CN102932804A - Highly reliable covering mechanism based on trust management in wireless sensor network - Google Patents
Highly reliable covering mechanism based on trust management in wireless sensor network Download PDFInfo
- Publication number
- CN102932804A CN102932804A CN2012104875855A CN201210487585A CN102932804A CN 102932804 A CN102932804 A CN 102932804A CN 2012104875855 A CN2012104875855 A CN 2012104875855A CN 201210487585 A CN201210487585 A CN 201210487585A CN 102932804 A CN102932804 A CN 102932804A
- Authority
- CN
- China
- Prior art keywords
- node
- trust
- covering
- expression
- associating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a highly reliable covering mechanism based on trust management in wireless sensor network. The highly reliable covering mechanism comprises a universal trust management system and a covering algorithmic dispatching program based on trust management, wherein the covering area of sensor network is virtually subdivided, the intersections of vertical and horizontal coordinates serve as mesh points, the relatively smaller value of Rc and Rs is used as the size of a virtual mesh, Rs represents a node sensing semi-diameter, the mesh points are covered in parallel by active nodes in a circle taking the mesh points as the centre of the circle and taking node communication semi-diameter Rc as semi-diameter, the quantized data of the universal trust management system is taken as node trust degree, a joint trust degree is obtained through quantification, the working condition of working nodes in each mesh is dispatched according to the node trust degree and the joint trust degree, and the covering quality and covering reliability of covering area are ensured. The highly reliable covering mechanism is not limited to a certain specific trust management system, and therefore, the mechanism has better universality.
Description
Technical field
The present invention relates to wireless communication field, be specifically related to the highly reliable covering mechanism of wireless sensor network.
Background technology
Along with the in recent years progress of science and technology, wireless senser is gradually to the development of the aspects such as miniaturization, high-effect, low-power consumption, and can realize the batch production of high performance-price ratio in radio communication field is used.Being accompanied by wireless sensor network WSN (Wireless Sensor Network) more and more uses in fields such as battlefield monitoring, environment and Traffic monitorings
[1], in the urgent need under the condition that is subject to resource constraint, WSN fragility inevitable and attack and destruction objective reality, WSN can provide reliable service quality.But up to now, seldom there is the complete credible WSN system can the reliable network service of effective guarantee, greatly retrained the development of WSN
[2-3]For conserve energy, researchers begin one's study and add the function of Coverage Control in traditional transducers, in order to use few node of trying one's best to finish the covering requirement.Be vulnerable to attack and cause node institute overlay area unsafe problems, researchers to propose again the concept of trust management in order to solve WSN, with the fail safe in ensuring coverage zone.At present, based on the Secure Routing Techniques of trust management
[4,17], safe election of cluster head
[18], safe integration technology
[5], secure data processes
[20], the secure localization technology
[6,19]With the safety time simultaneous techniques
[7]Deng some valuable achievements in research having occurred.But till now, also the safety covering based on trust management that can imitate of row is not machine-processed.Traditional covering algorithm or trust management model are two different research directions, the two are not combined research.Highly reliable soverlay technique is one of key issue of high credible WSN, and WSN is by the task of internodal mutual cooperation execution monitored area, target following, but the prerequisite that cooperates and basis are that the participation node is normal node, but not malicious node.In order to improve the reliability of network coverage quality, masked nodes lost efficacy covering quality was impacted, and researcher's research and design covers mechanism reliably, has obtained certain achievement in research.
Document [8] passes through additionally to increase the way of some monitoring nodes in network, come the behavior of monitoring node packet discard, helps failure node forwarding data bag, supports sensing data finally to arrive safely, exactly aggregation node.Document [9] has proposed a kind of reliable covering mechanism based on 2-Coverage, shields the inefficacy of individual node by increasing redundant cover, reaches fault-tolerant effect.Lost efficacy for fear of individual node and to cause network node integrated moving, document [10] to propose " Snake " node replacement scheme based on virtual grid.Document [16] Based on Probability overlay model has proposed to satisfy the heuritic approach of the default monitoring probability of target area, covers collection to obtain maximum satisfying the demands.More than these researchs reliable cover mechanism and mainly concentrate on to solve and reduce node failure for the impact of covering quality.Yet in real world applications, except node failure caused network coverage Quality Down, network attack etc. all can impact covering quality.For example, if the monitoring node in the network is captured by the enemy, become malicious node, the auxiliary intensification mechanism of monitoring node will lose effectiveness.For " Snake " node replacement scheme, if the individual nodes in the network or part of nodes are aging, the sensing data substantial deviation is in real data, these false data will cause false alarm, the interference user decision-making consumes limited Internet resources, causes serious consequence.
The proposition of trust management model is that traditional the effective of security mechanism replenishes, and has been applied to the every aspect in the Internet network security.For above-mentioned reasons, the application of trust management model has become current study hotspot.Current, general trust management model has a variety of, the RFSN that is wherein proposed by Ganeriwal-Srivastava
[12]It is exactly a kind of typical general trust management system based on popularity.The higher energy and the storage overhead that cause in order to reduce trust management, R.A.Shaikh etc. propose a kind of packet-based lightweight trust management system
[13], J.W.Ho has proposed the trust management system based on region unit
[14]
Document [11] is although proposed a kind of coverage scheduling scheme based on trust management, but this scheduling scheme just simply joins trust management model in the node, only incredible node revocation, and its covering algorithm with reality is not combined during concrete scheduling.This scheduling scheme can not guarantee the covering quality of node institute overlay area, in case node sudden failure in the course of the work, its overlay area can be absorbed in partial paralysis.
Summary of the invention
The present invention studies on the basis to above document, has proposed a kind of highly reliable covering mechanism based on trust management.From document [11] based on the covering algorithm of trust management different be, emphasis on analyzing the inherent requirement of trust management system to nodes ' behavior monitoring, quantitative analysis the relation between overlay node collection size, associating degree of belief and the trust threshold, this be before the content that do not relate to of other security protocol and existing covering algorithm based on trust management.Highly reliable covering mechanism based on trust management of the present invention can be guaranteed the highly reliable covering of overlay area, can effectively reduce in running order number of nodes again.And be not limited to certain specific trust management system, therefore, have better versatility.
With the virtual subdivision in sensor network overlay area, the coordinate infall is grid point in length and breadth, will
Rc with
In less value as the size of virtual grid, Rc is the node communication radius, Rs is the node perceived radius, by take grid point as the center of circle, live-vertex in take node communication radius R c as the circle of the radius node of node trust threshold (degree of belief surpass) is to the grid point covering that walks abreast, take the quantized data of general trust management system as the node confidence initial data, through quantizing to obtain the associating degree of belief, the highly reliable mechanism that covers based on trust management of the present invention is united the operating state that degree of belief is dispatched working node in each grid according to this.
For convenience, defined the following symbol: N={n
1, n
2..., n
h}: expression forms the sensor node collection of sensor network, { r
1, r
2..., r
hIts corresponding trust value, h represents the node number.S
iExpression is positioned at grid point p
iAdjacent mesh in, participate in nerve of a covering lattice point p
iThe overlay node collection of task, k
0Maximum node number (the k that expression overlay node collection allows
0Be system parameters, maximum is 7), k represents the node number of current overlay node collection.
Node confidence threshold value when expression overlay node number is k, and
The node that degree of belief is lower than this threshold value is judged as malicious node,
Slightly write as Tmin.Tmax represents the associating degree of belief threshold value of grid point, is system parameters, if be lower than quality and fail safe that this threshold value then can not the ensuring coverage zone after the grid point degree of belief quantizes.T
iExpression grid point p
iCorresponding overlay node collection S
iThe associating degree of belief that obtains, wherein
T
i(k) expression grid point p
iThe associating degree of belief of the node number that corresponding overlay node integrates during as k.Among Fig. 1, Na is expressed as malicious node (hostile node), and the degree of belief of node is lower than Tmin.Nb is expressed as dormancy node (sleeping node), although the degree of belief of node is higher than the node confidence threshold value, finally is judged as redundant node through dispatching algorithm.Nc is expressed as working node (working node), and the degree of belief of node is higher than Tmin, and through the active node of dispatching algorithm.Rc: node communication radius.Rs: node perceived radius.
Provide in addition the term definition of content of the present invention:
Define 1. grid point p
iCorresponding overlay node collection S
iIn have working node over half normal operation to obtain perception data probability be called the associating degree of belief T of this grid
i
If definition 2. grid point p
iCorresponding overlay node collection S
iThe associating degree of belief T that obtains
iMore than or equal to the value of Tmax, then claim p
iBy highly reliable covering.
If each grid point is then claimed this zone by highly reliable covering by highly reliable covering in definition 3. target areas.
Definition 4. is with grid point p
iCentered by, be in the adjacent mesh or frame on sensor node be called p
iInterdependent node, p
iThe associated section point set we use Ω
iRepresent.According to the virtual grid size that arranges, p
iInterdependent node all can cover p
iThe basic process of node associating nerve of a covering lattice point as shown in Figure 1, each grid point selects several working nodes as the overlay node collection in adjacent mesh, and this grid point is united execution covering task.If current nerve of a covering lattice point, greater than trust threshold
The associating degree of belief that obtains of overlay node collection be higher than predetermined value Tmax, illustrate that this grid point has reached the requirement of highly reliable covering.For grid point p
i, corresponding overlay node collection S
i={ n
1, n
2, n
3, n
4Because degree of belief is lower than
Then be judged to be broken into malicious node, therefore be excluded and uniting covering p
iTask outside, n
5Although be normal working node, also can cover p
i, but or owing to can not help to increase p
iAssociating degree of belief T
i, or because the node number k of overlay node collection has arrived maximum k
0(k
0Be system parameters), also be rejected to outside the overlay node collection.If all grid points are all by highly reliable covering, then covering task is finished.If have the associating degree of belief of grid point to be lower than threshold value Tmax, then need to re-start scheduling.
In order to make grid point can have better fail safe, requiring overlay node to concentrate has working node normal operation over half to obtain the probability of perception data greater than grid point associating degree of belief threshold value Tmax, can guarantee that like this through after (merging such as the numerical value) relevant treatment such as data fusion, data have high credible.For conserve energy, participate in to cover this grid point the working node number, be that the overlay node collection is unsuitable excessive, should be limited in k
0Individual with interior (k
0Be system parameters).
Too much for fear of the working node number, if k
0The probability that the individual node that surpasses or equal trust threshold Tmin satisfies the working node normal operation that surpasses half reaches the standard of associating degree of belief Tmax, just working node can be limited in k
0In individual.The problems referred to above can be formulated as minimum Tmin:
K is odd number, and x is the node confidence value, works as Tmax=0.95, k
0=5, the threshold value Tmin that obtains can not be less than 0.8.
When x 〉=Tmin>0.5, k is during greater than 1 odd number,
Be increasing function.Therefore can obtain k
0The individual node that surpasses or equal trust threshold Tmin satisfies the probability of the working node normal operation that surpasses half more than or equal to Tmax.In like manner can obtain Tmax=0.9, k
0=5, Tmin=0.75.Work as Tmax=0.95, k
0=7, Tmin=0.77.Tmax=0.9,k
0=7,Tmin=0.72。
X coordinate among Fig. 2 is the number k of working node, and the Y coordinate is the value of the Tmin that chooses, and the Z coordinate is that the working node number is that k namely is satisfied with the poor of probability corresponding when being k+1 above half the probability of working node normal operation with the node number.If be in Tmin (0<Tmin<0.8), in this scope of k≤7, when the trust value of all working node is Tmin, when the working node number is k, the probability the when probability that satisfies the working node normal operation that surpasses half is k+1 greater than the node number, order
That is:
Be no more than k in the node number
0Situation under, the working node that participates in task should be odd number, if the associating trust value that the work at present set of node obtains less than Tmax, each node number that increases increases progressively with 2.
Grid point p
iThe overlay node collection
Corresponding trust value be r '
1, r '
2..., r '
k, r ' wherein
1〉=r '
2〉=r '
kWherein k represents the size of overlay node collection, W
KoRepresent just to have in this k the different nodes set of all combinations of o node perceived error in data,
Represent j combination, wherein
For example,
The node that represents the perception data mistake has n '
1, n '
2..., n '
oGrid point p then
iAssociating degree of belief Mathematical Modeling be:
Exist several active nodes in the covering algorithm scheduling scheme requirement grid based on trust management and monitoring the target area, and allow all the other nodes enter resting state, reach the effect that not only keeps covering quality but also can prolong network lifetime.At this time is divided with timeslice, be divided into again node scheduling stage and working stage in each timeslice, dispatch by said method in the scheduling phase interior nodes, judge whether to participate in the covering task.If participate in, then remain on active state at working stage always, otherwise enter into resting state until next timeslice is arrived.
Convenient for afterwards statement, node is divided into four classes: a class is to belong to and only belong to S
iIn set of node, use
Expression; One class is to belong to but not only belong to S
iIn set of node, use
Expression; One class is not belong to S
iBut belong to S
y(other arbitrary grid point P of expression node place grid
yThe overlay node collection) set of node, use
Expression; One class is not belong to S
iBut do not belong to any S yet
ySet of node, use `S
iExpression.Order
The trust value of their correspondences is
And
Order
Wherein the trust value of their correspondences is
And
Make Ω
i=n '
1, n '
2..., n '
L+f, corresponding trust value be r '
1, r '
2..., r '
L+f, r ' wherein
1〉=r '
2〉=r '
L+fObviously, if some node n
jParticipate in the grid point set W of covering
Nj={ p
i, then expression
If W
Nj={ p
i, * }, * number expression quantity is greater than 1 grid point set, then expression
If obviously
Then be illustrated in working stage node n
jDo not participate in the task of any nerve of a covering lattice point, it will adjust to resting state.
Performing step based on the covering algorithm scheduling scheme of trust management is as follows:
Initialization. in the node scheduling stage, according to system parameters k
0, T
Max, calculate
L,
Value.With Ω
i,
With
In node be arranged in order according to the size order from big to small of trust value.
Step 1. makes k=1, if Ω
iIn, r '
1<T
Max, then execution in step 2.Otherwise, judge whether
Then allow if set up
Carry out separately and cover p
iTask, namely
In other node and
In node all no longer participate in nerve of a covering lattice point p
iTask.If be false, then order
In node and
In node all no longer participate in nerve of a covering lattice point p
iTask.
Step 2. makes k=3, with Ω
i,
With
Middle trust value less than
Node in step 2, temporarily reject.Judge Ω
iIn whether have k or k above node, if do not have, then execution in step 3.If have, then the decision node collection n '
1, n '
2, n '
3Whether the associating trust value that obtains more than or equal to T
MaxIf, be false, then execution in step 3.If set up, judge n '
1, n '
2, n '
3In which node belong to
Then at first attempt the k set of node
Judge that whether the associating trust value that obtains is more than or equal to T
MaxIf set up, then
If be false, then will attempt successively and will belong in the current k set of node
The node of trust value minimum, with do not belong to the k set of node,
In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T
MaxTill, if current k set of node equal n '
1, n '
2, n '
3, then finish.For example, if
Then attempt successively
If only
Then attempt successively
Step 3. makes k=5<k
0, carry out according to the mode of step 2.
...
Step
Work as k=k
0, with Ω
i,
With
Middle trust value is less than T
MinNode temporarily reject in this step.Judge Ω
iIn whether have k
0Individual or k
0Individual above node if do not have, then shows p
iCan not realize highly reliable covering.If have, by to the definition of trust model as can be known, set of node n '
1, n '
2..., n '
K0The associating trust value that obtains is necessarily more than or equal to T
MaxWhich node belongs in then judging in this set of node
Then at first attempt
In all node with
Those nodes of trust value maximum jointly form k
0Set of node judges that whether the associating trust value that obtains is more than or equal to T
MaxIf, set up, then obtain S
iIf, be false, then will attempt successively current k
0Belong in the set of node
The node of trust value minimum, and do not belong to k
0Set of node,
In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T
MaxTill, if current k
0Set of node equal n '
1, n '
2..., n '
K0, then finish.
Description of drawings
Fig. 1 is the schematic diagram of node associating nerve of a covering lattice point.
Fig. 2 is when k is odd number, T
i(k+1)-T
i(k) with the graph of a relation of k, Tmin
Embodiment
The performing step of the covering algorithm scheduling scheme based on trust management of the present invention is as follows:
Initialization. in the node scheduling stage, according to system parameters k
0, T
Max, calculate
L,
Value.With Ω
i,
With
In node be arranged in order according to the size order from big to small of trust value.
Step 1. makes k=1, if Ω
iIn, r '
1<T
Max, then execution in step 2.Otherwise, judge whether
Then allow if set up
Carry out separately and cover p
iTask, namely
In other node and
In node all no longer participate in nerve of a covering lattice point p
iTask.If be false, then order
In node and
In node all no longer participate in nerve of a covering lattice point p
iTask.
Step 2. makes k=3, with Ω
i,
With
Middle trust value less than
Node in step 2, temporarily reject.Judge Ω
iIn whether have k or k above node, if do not have, then execution in step 3.If have, then the decision node collection n '
1, n '
2, n '
3Whether the associating trust value that obtains more than or equal to T
MaxIf, be false, then execution in step 3.If set up, judge n '
1, n '
2, n '
3In which node belong to
Then at first attempt the k set of node
Judge that whether the associating trust value that obtains is more than or equal to T
MaxIf set up, then
If be false, then will attempt successively and will belong in the current k set of node
The node of trust value minimum, with do not belong to the k set of node,
In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T
MaxTill, if current k set of node equal n '
1, n '
2, n '
3, then finish.For example, if
Then attempt successively
If only
Then attempt successively
Step 3. makes k=5<k
0, carry out according to the mode of step 2.
...
Step
Work as k=k
0, with Ω
i,
With
Middle trust value is less than T
MinNode temporarily reject in this step.Judge Ω
iIn whether have k
0Individual or k
0Individual above node if do not have, then shows p
iCan not realize highly reliable covering.If have, set of node n '
1, n '
2..., n '
K0The associating trust value that obtains is necessarily more than or equal to T
MaxJudge then which node belongs in this set of node
Then at first attempt
In all node with
Those nodes of trust value maximum jointly form k
0Set of node judges that whether the associating trust value that obtains is more than or equal to T
MaxIf, set up, then obtain S
iIf, be false, then will attempt successively current k
0Belong in the set of node
The node of trust value minimum, and do not belong to k
0Set of node,
In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T
MaxTill, if current k
0Set of node equal n '
1, n '
2..., n '
K0, then finish.
Step
Readjust Ω
iIn each node participate in the grid point set that covers, the grid point set according to each node regenerates
And `S
i
List of references
[1] Tang Qiuling, willow is blue or green, Qin Tuanfa, Zhang Shuyi. the energy-conservation modulation scheme of PPM in the wireless sensor network. and Chinese science E collects, and 2007,37 (12): 1583-1596.
[2] woods is rushed, Peng Xuehai. trustable network research. and Chinese journal of computers, 2005,28 (5): 751-758
[3]S.Ganeriwal,B.Srivastava.Trustworthy?sensor?networks:Issues,Challenges&Solutions.NESLTechnical?Report,2004.http://www.cc.ucla.edu/~saurabh/publications/tech-report-integrity.pdf
[4]S.Tanachaiwiwat,P.Dave,R.Bhindwale,A.Helmy.Secure?locations:routing?on?trust?and?isolating?compromised?sensors?inlocation-aware?sensor?networks.In:Proc.of?the?SenSys?2003.New?York:ACM?Press,2003.324-325.
[5]M.D.Krasniewski,P.Varadharajan,B.Rabeler,S.Bagchi,Y.C.Hu.TIBFIT:Trust?index?based?fault?tolerance?for?ability?datafaults?in?sensor.In:Werner?B,ed.Proc.of?the?Int'l?Conf.on?Dependable?Systems?and?Networks(DSN).Piscataway:IEEEComputerSociety,2005.672-681.
[6]Y.Zeng,J.Cao,J.Hong,L.Xie.Secure?localization?and?location?verification?inwireless?sensor?networks.MASS2009,864-869.
[7]Y.Yang,Y.Sun.Securing?Time-Synchronization?Protocols?in?Sensor?Networks:Attack?Detection?and?Self-Healing.GlobeCom2008,1-6.
[8]J.Wang,S.Medidi.Topology?control?for?reliable?sensor-to-sink?data?transport?in?sensor?networks.In:Proceedings?of?ICC,2008.3215-3219.
[9] Xu Qiang, Wang Yun. the solution of reliable covering problem among the fault-tolerant energy-saving wireless WSN. Journal of Software, 2006,17 (11): 184-191.
[10]A.Howard,M.Mataric,G.Sukhatme.An?incremental?self-deployment?algorithm?for?mobile?sensor?networks.AutonomousRobots,2002,13(2):113-126.
[11]Z.Yin,H.Zhao,K.Lin,P.Sun,D.Luo,X.Zhang,X.Wang.A?coverage-preserving?node?scheduling?scheme?based?on?trustselection?model?in?wireless?sensor?networks.Proceeding?of?ISPCA2006,2007,8:696-698.
[12]Ganeriwal?S,Srivastava?M.Reputation-based?framework?for?high?integrity?sensor?networks.In:Proc.of?the?2nd?ACMWorkshop?on?Security?of?Ad?Hoc?and?Sensor?Network(SASN?2004).New?York:ACM?press,2004.66-77.
[13]R.A.Shaikh,H.Jameel,B.J.Auriol,etc.Group-Based?Trust?Management?Scheme?for?Clustered?Wireless?Sensor?Networks.IEEE?Transactions?on?Parallel?and?Distributed?Systems.2009,20(11):1698–1712.
[14]J.W.Ho.Zone-based?tust?management?in?sensor?networks.PerCom?2009,1-2.
[15]Tian?D,Georganas?ND.A?node?scheduling?scheme?for?energy?conservation?in?large?wireless?sensor?networks.WirelessCommunications?and?Mobile?Computing,2003,3(2):271-290.
[16]He?J.,Ji?S.,Pan?Y.,et?al.Reliable?and?Energy?Efficient?Target?Coverage?for?Wireless?Sensor?Networks.2011,16(5):464-474.
[17] Wang good citizen, Guo Yuanbo, Zhan Yongzhao. inbreak-tolerated wireless sensor network blurs Trust Valuation Model. communication journal, 2010,31 (12): 37-44.
[18] Feng Renjian, Cheng Jian, Xu Xiaofeng, Wan Jiangwen. based on the credible election of cluster head algorithm of the wireless sensor network of Mamdani fuzzy reasoning. high-tech communication, 2010,20 (12): 1253-1259.
[19]X.Wang,L.Ding,S.Wang.Trust?Evaluation?Sensing?for?Wireless?Sensor?Networks.IEEE?transaction?on?instrumentation?andmeasurement,2011,60(6):2088-2095.
[20]H.Feng,G.Li,W.Lu,L.Huang.Trust?based?secure?in-network?data?processing?schema?in?wireless?sensor?networkks.Journal?ofnetworks,2011,6(2):295-302.
Claims (4)
- In the wireless sensor network based on the highly reliable covering mechanism of trust management, comprise general trust management system, it is characterized in that: also comprise the covering algorithm scheduling scheme based on trust management, with the virtual subdivision in sensor network overlay area, the coordinate infall is grid point in length and breadth, will With In less value as the size of virtual grid, Rs is the node perceived radius, by take grid point as the center of circle, live-vertex in take node communication radius R c as the circle of radius is to the grid point covering that walks abreast, take the quantized data of general trust management system as node confidence, through quantizing to obtain the associating degree of belief, described operating state of dispatching working node in each grid according to node confidence and associating degree of belief based on the covering algorithm scheduling scheme of trust management.
- 2. highly reliable covering based on trust management is machine-processed in a kind of wireless sensor network as claimed in claim 1, it is characterized in that: describedLive-vertex be the node that degree of belief surpasses the node confidence threshold value, this node confidence threshold value is obtained by following mathematical expression:In the formula:K is odd number;Tmax represents the associating degree of belief threshold value of grid point, and this is worth by default.
- 3. highly reliable covering based on trust management is machine-processed in a kind of wireless sensor network as claimed in claim 1, and it is characterized in that: described associating degree of belief is obtained by following mathematical expression:In the formula:T iExpression grid point p iCorresponding overlay node collection S iThe associating degree of belief that obtains;p iThe expression grid point;S iExpression p iCorresponding overlay node collection;K represents node number that current overlay node integrates and as odd number;W KoRepresent just to have in this k the different nodes set of all combinations of o node perceived error in data;N represents to form the sensor node collection of sensor network;Represent j combination, wherein
- 4. highly reliable covering based on trust management is machine-processed in a kind of wireless sensor network as claimed in claim 1, and it is characterized in that: described covering algorithm scheduling scheme based on trust management is realized by following steps:Initialization. in the node scheduling stage, according to system parameters k 0, T Max, calculate L, Value, with Ω i, With In node be arranged in order according to the size order from big to small of trust value;Step 1. makes k=1, if Ω iIn, r ' 1<T Max, then execution in step 2, otherwise, judge whether Then allow if set up Carry out separately and cover p iTask, namely In other node and In node all no longer participate in nerve of a covering lattice point p iTask, if be false, then the order In node and In node all no longer participate in nerve of a covering lattice point p iTask;Step 2. makes k=3, with Ω i, With Middle trust value less than Node in step 2, temporarily reject, judge Ω iIn whether have k or k above node, if do not have, then execution in step 3.If have, then the decision node collection n ' 1, n ' 2, n ' 3Whether the associating trust value that obtains more than or equal to T MaxIf, be false, then execution in step 3.If set up, judge n ' 1, n ' 2, n ' 3In which node belong to Then at first attempt the k set of node Judge that whether the associating trust value that obtains is more than or equal to T MaxIf set up, then If be false, then will attempt successively and will belong in the current k set of node The node of trust value minimum, with do not belong to the k set of node, In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T MaxTill, if current k set of node equal n ' 1, n ' 2, n ' 3, then finish;Step 3. makes k=5<k 0, carry out according to the mode of step 2;......Step Work as k=k 0, with Ω i, With Middle trust value is less than T MinNode temporarily reject in this step; Judge Ω iIn whether have k 0Individual or k 0Individual above node if do not have, then shows p iCan not realize highly reliable covering; If have, by to the definition of trust model as can be known, set of node n ' 1, n ' 2..., n ' K0The associating trust value that obtains is necessarily more than or equal to T MaxWhich node belongs in then judging in this set of node Then at first attempt In all node with Those nodes of trust value maximum jointly form k 0Set of node judges that whether the associating trust value that obtains is more than or equal to T MaxIf, set up, then obtain S iIf, be false, then will attempt successively current k 0Belong in the set of node The node of trust value minimum, and do not belong to k 0Set of node, In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T MaxTill, if current k 0Set of node equal n ' 1, n ' 2..., n ' K0, then finish;Step Readjust Ω iIn each node participate in the grid point set that covers, the grid point set according to each node regenerates And `S iWherein:N represents to form the sensor node collection of sensor network, N={n 1, n 2..., n b; { r 1, r 2..., r hTrust value corresponding to expression N, h represents the node number; K represents node number that current overlay node integrates and as odd number; k 0The maximum node number that expression overlay node collection allows, k 0By default; Node trust threshold when being k for the overlay node number, and Tmax represents the associating degree of belief threshold value of grid point, and this is worth by default;p iExpression grid point center; S iExpression p iCorresponding overlay node collection; Ω iExpression p iThe associated section point set; Expression belongs to and only belongs to S iIn set of node; Expression belongs to but not only belongs to S iIn set of node; Expression does not belong to S iBut belong to S iSet of node, j ∈ { N-{i}}; `S iExpression does not belong to S iBut do not belong to any S yet jSet of node;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210487585.5A CN102932804B (en) | 2012-11-27 | 2012-11-27 | Highly reliable covering mechanism based on trust management in wireless sensor network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210487585.5A CN102932804B (en) | 2012-11-27 | 2012-11-27 | Highly reliable covering mechanism based on trust management in wireless sensor network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102932804A true CN102932804A (en) | 2013-02-13 |
CN102932804B CN102932804B (en) | 2015-04-29 |
Family
ID=47647481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210487585.5A Expired - Fee Related CN102932804B (en) | 2012-11-27 | 2012-11-27 | Highly reliable covering mechanism based on trust management in wireless sensor network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102932804B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103152741A (en) * | 2013-03-23 | 2013-06-12 | 江南大学 | Rapid detection method of deployment effect of terminals in region |
CN103281748A (en) * | 2013-06-13 | 2013-09-04 | 清华大学 | Wireless sensor network node routing method based on link liveness |
CN107027172A (en) * | 2017-03-13 | 2017-08-08 | 浙江大学 | A kind of distributed object location estimation method for resisting suspicious data |
CN107426790A (en) * | 2017-07-28 | 2017-12-01 | 广东技术师范学院 | A kind of passive sensory network node scheduling system and method |
CN110267323A (en) * | 2019-05-21 | 2019-09-20 | 杭州电子科技大学 | A kind of connection target K covering method based on adjustable the perception radius model |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090328148A1 (en) * | 2008-06-30 | 2009-12-31 | Industry-Academic Cooperation Foundation Of Kyung Hee University | Method of trust management in wireless sensor networks |
CN101977395A (en) * | 2010-10-04 | 2011-02-16 | 桂林电子科技大学 | Node trust management system in wireless sensor network |
-
2012
- 2012-11-27 CN CN201210487585.5A patent/CN102932804B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090328148A1 (en) * | 2008-06-30 | 2009-12-31 | Industry-Academic Cooperation Foundation Of Kyung Hee University | Method of trust management in wireless sensor networks |
CN101977395A (en) * | 2010-10-04 | 2011-02-16 | 桂林电子科技大学 | Node trust management system in wireless sensor network |
Non-Patent Citations (2)
Title |
---|
李小龙: "无线传感器网络中的覆盖算法研究", 《中国博士学位论文全文数据库 信息科技辑》, 15 January 2010 (2010-01-15) * |
荆琦,唐礼勇,陈钟: "无线传感器网络中的信任管理", 《软件学报》, vol. 19, no. 7, 31 July 2008 (2008-07-31), pages 1716 - 1730 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103152741A (en) * | 2013-03-23 | 2013-06-12 | 江南大学 | Rapid detection method of deployment effect of terminals in region |
CN103281748A (en) * | 2013-06-13 | 2013-09-04 | 清华大学 | Wireless sensor network node routing method based on link liveness |
CN103281748B (en) * | 2013-06-13 | 2015-08-12 | 清华大学 | Based on the wireless sensor network node route selecting method of link liveness |
CN107027172A (en) * | 2017-03-13 | 2017-08-08 | 浙江大学 | A kind of distributed object location estimation method for resisting suspicious data |
CN107027172B (en) * | 2017-03-13 | 2019-11-15 | 浙江大学 | A kind of distributed object location estimation method fighting suspicious data |
CN107426790A (en) * | 2017-07-28 | 2017-12-01 | 广东技术师范学院 | A kind of passive sensory network node scheduling system and method |
CN110267323A (en) * | 2019-05-21 | 2019-09-20 | 杭州电子科技大学 | A kind of connection target K covering method based on adjustable the perception radius model |
Also Published As
Publication number | Publication date |
---|---|
CN102932804B (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102932804B (en) | Highly reliable covering mechanism based on trust management in wireless sensor network | |
Jin et al. | Multi-agent trust-based intrusion detection scheme for wireless sensor networks | |
Bhuiyan et al. | Sensor placement with multiple objectives for structural health monitoring in WSNs | |
CN101917777B (en) | Wireless sensor network node sleep qualification judging method based on cooperation between neighboring nodes | |
Zhang et al. | An energy-efficient multilevel secure routing protocol in IoT networks | |
CN104270805A (en) | Dynamic-target-tracking-oriented sleeping scheduling method for nodes of energy capturing sensor network | |
Akhtar et al. | Classification of selfish and regular nodes based on reputation values in MANET using adaptive decision boundary | |
CN102983948B (en) | A kind of radio sensing network self-adaption cluster transmission method and device thereof | |
Li et al. | Communication cost minimization in wireless sensor and actor networks for road surveillance | |
Forootaninia et al. | An improved watchdog technique based on power-aware hierarchical design for ids in wireless sensor networks | |
CN104168631A (en) | Wireless sensor network energy balance coverage scheduling and cross-layer routing design method | |
Wang et al. | Optimization of Wireless Sensor Network Architecture with Security System | |
Li et al. | Mobile agents-based intrusion detection system for mobile ad hoc networks | |
Abdel-Fattah et al. | Dynamic intrusion detection technique for dynamic mobile ad hoc network | |
CN103002438A (en) | Network behavior monitoring method based on support vector machine (SVM) and trust control | |
Bello et al. | Energy efficient for data aggregation in wireless sensor networks | |
Ye et al. | Energy allocation for stochastic event detection in rechargeable sensor networks | |
Sun et al. | CoC-SCS: Cooperative-optimization coverage algorithm based on sensor cloud systems in intelligent computing | |
Carnevale et al. | From Cloud-Edge to Edge-Edge Continuum: the Swarm-Based Edge Computing Systems | |
Jangid et al. | Mobile Wireless ADHOC Networks Energy Consumption Monitoring and Quality of Service Analysis | |
Pandey et al. | The use of Analytical Hierarchy Process in sensor-based networks for security-aware congestion control. | |
Sivasakthiselvan et al. | Cluster based Routing Schemes in Mobile Sensor Networks: A Review | |
Yang et al. | An energy-efficient data gathering algorithm based on clustering for wireless sensor networks | |
Kumari et al. | Revival of selfish nodes in clustered MANET | |
Wang et al. | Energy-efficient routing algorithm for WSNs in underground mining |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150429 Termination date: 20151127 |
|
EXPY | Termination of patent right or utility model |