CN101801011A - WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism - Google Patents

WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism Download PDF

Info

Publication number
CN101801011A
CN101801011A CN201010101235A CN201010101235A CN101801011A CN 101801011 A CN101801011 A CN 101801011A CN 201010101235 A CN201010101235 A CN 201010101235A CN 201010101235 A CN201010101235 A CN 201010101235A CN 101801011 A CN101801011 A CN 101801011A
Authority
CN
China
Prior art keywords
node
prestige
credit
wsn
credit evaluating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010101235A
Other languages
Chinese (zh)
Inventor
杨武
王巍
苘大鹏
马兴国
玄世昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Engineering University
Original Assignee
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Engineering University filed Critical Harbin Engineering University
Priority to CN201010101235A priority Critical patent/CN101801011A/en
Publication of CN101801011A publication Critical patent/CN101801011A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides a WSN (Wireless Sensor Network) safety routing method based on a credit evaluating mechanism. The method comprises the following steps of: obtaining the credit factor of a node according to the communication behavior of the node; performing direct credit evaluation on the node based on the credit factor of the node; performing WSN node credit evaluation combining vertical and transverse analysis according to the information of indirect credit of the third-party node, the history credit of the node, and the like; periodically updating the node credit; and selecting route using the credit as a major standard. The invention has overall analysis and accurate evaluation, can effectively identify the malicious nodes in the network, reduce the credit updating frequency and the network energy consumption, prolong the life cycle of the network, reduce the chance for low-credit node to participate routing, lower the damage of malicious node in the network to the network, improve the routing safety, and improve the whole performance of the WSN safety routing via improvement and creation from two aspects of safety and energy validity.

Description

WSN safety routing method based on credit evaluating mechanism
Technical field
What the present invention relates to is a kind of WSN safety routing method and system based on credit evaluating mechanism.
Background technology
Wireless sensor network WSN (Wireless Sensor Networks) combines sensor technology, embedded computing technique, distributed information processing and the communication technology, is widely used in military field, industrial circle, medicine and hygiene fields etc.Various environmental informations in its monitoring in real time, perception, the collection network distributed areas, and these information are handled, send the user who needs these information at last to.
The security threat classification by source that the wireless sensor network route faces mainly contains two kinds: external attack and internaling attack.External attack can effectively be defendd by the cryptosecurity mechanism of routine, but these conventional security mechanisms can't be defendd internaling attack effectively.As an important supplement of cryptosecurity mechanism, credit evaluating mechanism resist internal attack aspect effect remarkable, become defence and internal attack an important means that guarantees routing safety, and be subjected to extensive concern.
WSN safety routing method and systematic research based on credit evaluating mechanism are in starting and exploratory stage at present, as Reputation based Framework for High Integrity Sensor Networks, 2004, the author has designed a kind of credit evaluating method BRSN at resource-constrained wireless sensor network, by a large amount of research with experimental results show that with the communication behavior of bayes rule description node very proper, utilize Bayesian formula that prestige is distributed and Beta distribution carrying out match, the prestige that obtains node is obeyed the Beta distribution well, therefore can be by Beta distribution calculation expectation value being obtained the credit value of node.Trust management in the wireless sensor network, 2008, the author has carried out deep analysis generally to the Prestige Management system under the WSN.A novel reputation model for malicious node detection in wireless sensor network, 2008, the author improves BRSN credit evaluating method, proposed to upgrade the new evaluating method I-BRSN of prestige, promptly strengthened prestige analysis in the horizontal by the indirect prestige of introducing third party's node.The research of wireless sensor network security Routing Protocol, 2009, the author introduces I-BRSN credit evaluating method and has proposed E-GEAR (Enhanced-GEAR) safety routing method on WSN geographical position Routing Protocol GEAR (Geographic and Energy Aware Routing) basis, mainly improved the performance based on the WSN safety routing method of credit evaluating mechanism from the horizontal analysis aspect of strengthening credit evaluating mechanism.At present, some WSN safety routing method and systems of proposing based on credit evaluating mechanism, the credit evaluating mechanism that uses just carries out credit evaluating according to the observed information of node self, perhaps just considered horizontal analysis, above method is used for the node credit evaluating amount of information deficiency of WSN safety routing method and system, and analysis is comprehensive inadequately, has the defective that evaluation and test is comprehensive even judge by accident.Therefore, WSN safety routing method and the system based on credit evaluating mechanism also requires further improvement perfect.
Summary of the invention
The object of the present invention is to provide and a kind ofly can improve internet security, reduce the network energy consumption, prolong the WSN safety routing method based on credit evaluating mechanism of network lifecycle.
The object of the present invention is achieved like this:
1) node prestige factor is obtained, and obtains the prestige factor of node according to the communication behavior of node;
2) the direct credit evaluating of node is the direct credit evaluating that node is carried out on the basis with the prestige factor of node;
3) node prestige vertical and horizontal are analyzed, and carry out the WSN node credit evaluating that the vertical and horizontal analysis combines according to the indirect prestige of third party's node and the information such as historical prestige of node;
4) node prestige is upgraded, and periodically updates node prestige;
5) WSN safety routing method, method for routing carries out route selection with prestige as a main standard.
The present invention can also comprise:
1, described communication behavior according to the node method of obtaining the prestige factor of node comprises: 1) a plurality of nodes are confirmed same packet; 2) according to the situation of confirmation statistics quilt evaluation and test node for data forwarding bag, node for data forwarding bag situation is the prestige factor of node.
2, described prestige factor with node is that the method that the direct credit evaluating of node is carried out on the basis comprises: 1) based on the prestige factor of node, adopt Beta to distribute to describe prestige to distribute; 2) calculate the direct credit value that Beta distribution desired value obtains node.
3, described indirect prestige and the information such as historical prestige of the node method of carrying out the WSN node credit evaluating that the vertical and horizontal analysis combines according to third party's node comprises: 1) in conjunction with the direct indirect prestige of prestige and third party's node node is carried out horizontal analysis, obtain the current prestige of node; 2) carry out vertical analysis in conjunction with the historical prestige in current prestige and the node whole life, the vertical and horizontal analysis combines and obtains a comprehensive WSN node prestige.
4, the described method that periodically updates node prestige comprises: 1) start node prestige and upgrade timer; 2) prestige update time to after carry out the prestige analysis that the vertical and horizontal analysis combines, new node prestige more; 3) return the prestige update mode, three kinds of return states are arranged: the prestige update cycle, constant continuation was regularly upgraded; Revising the update cycle regularly upgrades; Cancellation prestige is upgraded.
5, the described method for routing method of carrying out route selection as a main standard with prestige comprises: 1) calculate the integration objective cost of neighbor node, the factor that the integration objective cost is considered mainly contains: distance, energy, prestige etc.; 2) select the route next jump node, in neighbor node, select the next-hop node of the node of integration objective cost minimum, set up the network route as route.
The technical problem to be solved in the present invention is the deficiency that exists based on the WSN safety routing method and the system of credit evaluating mechanism at existing, a kind of new WSN safety routing method and the system that propose based on credit evaluating mechanism, can reach credit evaluating more comprehensively accurately, the purpose that the network energy consumption is littler, routing security is higher.
The present invention solves the problems of the technologies described above the technical scheme that is adopted: come the malicious node in the network is carried out effective recognition with the WSN node credit evaluating model that introducing vertical and horizontal analysis in the system combines at the WSN safety routing method, improve the fail safe of method for routing and system; Simultaneously the prestige update mechanism of node in the route method and system is improved, changed traditional trigger-type prestige update mechanism, adopt periodically prestige method for updating, reduce the network energy consumption, prolong the life cycle of network.
Credit evaluating performance and the improvement prestige update mechanism of the present invention from strengthening method for routing and system proposed new WSN safety routing method and system based on credit evaluating mechanism.Through experimental verification, this technology can solve existing based on the WSN safety routing method of credit evaluating mechanism and the deficiency of system well.
The present invention is based on following problem and designs:
Compare with legacy network, WSN has the advantages that power supply energy is limited, computing capability weak, communication capacity is poor, node is many and have a very wide distribution, and WSN method for routing and system also are faced with internaling attack of difficult defence, this all is that the research and the design of WSN safety routing method brought difficulty, therefore needs a kind of little, safe WSN safety routing method based on credit evaluating mechanism of energy consumption that is fit to wireless sensor network more.
In order to improve energy efficiency and fail safe effectively, new WSN safety routing method and system based on credit evaluating mechanism have been proposed based on the WSN safety routing method of credit evaluating mechanism.At first, obtain the prestige factor of node according to the communication behavior of node; Secondly, based on the prestige factor of node, the direct prestige of node is evaluated and tested; Then, carry out comprehensive vertical and horizontal analysis, node prestige is carried out comprehensive comprehensively evaluation and test in conjunction with the indirect prestige of third party's node and the historical prestige of node self; Simultaneously,,, the prestige update mechanism is improved, adopted the prestige update mode that periodically updates in conjunction with the characteristics that the vertical and horizontal analysis combines for reducing the energy consumption of node in the credit evaluating process; At last,, select the next-hop node of route, set up the network route with the prestige of node a principal element as route selection.
Advantage applies of the present invention exists:
(1) based on the WSN safety routing method and the security of system height of credit evaluating mechanism
WSN safety routing method based on credit evaluating mechanism is safe, mainly by introducing in method for routing vertically and walking crosswise and analyze the fail safe that the WSN node credit evaluating model that combines improves method for routing.Vertically and walk crosswise the not only current prestige factor of reference node self of the WSN node credit evaluating model that combines of analyzing, simultaneously also with reference to the indirect prestige of third party's node and the historical prestige of node self, carry out the credit evaluating that the vertical and horizontal analysis combines, the reference information abundance, analyze comprehensively, evaluation result is accurate, has guaranteed the effective identification of route to malicious node, has improved security of routing.
(2) WSN safety routing method and the system energy consumption based on credit evaluating mechanism is little
WSN safety routing method and system energy consumption based on credit evaluating mechanism are little, are applicable to the wireless sensor network of resource-constrained.Introduced wireless sensor network in the narration of front and had that power supply energy is limited, a little less than the computing capability, communication capacity is poor, node is many and the characteristics that have a very wide distribution, therefore the energy consumption problem of a good WSN safety routing method is a problem that can not be ignored.At energy consumption problem, should improve aspect the prestige renewal based on the WSN safety routing method and the system of credit evaluating mechanism, the mechanism that employing periodically updates, reduced the calculation times of prestige widely, reduce the network energy consumption, made this method for routing can be applicable to the wireless sensor network of finite energy better.
Description of drawings
Fig. 1 is based on the WSN safety routing method and the system construction drawing of credit evaluating mechanism;
Fig. 2 is prestige update algorithm block diagram periodically;
Fig. 3 is based on WSN safety routing method and system's routing algorithm block diagram of credit evaluating mechanism;
Fig. 4 VH-BRSN prestige distribution comparison diagram;
The unexpected packet loss node of Fig. 5 prestige distribution comparison diagram;
Fig. 6 VH-GEAR False Rate comparison diagram;
Fig. 7 VH-GEAR discrimination comparison diagram;
Fig. 8 VH-GEAR specific energy consumption comparison diagram.
Embodiment
For example the present invention is done more detailed description below in conjunction with accompanying drawing:
1) based on the WSN safety routing method and the system of credit evaluating mechanism
WSN safety routing method and system based on credit evaluating mechanism proposed by the invention, introduce the WSN node credit evaluating method that the vertical and horizontal analysis combines, the WSN node is carried out comprehensive comprehensively credit evaluating, reduce the chance that low prestige node participates in route, improve security of routing.The credit evaluating method of using in the method for routing mainly is made up of two stages: the phase I: direct credit evaluating: mainly the prestige factor of obtaining according to node self by the evaluation and test node is carried out direct credit evaluating; Second stage: the comprehensive credit evaluating that the vertical and horizontal analysis combines, the direct prestige of this stage reference node, the indirect prestige of third party's node and the historical prestige of node carry out comprehensive comprehensively analysis evaluation and test, obtain a node credit value more accurately.The node prestige that WSN safety routing method and the system based on credit evaluating mechanism that proposes obtains with credit evaluating is a major consideration of routing, selects the next-hop node of route, sets up route.Based on the structure chart of the WSN safety routing method of credit evaluating mechanism and system as shown in Figure 1.
2) the prestige factor is obtained
Node prestige factor is obtained, obtain the prestige factor of node according to the communication behavior of node, mainly the mode of confirming by multiple spot is monitored with this prestige factor as this node the communication behavior of node, and mainly finish by two steps: 1) a plurality of nodes are confirmed same packet; 2) according to the situation of confirmation statistics quilt evaluation and test node for data forwarding bag, node for data forwarding bag situation is the prestige factor of node.
3) direct credit evaluating
The direct credit evaluating of node is the direct credit evaluating that node is carried out on the basis with the prestige factor of node, adopts Beta to distribute to describe prestige to distribute.A large amount of research and experiment show that the communication behavior of using the bayes rule description node is very proper, utilize Bayesian formula that the prestige distribution is distributed with Beta and carry out match, and the prestige that obtains node is obeyed the Beta distribution well.Thus, directly credit evaluating can be by calculating the direct credit evaluating value that Beta distribution desired value obtains node.
Definition: α IjNormal behaviour number of times for the node i acquisition about node j; β IjBe abnormal behaviour number of times, C IjBe the prestige distribution of node i about node j, then C IjBe distributed as:
C ij~Beta(α ij+1,β ij+1) (1)
Directly credit evaluating obtains the direct prestige DR of node by the statistical expection of prestige distribution Ij, that is:
DR ij = E ( C ij ) = E ( Beta ( α ij + 1 , β ij + 1 ) ) = α ij + 1 α ij + β ij + 2 - - - ( 2 )
4) the WSN node credit evaluating that combines of vertical and horizontal analysis
Comprehensive WSN node credit evaluating is carried out in the analysis of node prestige vertical and horizontal, take all factors into consideration the direct prestige of node, the indirect prestige of third party's node and the historical prestige of node are are comprehensively evaluated and tested analysis, obtain final node prestige NR (Node Reputation).At first, node is carried out horizontal analysis, obtain the current prestige CR (Current Reputation) of node in conjunction with the direct indirect prestige IR (Indirect Reputation) of prestige DR (Direct Reputation) and third party's node; Then, carry out vertical analysis, obtain a comprehensive node prestige NR (Node Reputation) after the vertical and horizontal analysis combines in conjunction with the historical prestige HR in current prestige CR and the node whole life (History Reputation).
Horizontal analysis is calculated CR based on DR and IR.For preventing the prestige deception of third party's node, directly the weight of prestige will be higher than the weight of indirect prestige in the horizontal analysis process, and promptly direct prestige weight is greater than 0.5 and less than 1.
Definition: DR IjBe the direct prestige of node i to node j evaluation and test; IR IjBe the indirect prestige of third party's node k to node j evaluation and test; w dAnd w iBe respectively the weight of direct prestige and indirect prestige; CR IjThe current prestige that obtains after to node j horizontal analysis for node i, then:
CR ij = w d * DR ij + w i * Σ k = 1 n IR kj k ( w d + w i = 1 , w d > w i ) - - - ( 3 )
Vertical analysis is carried out the periodicity analysis-by-synthesis in conjunction with CR and the historical prestige HR of node in whole life that horizontal analysis obtains, and the major technique that vertical analysis is used is index weighted moving average EWMA (Exponentially Weighted Moving Average).
EWMA is a low pass filter from the signal processing angle analysis, by control weight value, rejects short-term fluctuation, keeps long-run development trend, and the smoothed version of signal is provided.From the probability angle analysis is a kind of desirable maximal possibility estimation, adopts weight factor α data to be estimated current estimated value is determined jointly by a preceding estimated value and current observed value.The weight of EWMA (0<α<1) has determined that EWMA follows the tracks of the ability that real data changes suddenly, and is promptly ageing, along with the increase of α, and the ageing enhancing of credit evaluating, on the contrary die down; On the other hand, because the existence of α, EWMA also shows the ability of certain absorption instantaneous mutation, and this ability is called stationarity, and obviously along with α reduces, the stationarity of estimator strengthens, otherwise reduces.These character are the theoretical foundation of node credit evaluating, for providing guarantee based on the malicious node in the effective recognition network of WSN safety routing method and system of credit evaluating mechanism.
Definition: α is current prestige weight; The EWMA value of time t is EWMA (t); The prestige measured value of time t is y tThe prestige sequence of node is y ∈ { y 0, y 1..., y t..., y n; Then when t 〉=2, the node prestige NR that the vertical and horizontal analysis combines and obtains, promptly EWMA (t) is:
EWMA ( t ) = α * y t + ( 1 - α ) * EWMA ( t - 1 ) , t ∈ { 2,3 , · · · , n } - - - ( 4 )
EWMA is the predicted value during as t+1 with EWMA (t), that is:
y t + 1 ^ = EWMA ( t ) - - - ( 5 )
Thus, can get node in the general expression formula of next time prestige predicted value is:
y t + 1 ^ = α * y t + ( 1 - α ) * y t ^ - - - ( 6 )
The WSN node credit evaluating method that the vertical and horizontal analysis combines has been carried out multianalysis to node prestige, remedied the detection defective of more present evaluating methods aspect incomplete deletion sexual assault, this evaluating method shows that the character of long-term trend has guaranteed the identification of node type, the characteristic that smooths short-term fluctuation has reduced the erroneous judgement that legal node causes because of unexpected packet loss, improved the performance of credit evaluating, thereby improved based on the WSN safety routing method of this credit evaluating mechanism and the fail safe of system to the malicious node evaluation and test.
5) periodically prestige is upgraded
Wireless sensor network has that power supply energy is limited, a little less than the computing capability, the characteristics that communication capacity is poor, node is many and have a very wide distribution, the safety routing method and the system that can be advantageously applied to wireless sensor network, energy consumption problem is one at first needs the problem that solved.At energy consumption problem, WSN safety routing method and system based on credit evaluating mechanism are improving aspect the prestige renewal, changed traditional trigger-type update mechanism, adopt periodically prestige update mechanism, reduced the prestige update times, reduced the network energy consumption, prolonged network lifecycle, feasible WSN safety routing method and system based on credit evaluating mechanism can be applicable to wireless sensor network better.
Concrete prestige is upgraded by the renewal of the prestige in neighbours' entity timer and is regularly triggered by the cycle, when each neighbor node is found by local node and added, all can be that this neighbours' entity is installed a prestige renewal timer, and start automatically.After timer arrives update time, at first from neighbours' entity, obtain the up-to-date information of prestige factor; Then, the prestige object is according to the direct prestige of current prestige factor computing node, subsequently in succession carry out the vertical and horizontal analysis, finally obtain credit rating to these neighbours; At last, prestige is upgraded and is finished, and timer returns.Timer has three kinds of return states to select: the constant continuation of prestige update cycle regularly returns 0; Revise the prestige update cycle and continue regularly, return one greater than amended update cycle of 0; Cancellation is regularly upgraded, and returns one less than 0 number.The algorithm block diagram that periodicity prestige after the improvement is upgraded as shown in Figure 2.
6) WSN safety route selection
WSN safety routing method and system's routing algorithm based on credit evaluating mechanism carry out route selection based on the multiple objective programming principle of optimization, and the comprehensive optimum of taking all factors into consideration a plurality of targets such as node prestige, distance, energy is selected the next-hop node of route.The integration objective formula of routing is:
f(N i,D)=α*d(N i,D)/d(S,D)+
β*s(N i)/e(N i)+(1-α-β)*(1-r(N i)) (7)
F (N i, D) expression neighbor node N iTo the integration objective cost value of destination node D, the scheme of selecting next-hop node in all optional neighbor nodes is for selecting to make function f (N i, D) the node N of integration objective value minimum MinIn formula 7: α is the factor weight apart from cost, and β is the factor weight of energy cost, and (1-alpha-beta) is the factor weight of prestige cost.Function d (N i, D) be used for calculating next hop neighbor node N iTo the distance of destination node D, (S D) is used for calculating the distance of source node S to destination node D to function d.Function s (N i) be used for obtaining the dump energy of next hop neighbor node N, Function e (N i) be the initialization energy of next-hop node N, then s (N i)/e (N i) expression node N iThe energy consumption degree, in order to guarantee the life cycle of node energy consumption balance and route system, should preferentially select the lower node of energy consumption degree.Function r (N i) the next-hop node N that obtains for the WSN node credit evaluating Model Calculation that combines by the analysis based on vertical and horizontal iNode prestige, why use (1-r (N here i)) calculate, be in order to guarantee the consistency of routing optimum, should be with the preferential selection scheme of its less result in integration objective as routing for distance cost and node energy consumption, and node prestige is concerning the route routing is optimized, should select the prestige higher value to improve the fail safe of method for routing and system as far as possible, for keeping compatibility of goals, credit value carry out contraryization, use (1-r (N i)) calculate.
In neighbor list, choose the neighbor node N of destination node D integration objective cost minimum based on the routing algorithm of the WSN safety routing method of credit evaluating mechanism and system MinThe time, if node N iEnergy or the prestige threshold value that is lower than system, then the whole network broadcasting warning message is informed other nodes N in the network iNode energy hangs down threshold value or prestige is low and threshold value, and skips node N iContinue to search next neighbor node; Otherwise calculate this neighbor node N iIntegration objective cost to destination node D.If node N iTo the integration objective cost of destination node D less than former minimum integration objective cost, then with current cost as minimum cost, and to revise the minimum cost node ID be present node ID, i.e. N iOptimum next-hop node N as the method for routing selection MinOtherwise continue to calculate next neighbor node, up to having traveled through all neighbor nodes.The node of last Route Selection integration objective cost minimum is as next-hop node N MinBased on the WSN safety routing method of credit evaluating mechanism and system's routing algorithm block diagram as shown in Figure 3.
7) emulation experiment and interpretation of result
For verify method that this invention proposes based on the WSN safety routing method of credit evaluating mechanism and the feasibility and the validity of system, by NS2 (Network Simulator version 2) emulation platform emulation experiment has been carried out in this invention.For convenience of explanation, WSN safety routing method and the system based on credit evaluating mechanism abbreviates VH-GEAR (Vertical ﹠amp as; Horizontal BRSN), the WSN node credit evaluating method that analysis combines based on vertical and horizontal of VH-GEAR introducing abbreviates VH-BRSN (Vertical ﹠amp as; HorizontalBRSN).Simulation process mainly carries out from following several respects:
(1) VH-BRSN prestige distributes
Comparative analysis malicious node (Malicious Node), legal node (Normal Node), three types of nodes of unexpected packet loss node (Accidental Node) prestige in VH-BRSN credit evaluating model distributes.Emulation duration 1600 seconds, 100 seconds prestige update cycles, malicious node packet loss 80%, the packet loss 80% of unexpected packet loss node, the packet loss duration of unexpected packet loss node 200 seconds (450-650), the current prestige weight of vertical analysis is 0.618.The prestige distribution map of three category nodes after the emulation, as shown in Figure 4.
VH-BRSN credit evaluating model can be found the credit evaluating curve chart of three category nodes from Fig. 4: the prestige of legal node constantly increases with simulation time, tends to be steady in a high position at last; The prestige of malicious node constantly reduces with simulation time, tends to be steady at low level at last; The prestige of unexpected packet loss node in normal period prestige with legal node unanimity, constantly increase with simulation time, when unexpected packet loss, can produce unstable prestige, because the VH-BRSN model has certain stationarity, can smooth short-term fluctuation, so node prestige only has weakening by a small margin, and recover rapidly in the normal back of behavior prestige.VH-BRSN credit evaluating model is followed the difference that distributes according to dissimilar node prestige, can carry out effective recognition to node types in the network.
(2) unexpected packet loss node prestige distributes
The prestige of the unexpected packet loss node of comparative analysis in BRSN, I-BRSN and three kinds of credit evaluating methods of VH-BRSN distributes.Emulation duration 1500 seconds, VH-BRSN prestige analytical cycle 100 seconds, the packet loss 80% of unexpected packet loss node, packet loss duration 200 seconds (450-650), the current prestige weight of VH-BRSN vertical analysis is 0.618.The prestige distribution map of three kinds of credit evaluating methods after the emulation, as shown in Figure 5.
Three kinds of credit evaluating methods of BRSN, I-BRSN and VH-BRSN can visually see to the evaluation and test of unexpected packet loss node from Fig. 5, VH-BRSN is stronger to the tolerance of unexpected packet loss node, smoothed the short-term fluctuation of unexpected packet loss node prestige, it is more level and smooth that prestige is distributed, but do not influence the overall variation trend of prestige, thereby can avoid erroneous judgement to unexpected packet loss node.Steady degree to short-term fluctuation is influenced by the α value, and the more little steady ability of short-term fluctuation to sudden change of α is strong more; Otherwise α big more (near 1) is weak more to the steady ability of short-term fluctuation.
(3) VH-GEAR False Rate
Contrast method for routing VH-GEAR and E-GEAR are to the False Rate of unexpected packet loss node.Emulation duration 1600 seconds, the node number 1 of giving out a contract for a project, receiving node number 4,100 seconds prestige update cycles, malicious node number 5, unexpected packet loss node number [0,3,6 ..., 27,30], unexpected packet loss node packet loss 80%, unexpected packet loss duration 200 seconds (the packet loss time started is indefinite), the current prestige weight 0.618 and 0.8 of VH-GEAR vertical analysis.Two kinds of method for routing to the False Rate of unexpected packet loss node as shown in Figure 6 after the emulation.
From Fig. 6 False Rate comparison diagram as can be seen, VH-GEAR has reduced the False Rate to unexpected packet loss node on the whole, can improve internet security and life cycle.The main cause that False Rate reduces in the VH-GEAR method for routing is to have introduced vertical analysis in the credit evaluating model to have smoothed short-term fluctuation, the principal element that wherein influences False Rate is the weight of vertical analysis, the low more steady effect to prestige of α value is good more, and False Rate is low more; When the α value near 1 the time, VH-GEAR route selection method approaches zero to the reference of historical prestige, this moment, the credit evaluating model of VH-GEAR and E-GEAR was suitable.
(4) VH-GEAR discrimination
Contrast VH-GEAR method for routing and E-GEAR method for routing are to the discrimination of malicious node.Experiment simulation duration 1600 seconds, the node number 1 of giving out a contract for a project, receiving node number 4,100 seconds prestige update cycles, the number of malicious node [3,6 ..., 21,24], the packet loss 80% of malicious node, the current prestige weight 0.618 and 0.58 of VH-GEAR vertical analysis.Two kinds of method for routing are to the discrimination of malicious node, as shown in Figure 7 after the emulation.
As can be seen from Figure 7, suitable when the current prestige weight when the vertical analysis of VH-GEAR method for routing is 0.618 to the discrimination and the E-GEAR of malicious node, when the α value is reduced to 0.58, the identification of malicious node is had to a certain degree influence.The principal element that influences discrimination in the VH-GEAR method for routing is the current prestige weight in the vertical analysis.The high more influence to discrimination of current prestige weight is just more little, otherwise then the influence to discrimination is just big more.Except that the α value, all influential factor of the identification of VH-GEAR method for routing and E-GEAR method for routing is also had: malicious node packet loss and malicious node distribute.The malicious node packet loss to the influence of discrimination is: when packet loss was relatively lower, the prestige pace of change was slowed down, and had prolonged the time of the identification needs of malicious node.The malicious node distribution to the influence of discrimination is: when malicious node is not on critical path, participate in communication hardly, the credit evaluating model can't obtain enough effective prestige factors, therefore also can't carry out effective recognition.Though these nodes can not be identified, they participate in route hardly not in the important traffic path because of these, therefore also can not cause very big influence to wireless sensor network.
(5) VH-GEAR specific energy consumption
Contrast VH-GEAR method for routing, E-GEAR method for routing and GEAR method for routing be the whole specific energy consumption of all nodes in the network within a certain period of time.Simulation run duration 850 seconds, the node number 1 of giving out a contract for a project, receiving node number 4, initialization energy 100, node transmission energy consumption 0.660, node receives energy consumption 0.395, the node energy consumption 0.035 of leaving unused, node sleep energy consumption 0.001,100 seconds prestige update cycles, the number 5 of malicious node, the packet loss 80% of malicious node.The specific energy consumption of three kinds of method for routing after the emulation, as shown in Figure 8.
VH-GEAR route selection method after improving as can be seen from specific energy consumption comparison diagram 8 is lower than the route selection method energy consumption before improving.The main cause that specific energy consumption reduces is that the credit evaluating model periodically carries out the prestige update calculation of node, and VH-GEAR route selection method is directly obtained node prestige when selecting next to jump, reduced the prestige calculation times; And the each route selection of route selection method all needs to carry out prestige calculating according to the prestige factor before improving, and this has increased the weight of the node energy consumption burden greatly.Therefore, though VH-GEAR has strengthened the prestige analysis in the prestige model,, reduced the prestige calculation times because prestige periodically updates, the energy consumption that calculation times reduces to reduce is considerably beyond the energy consumption that analyzing adjuncts added up, thereby reduced the energy consumption of network on the whole.
In sum, the emulation experiment of carrying out based on the NS2 emulation platform and the comparative analysis of The simulation experiment result verified fully based on the WSN safety routing method of credit evaluating mechanism and the feasibility and the validity of system.

Claims (6)

1. WSN safety routing method based on credit evaluating mechanism is characterized in that:
1) node prestige factor is obtained, and obtains the prestige factor of node according to the communication behavior of node;
2) the direct credit evaluating of node is the direct credit evaluating that node is carried out on the basis with the prestige factor of node;
3) node prestige vertical and horizontal are analyzed, and carry out the WSN node credit evaluating that the vertical and horizontal analysis combines according to the indirect prestige of third party's node and the information such as historical prestige of node;
4) node prestige is upgraded, and periodically updates node prestige;
5) WSN safety routing method, method for routing carries out route selection with prestige as a main standard.
2. the WSN safety routing method based on credit evaluating mechanism according to claim 1 is characterized in that: the method that described communication behavior according to node obtains the prestige factor of node comprises: 1) a plurality of nodes are confirmed same packet; 2) according to the situation of confirmation statistics quilt evaluation and test node for data forwarding bag, node for data forwarding bag situation is the prestige factor of node.
3. the WSN safety routing method based on credit evaluating mechanism according to claim 2, it is characterized in that: described prestige factor with node is that the method that the direct credit evaluating of node is carried out on the basis comprises: 1) based on the prestige factor of node, adopt Beta to distribute to describe prestige to distribute; 2) calculate the direct credit value that Beta distribution desired value obtains node.
4. the WSN safety routing method based on credit evaluating mechanism according to claim 3, it is characterized in that: described indirect prestige and the information such as historical prestige of the node method of carrying out the WSN node credit evaluating that the vertical and horizontal analysis combines according to third party's node comprises: 1) in conjunction with the direct indirect prestige of prestige and third party's node node is carried out horizontal analysis, obtain the current prestige of node; 2) carry out vertical analysis in conjunction with the historical prestige in current prestige and the node whole life, the vertical and horizontal analysis combines and obtains a comprehensive WSN node prestige.
5. the WSN safety routing method based on credit evaluating mechanism according to claim 4 is characterized in that: the described method that periodically updates node prestige comprises: 1) start node prestige and upgrade timer; 2) prestige update time to after carry out the prestige analysis that the vertical and horizontal analysis combines, new node prestige more; 3) return the prestige update mode, three kinds of return states are arranged: the prestige update cycle, constant continuation was regularly upgraded; Revising the prestige update cycle regularly upgrades; Cancellation prestige is upgraded.
6. the WSN safety routing method based on credit evaluating mechanism according to claim 5, it is characterized in that: described method of carrying out route selection as a main standard with prestige comprises: 1) calculate the integration objective cost of neighbor node, the factor that the integration objective cost is considered mainly contains: distance, energy, prestige etc.; 2) select the route next jump node, in neighbor node, select the next-hop node of the node of integration objective cost minimum, set up the network route as route.
CN201010101235A 2010-01-27 2010-01-27 WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism Pending CN101801011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010101235A CN101801011A (en) 2010-01-27 2010-01-27 WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010101235A CN101801011A (en) 2010-01-27 2010-01-27 WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism

Publications (1)

Publication Number Publication Date
CN101801011A true CN101801011A (en) 2010-08-11

Family

ID=42596443

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010101235A Pending CN101801011A (en) 2010-01-27 2010-01-27 WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism

Country Status (1)

Country Link
CN (1) CN101801011A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223627A (en) * 2011-06-17 2011-10-19 北京工业大学 Beacon node reputation-based wireless sensor network safety locating method
CN102821102A (en) * 2012-07-30 2012-12-12 中国电力科学研究院 Intelligent power distribution network defending system and defending method thereof
CN103095589A (en) * 2013-01-17 2013-05-08 电子科技大学 Sensor node trust value management method of wireless sensor network of tree topology structure based on Internet protocol (IP) v 6
CN103338451A (en) * 2013-06-24 2013-10-02 西安电子科技大学 Method for detecting distributed malicious nodes in wireless sensor network
CN103841553A (en) * 2014-03-27 2014-06-04 福建师范大学 Method for routing security and privacy protection of mixed wireless Mesh network
CN103957547A (en) * 2014-05-05 2014-07-30 中国科学院微电子研究所 Node reputation evaluating method and system for wireless sensor network
CN104023337A (en) * 2014-06-03 2014-09-03 哈尔滨工程大学 Dynamically adjusted trust value calculation method based on Beta credit system
CN104660607A (en) * 2015-03-06 2015-05-27 深圳欧德蒙科技有限公司 Implementation method of two-dimension routing protocol and device using protocol
CN104837130A (en) * 2015-04-22 2015-08-12 上海物联网有限公司 Wireless sensor network compromised node identification method under Beta distribution with time-varying credit value
CN105141527A (en) * 2015-07-30 2015-12-09 福建师范大学 Routing security and privacy protection method for Internet of things network
CN105141528A (en) * 2015-07-30 2015-12-09 福建师范大学 Internet of things trusted routing method based on Core-Selecting and reputation mechanism
CN103634151B (en) * 2013-11-30 2017-01-18 华中科技大学 Multi-evaluation criterion-based credit synthetic method
CN106716958A (en) * 2014-09-18 2017-05-24 微软技术许可有限责任公司 Lateral movement detection
CN106912083A (en) * 2017-03-09 2017-06-30 西北大学 A kind of method for routing of the radio sensing network suitable for large-scale wild environment

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223627B (en) * 2011-06-17 2013-10-23 北京工业大学 Beacon node reputation-based wireless sensor network safety locating method
CN102223627A (en) * 2011-06-17 2011-10-19 北京工业大学 Beacon node reputation-based wireless sensor network safety locating method
CN102821102A (en) * 2012-07-30 2012-12-12 中国电力科学研究院 Intelligent power distribution network defending system and defending method thereof
CN102821102B (en) * 2012-07-30 2016-09-21 中国电力科学研究院 A kind of intelligent distribution network system of defense and defence method thereof
CN103095589B (en) * 2013-01-17 2016-08-03 电子科技大学 The sensor nodes in wireless sensor network trust value management method of tree topology based on IPv6
CN103095589A (en) * 2013-01-17 2013-05-08 电子科技大学 Sensor node trust value management method of wireless sensor network of tree topology structure based on Internet protocol (IP) v 6
CN103338451A (en) * 2013-06-24 2013-10-02 西安电子科技大学 Method for detecting distributed malicious nodes in wireless sensor network
CN103338451B (en) * 2013-06-24 2016-11-09 西安电子科技大学 Distributed malicious node detection method in a kind of wireless sensor network
CN103634151B (en) * 2013-11-30 2017-01-18 华中科技大学 Multi-evaluation criterion-based credit synthetic method
CN103841553A (en) * 2014-03-27 2014-06-04 福建师范大学 Method for routing security and privacy protection of mixed wireless Mesh network
CN103841553B (en) * 2014-03-27 2018-01-23 福建师范大学 A kind of hybrid wireless Mesh network routing safety and the method for secret protection
CN103957547A (en) * 2014-05-05 2014-07-30 中国科学院微电子研究所 Node reputation evaluating method and system for wireless sensor network
CN103957547B (en) * 2014-05-05 2017-07-04 中国科学院微电子研究所 The node credit evaluating method and system of wireless sensor network
CN104023337B (en) * 2014-06-03 2017-05-24 哈尔滨工程大学 Dynamically adjusted trust value calculation method based on Beta credit system
CN104023337A (en) * 2014-06-03 2014-09-03 哈尔滨工程大学 Dynamically adjusted trust value calculation method based on Beta credit system
CN106716958B (en) * 2014-09-18 2020-04-14 微软技术许可有限责任公司 Lateral movement detection
CN106716958A (en) * 2014-09-18 2017-05-24 微软技术许可有限责任公司 Lateral movement detection
CN104660607B (en) * 2015-03-06 2018-04-27 深圳欧德蒙科技有限公司 A kind of implementation method of two dimension Routing Protocol and the device using the agreement
CN104660607A (en) * 2015-03-06 2015-05-27 深圳欧德蒙科技有限公司 Implementation method of two-dimension routing protocol and device using protocol
CN104837130A (en) * 2015-04-22 2015-08-12 上海物联网有限公司 Wireless sensor network compromised node identification method under Beta distribution with time-varying credit value
CN104837130B (en) * 2015-04-22 2021-05-11 上海物联网有限公司 Wireless sensor network compromise node identification method with time-varying credit value under beta distribution
CN105141528A (en) * 2015-07-30 2015-12-09 福建师范大学 Internet of things trusted routing method based on Core-Selecting and reputation mechanism
CN105141527B (en) * 2015-07-30 2018-09-18 福建师范大学 A kind of method of routing safety and secret protection in Internet of Things network
CN105141527A (en) * 2015-07-30 2015-12-09 福建师范大学 Routing security and privacy protection method for Internet of things network
CN106912083A (en) * 2017-03-09 2017-06-30 西北大学 A kind of method for routing of the radio sensing network suitable for large-scale wild environment
CN106912083B (en) * 2017-03-09 2020-01-14 西北大学 Routing method of wireless sensor network suitable for large-scale field environment

Similar Documents

Publication Publication Date Title
CN101801011A (en) WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism
Jiang et al. A dynamic trust evaluation and update mechanism based on C4. 5 decision tree in underwater wireless sensor networks
Varmaghani et al. DMTC: Optimize energy consumption in dynamic wireless sensor network based on fog computing and fuzzy multiple attribute decision-making
Zhang et al. Balancing energy consumption and reputation gain of UAV scheduling in edge computing
Rathore et al. Towards Trusted Green Computing for Wireless Sensor Networks: Multi Metric Optimization Approach.
CN100531087C (en) Node invalidation and pre-alarming method of radio sensor network based on Bays method
Ramya et al. A comprehensive review on optimal cluster head selection in WSN-IOT
CN104539601A (en) Reliability analysis method and system for dynamic network attack process
CN104618149B (en) A kind of heterogeneous network SON intelligence operation management method
CN111343650A (en) Urban scale wireless service flow prediction method based on cross-domain data and loss resistance
CN105050095A (en) Topology construction method for heterogeneous wireless sensor networks based on energy prediction
CN109474461A (en) Wireless sensor network trust management method and system based on prestige Poisson distribution
Li et al. Dynamic decision model of real estate investment portfolio based on wireless network communication and ant colony algorithm
Wang et al. A new approach to heterogeneous wireless sensor networks reliability evaluation based on perception layer in internet of vehicles
CN110399537A (en) A kind of alert spatio-temporal prediction method based on artificial intelligence technology
US10616753B2 (en) Cognitive roaming support
CN109040075A (en) Management method, server and the system of wireless mobile sensor network interior joint
CN107371125A (en) Wireless sensor network fault restorative procedure and device based on particle cluster algorithm
CN105187310B (en) A kind of method for optimizing route and system
Zhuang et al. Compound event barrier coverage algorithm based on environment Pareto dominated selection strategy in multi-constraints sensor networks
Tampère et al. Dynamic traffic assignment under equilibrium and non-equilibrium: do we need a paradigm shift?
Dong Deployment cost optimal for composite event detection in heterogeneous wireless sensor networks
CN102752133A (en) Mechanism and method for constructing consistency view in autonomous domain in credible controllable network
Sun et al. CoC-SCS: Cooperative-optimization coverage algorithm based on sensor cloud systems in intelligent computing
Nie et al. Technological innovation management for sustainable energy development associated with industrial development and legal duties

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100811