3(t) and μ T4(t); Consider the restriction of node resource, membership function adopts triangle or trapezoidal function form; Then the vector representation of node trust is T=(v 1, v 2, v 3, v 4), k component v of vector kThe expression node is to the degree of membership of k level of trust; Wherein, k=1,2,3,4; DT, IT and CT represent respectively to assess node to the direct trust vector of evaluated node, trust vector sum indirectly and comprehensively trust vector; If the assessment node i is to the confidence level t of evaluated node j Ij=t *, then assess node i to the vectorial DT of direct trust of evaluated node j Ij=(μ T1(t *), μ T2(t *), μ T3(t *), μ T4(t *));
It is characterized in that: the concrete steps of this appraisal procedure are as follows:
Step 1: directly trusting of the evaluated node of assessment node initializing is vectorial, and concrete grammar is:
Owing to lack prior information, the assessment node i can't be determined the confidence level of evaluated node j fully, and the component assignment that therefore will directly trust corresponding " uncertain " level of trust in the vector is 1, and other component assignment is 0, then directly trusts the initial value of vector DT ij 0 = ( 0,1,0,0 ) ;
Step 2: the assessment node uses fuzzy reasoning method to be updated periodically the direct trust vector of evaluated node, and the concrete practice is:
(1) establishing the assessment node i constantly finishes 0 evaluated node j is directly trusted vectorial DT IjInitialization, then assess node i and observe the network behavior of evaluated node j at l τ to (l+1) τ period, l 〉=0 wherein, τ is the update cycle of directly trusting vector, and adds up evaluated node j trust-factor constantly at (l+1) τ
Figure FDA00002806649500012
Variation
Figure FDA00002806649500013
Wherein, the trust-factor of node j has m, and the initial value of each trust-factor is 0; The assessment node i adopts the communication pattern that mixes reception by the observation of monitor channel realization to evaluated node j network behavior;
(2) (l+1) τ constantly, the assessment node i dynamically arranges corresponding renewal weight according to the variation tendency of evaluated node j trust-factor, establishes trust-factor
Figure FDA00002806649500014
Be changed to S=1 wherein, 2 ..., m; Then it upgrades weights W sValue is:
Figure FDA00002806649500016
Wherein, 0<W L<<W H<1;
(3) the assessment node i is upgraded all trust-factor values of evaluated node j:
γ s l + 1 = ( 1 - W s ) × γ s l + W s × Δ γ s - - - ( 2 )
Wherein,
Figure FDA00002806649500022
With
Figure FDA00002806649500023
Be respectively l τ and (l+1) the τ trust-factor value of evaluated node j constantly;
(4) assessment node i basis
Figure FDA00002806649500024
Fuzzy reasoning is from the confidence level to evaluated node j in (l+1) τ moment
Figure FDA00002806649500025
And will
Figure FDA00002806649500026
The membership function of each level of trust correspondence of substitution, it is vectorial in (l+1) τ direct trust constantly to evaluated node j to obtain assessing node i
Figure FDA00002806649500027
DT ij l + 1 = ( μ T 1 ( t ij l + 1 ) , μ T 2 ( t ij l + 1 ) , μ T 3 ( t ij l + 1 ) , μ T 4 ( t ij l + 1 ) ) - - - ( 3 )
Wherein, the assessment node i is according to the trust-factor value of evaluated node j, and fuzzy reasoning self to the concrete grammar of evaluated node j confidence level is:
1. assess node i and before trust evaluation, set up the fuzzy inference rule of node credibility in advance, and the fuzzy implication relation between extraction trust-factor and the node credibility
Figure FDA00002806649500029
Be specially:
A. the fuzzy inference rule of node credibility must be set up before trust evaluation in advance, and concrete method for building up is:
At first, with trust-factor
Figure FDA000028066495000210
Be divided into " bad ", " generally " and " good " be totally three good and bad ranks, and set up corresponding fuzzy subset r at its domain S, 1, r S, 2, r S, 3And membership function Consider the restriction of node resource, membership function adopts triangle or trapezoidal function form;
Secondly, according to general knowledge and the experience of trusting reasoning, set up the fuzzy inference rule of node credibility, Q=3 builds together mThe bar rule, the standard of foundation is:
When arbitrary trust-factor was " bad ", then the confidence level of node was " insincere ";
When the trust-factor of minority is " good ", and when not having trust-factor to be " bad ", then the confidence level of node is " uncertain ";
When most of trust-factor are " good ", and when not having trust-factor to be " bad ", then the confidence level of node is " more credible ";
When all trust-factor were " good ", then the confidence level of node was " definitely credible ";
B. assess node i according to fuzzy inference rule, extract fuzzy implication relation between trust-factor and the node credibility
Figure FDA000028066495000212
Concrete grammar is:
At first, the implication of extracting under the wall scroll fuzzy rule concerns R α, α=1,2 ..., Q
R α = μ r 1 α ( γ 1 ) ^ μ r 2 α ( γ 2 ) ^ . . . ^ μ rm α ( γ m ) ^ μ T α ( t ) - - - ( 4 )
Wherein, Be other membership function of the good and bad level of each trust-factor under the α bar fuzzy rule,
Figure FDA000028066495000215
It is the membership function of α bar fuzzy rule lower node level of trust;
Secondly, the implication relation under all fuzzy rules is carried out comprehensively obtaining implication relation
Figure FDA000028066495000216
2. assess node i with the trust-factor value of evaluated node j
Figure FDA000028066495000218
With
Figure FDA000028066495000219
It is synthetic to carry out reasoning, obtains the fuzzy output of node credibility
Figure FDA000028066495000220
Figure FDA00002806649500031
3. assessing node i utilizes gravity model appoach to incite somebody to action
Figure FDA00002806649500032
The confidence level t to evaluated node j is tried to achieve in the reverse gelatinization Ij:
t ij = COG = ∫ μ T * μ T * ( t ) · tdt / ∫ μ T * μ T * ( t ) dt - - - ( 7 )
Step 3: when needs carried out network cooperation with evaluated node, the assessment node was collected recommended node to the indirect trust vector of evaluated node, and concrete grammar is:
When the assessment node i need determine whether to carry out network cooperation with evaluated node j, broadcast the querying command that evaluated node is trusted vector indirectly towards periphery; Recommended node is after receiving querying command, and self is vectorial as trusting vector indirectly to directly trusting of assessment node j, sends to the assessment node i; Here, recommended node can only be the common neighbor node of assessment node and evaluated node;
Step 4: the assessment node is comprehensive weight with the confidence level of recommended node, and indirect trust vector and direct trust vector are synthesized, and obtains the comprehensive trust vector of evaluated node, and concrete grammar is:
If the assessment node i receives p recommended node to the indirect trust vector IT of evaluated node j 1j, IT 2j..., IT PjWherein, p 〉=0; The assessment node i is with self confidence level t to these recommended nodes I1, t I2..., t IpBe comprehensive weight, this p is trusted vector indirectly and directly trust vectorial DT IjSynthesize, calculate the vectorial CT of comprehensive trust to evaluated node j Ij:
CT ij = DT ij + Σ u = 1 p t iu · IT uj 1 + Σ u = 1 p t iu - - - ( 8 )
Step 5: the assessment node is vectorial according to comprehensive trusts of evaluated node, judges the level of trust of evaluated node, and adjusts network cooperation behavior between self and evaluated node flexibly, and concrete grammar is:
The assessment node i will comprehensively be trusted vectorial CT IjThe middle corresponding level of trust of largest component is as the level of trust under the evaluated node j; According to the level of trust of evaluated node j, whether the assessment node i determines the standard of carrying out network cooperation with evaluated node j to be: if evaluated node j belongs to " credible anything but " rank, then assess the node i refusal and cooperate with it; If evaluated node j belongs to " uncertain " rank, then assess node i and only carry out the lower network cooperation of risk with it; If evaluated node j belongs to " more credible " rank, then assess node and carry out the general network cooperation of risk with it; If evaluated node j belongs to " definitely credible " rank, then assess node i is carried out any risk with it network cooperation.
CN 200910244275 2009-12-30 2009-12-30 Wireless sensor network trust evaluating method based on fuzzy logic Expired - Fee Related CN101765231B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910244275 CN101765231B (en) 2009-12-30 2009-12-30 Wireless sensor network trust evaluating method based on fuzzy logic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910244275 CN101765231B (en) 2009-12-30 2009-12-30 Wireless sensor network trust evaluating method based on fuzzy logic

Publications (2)

Publication Number Publication Date
CN101765231A CN101765231A (en) 2010-06-30
CN101765231B true CN101765231B (en) 2013-07-03

Family

ID=42496176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910244275 Expired - Fee Related CN101765231B (en) 2009-12-30 2009-12-30 Wireless sensor network trust evaluating method based on fuzzy logic

Country Status (1)

Country Link
CN (1) CN101765231B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012095860A2 (en) * 2011-01-13 2012-07-19 Tata Consultancy Services Limite Method and system for trust management in distributed computing systems
CN102333307B (en) * 2011-09-28 2013-01-09 北京航空航天大学 Wireless sensor network (WSN) trust evaluation method based on subjective belief
CN103139803B (en) * 2013-02-07 2016-03-23 南京邮电大学 A kind of based on multifactorial wireless sensor network trust administrative model
CN104123328A (en) * 2013-04-28 2014-10-29 北京千橡网景科技发展有限公司 Method and device used for inhibiting spam comments in website
WO2015024173A1 (en) * 2013-08-20 2015-02-26 Nokia Corporation A method and apparatus for privacy-enhanced evidence evaluation
CN104009992B (en) * 2014-05-29 2017-06-06 安徽师范大学 A kind of trust evaluation system constituting method based on fuzzy control
CN104092564B (en) * 2014-06-23 2017-06-20 北京航空航天大学 A kind of cloud storage service credit assessment method
CN104410981B (en) * 2014-11-06 2017-12-29 广东工业大学 Beaconing nodes credibility evaluation method in a kind of wireless sensor network
CN105915545A (en) * 2016-06-12 2016-08-31 天津理工大学 Trust measurement method oriented to application environment of mobile internet of things
CN106411854B (en) * 2016-09-06 2019-01-29 中国电子技术标准化研究院 A kind of network security risk evaluation method based on fuzzy Bayes
CN108966210A (en) * 2018-06-22 2018-12-07 西京学院 A kind of design method of wireless network Trust Valuation Model
CN109299377B (en) * 2018-10-26 2020-11-13 东软集团股份有限公司 Article recommendation method and device, readable storage medium and electronic equipment
CN109246155A (en) * 2018-12-07 2019-01-18 重庆邮电大学 A method of attack is trusted in the wireless sensor network defence based on trust management
CN109548029B (en) * 2019-01-09 2021-10-22 重庆邮电大学 Two-stage node trust evaluation method for wireless sensor network
CN112099057B (en) * 2020-09-17 2024-03-05 重庆大学 Double-threshold cooperation GNSS interference detection algorithm based on fuzzy logic
CN112866283A (en) * 2021-02-20 2021-05-28 国网重庆市电力公司电力科学研究院 Fuzzy evidence theory-based Internet of things node evaluation method
CN114245384B (en) * 2021-11-12 2024-02-02 黑龙江两极科技有限公司 Sensor network malicious node detection method based on generation countermeasure network
CN116546498B (en) * 2023-05-30 2024-01-26 哈尔滨工程大学 Underwater wireless sensor network trust evaluation method based on variable membership function

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101442824A (en) * 2008-12-23 2009-05-27 西安交通大学 Method for calculating wireless sensor network credit value based on unreliable channel

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101442824A (en) * 2008-12-23 2009-05-27 西安交通大学 Method for calculating wireless sensor network credit value based on unreliable channel

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
A Heider-theory Based Reputation Framework for WSN;Xin He等;《High Performance Computing and Communications, 2008》;20080927;全文 *
Xin He等.A Heider-theory Based Reputation Framework for WSN.《High Performance Computing and Communications, 2008》.2008,
唐文 等.基于模糊逻辑的主观信任管理模型研究.《计算机研究与发展》.2005,(第10期),
基于模糊逻辑的主观信任管理模型研究;唐文 等;《计算机研究与发展》;20051031(第10期);全文 *
无线传感器网络中的信任管理;荆琦 等;《软件学报》;20080731(第7期);全文 *
荆琦 等.无线传感器网络中的信任管理.《软件学报》.2008,(第7期),

Also Published As

Publication number Publication date
CN101765231A (en) 2010-06-30

Similar Documents

Publication Publication Date Title
CN101765231B (en) Wireless sensor network trust evaluating method based on fuzzy logic
Otoum et al. Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures
CN106341414B (en) A kind of multi-step attack safety situation evaluation method based on Bayesian network
Shu et al. Wireless sensor network lifetime analysis using interval type-2 fuzzy logic systems
CN104506385A (en) Software defined network security situation assessment method
CN101835158A (en) Sensor network trust evaluation method based on node behaviors and D-S evidence theory
CN106899435A (en) A kind of complex attack identification technology towards wireless invasive detecting system
Leau et al. Network security situation prediction: a review and discussion
CN105357063A (en) Cyberspace security situation real-time detection method
CN101282243A (en) Method for recognizing distributed amalgamation of wireless sensor network
CN101442824A (en) Method for calculating wireless sensor network credit value based on unreliable channel
CN104539601A (en) Reliability analysis method and system for dynamic network attack process
CN101977395A (en) Node trust management system in wireless sensor network
CN106570582A (en) Method and system for building transmission line dancing tripping risk prediction network model
Liu et al. Modelling complex large scale systems using object oriented Bayesian networks (OOBN)
Wang et al. Trust-based data fusion mechanism design in cognitive radio networks
Wang et al. Roof pressure prediction in coal mine based on grey neural network
CN116703304A (en) Goods asset supervision method and system based on Internet of things
CN103957547A (en) Node reputation evaluating method and system for wireless sensor network
Anderson et al. Kullback-Leibler Divergence (KLD) based anomaly detection and monotonic sequence analysis
RU178282U1 (en) Device for monitoring the state of security of military-grade automated control systems
Stelte et al. Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation
CN107895215A (en) The prediction of community network influence power and maximization System and method for based on neutral net
CN116780509A (en) Power grid random scene generation method integrating discrete probability and CGAN
Liang et al. Sensed Signal Strength Forecasting for Wireless Sensors Using Interval Type-2 Fuzzy Logic System.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130703

Termination date: 20141230

EXPY Termination of patent right or utility model