CN102932804A - Highly reliable covering mechanism based on trust management in wireless sensor network - Google Patents

Highly reliable covering mechanism based on trust management in wireless sensor network Download PDF

Info

Publication number
CN102932804A
CN102932804A CN2012104875855A CN201210487585A CN102932804A CN 102932804 A CN102932804 A CN 102932804A CN 2012104875855 A CN2012104875855 A CN 2012104875855A CN 201210487585 A CN201210487585 A CN 201210487585A CN 102932804 A CN102932804 A CN 102932804A
Authority
CN
China
Prior art keywords
node
trust
covering
expression
associating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104875855A
Other languages
Chinese (zh)
Other versions
CN102932804B (en
Inventor
李小龙
刘洋
冯东磊
李宏周
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Electronic Technology
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic Technology filed Critical Guilin University of Electronic Technology
Priority to CN201210487585.5A priority Critical patent/CN102932804B/en
Publication of CN102932804A publication Critical patent/CN102932804A/en
Application granted granted Critical
Publication of CN102932804B publication Critical patent/CN102932804B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a highly reliable covering mechanism based on trust management in wireless sensor network. The highly reliable covering mechanism comprises a universal trust management system and a covering algorithmic dispatching program based on trust management, wherein the covering area of sensor network is virtually subdivided, the intersections of vertical and horizontal coordinates serve as mesh points, the relatively smaller value of Rc and Rs is used as the size of a virtual mesh, Rs represents a node sensing semi-diameter, the mesh points are covered in parallel by active nodes in a circle taking the mesh points as the centre of the circle and taking node communication semi-diameter Rc as semi-diameter, the quantized data of the universal trust management system is taken as node trust degree, a joint trust degree is obtained through quantification, the working condition of working nodes in each mesh is dispatched according to the node trust degree and the joint trust degree, and the covering quality and covering reliability of covering area are ensured. The highly reliable covering mechanism is not limited to a certain specific trust management system, and therefore, the mechanism has better universality.

Description

Highly reliable covering based on trust management in a kind of wireless sensor network is machine-processed
Technical field
The present invention relates to wireless communication field, be specifically related to the highly reliable covering mechanism of wireless sensor network.
Background technology
Along with the in recent years progress of science and technology, wireless senser is gradually to the development of the aspects such as miniaturization, high-effect, low-power consumption, and can realize the batch production of high performance-price ratio in radio communication field is used.Being accompanied by wireless sensor network WSN (Wireless Sensor Network) more and more uses in fields such as battlefield monitoring, environment and Traffic monitorings [1], in the urgent need under the condition that is subject to resource constraint, WSN fragility inevitable and attack and destruction objective reality, WSN can provide reliable service quality.But up to now, seldom there is the complete credible WSN system can the reliable network service of effective guarantee, greatly retrained the development of WSN [2-3]For conserve energy, researchers begin one's study and add the function of Coverage Control in traditional transducers, in order to use few node of trying one's best to finish the covering requirement.Be vulnerable to attack and cause node institute overlay area unsafe problems, researchers to propose again the concept of trust management in order to solve WSN, with the fail safe in ensuring coverage zone.At present, based on the Secure Routing Techniques of trust management [4,17], safe election of cluster head [18], safe integration technology [5], secure data processes [20], the secure localization technology [6,19]With the safety time simultaneous techniques [7]Deng some valuable achievements in research having occurred.But till now, also the safety covering based on trust management that can imitate of row is not machine-processed.Traditional covering algorithm or trust management model are two different research directions, the two are not combined research.Highly reliable soverlay technique is one of key issue of high credible WSN, and WSN is by the task of internodal mutual cooperation execution monitored area, target following, but the prerequisite that cooperates and basis are that the participation node is normal node, but not malicious node.In order to improve the reliability of network coverage quality, masked nodes lost efficacy covering quality was impacted, and researcher's research and design covers mechanism reliably, has obtained certain achievement in research.
Document [8] passes through additionally to increase the way of some monitoring nodes in network, come the behavior of monitoring node packet discard, helps failure node forwarding data bag, supports sensing data finally to arrive safely, exactly aggregation node.Document [9] has proposed a kind of reliable covering mechanism based on 2-Coverage, shields the inefficacy of individual node by increasing redundant cover, reaches fault-tolerant effect.Lost efficacy for fear of individual node and to cause network node integrated moving, document [10] to propose " Snake " node replacement scheme based on virtual grid.Document [16] Based on Probability overlay model has proposed to satisfy the heuritic approach of the default monitoring probability of target area, covers collection to obtain maximum satisfying the demands.More than these researchs reliable cover mechanism and mainly concentrate on to solve and reduce node failure for the impact of covering quality.Yet in real world applications, except node failure caused network coverage Quality Down, network attack etc. all can impact covering quality.For example, if the monitoring node in the network is captured by the enemy, become malicious node, the auxiliary intensification mechanism of monitoring node will lose effectiveness.For " Snake " node replacement scheme, if the individual nodes in the network or part of nodes are aging, the sensing data substantial deviation is in real data, these false data will cause false alarm, the interference user decision-making consumes limited Internet resources, causes serious consequence.
The proposition of trust management model is that traditional the effective of security mechanism replenishes, and has been applied to the every aspect in the Internet network security.For above-mentioned reasons, the application of trust management model has become current study hotspot.Current, general trust management model has a variety of, the RFSN that is wherein proposed by Ganeriwal-Srivastava [12]It is exactly a kind of typical general trust management system based on popularity.The higher energy and the storage overhead that cause in order to reduce trust management, R.A.Shaikh etc. propose a kind of packet-based lightweight trust management system [13], J.W.Ho has proposed the trust management system based on region unit [14]
Document [11] is although proposed a kind of coverage scheduling scheme based on trust management, but this scheduling scheme just simply joins trust management model in the node, only incredible node revocation, and its covering algorithm with reality is not combined during concrete scheduling.This scheduling scheme can not guarantee the covering quality of node institute overlay area, in case node sudden failure in the course of the work, its overlay area can be absorbed in partial paralysis.
Summary of the invention
The present invention studies on the basis to above document, has proposed a kind of highly reliable covering mechanism based on trust management.From document [11] based on the covering algorithm of trust management different be, emphasis on analyzing the inherent requirement of trust management system to nodes ' behavior monitoring, quantitative analysis the relation between overlay node collection size, associating degree of belief and the trust threshold, this be before the content that do not relate to of other security protocol and existing covering algorithm based on trust management.Highly reliable covering mechanism based on trust management of the present invention can be guaranteed the highly reliable covering of overlay area, can effectively reduce in running order number of nodes again.And be not limited to certain specific trust management system, therefore, have better versatility.
With the virtual subdivision in sensor network overlay area, the coordinate infall is grid point in length and breadth, will
Figure GDA00002469962200021
Rc with
Figure GDA00002469962200022
In less value as the size of virtual grid, Rc is the node communication radius, Rs is the node perceived radius, by take grid point as the center of circle, live-vertex in take node communication radius R c as the circle of the radius node of node trust threshold (degree of belief surpass) is to the grid point covering that walks abreast, take the quantized data of general trust management system as the node confidence initial data, through quantizing to obtain the associating degree of belief, the highly reliable mechanism that covers based on trust management of the present invention is united the operating state that degree of belief is dispatched working node in each grid according to this.
For convenience, defined the following symbol: N={n 1, n 2..., n h}: expression forms the sensor node collection of sensor network, { r 1, r 2..., r hIts corresponding trust value, h represents the node number.S iExpression is positioned at grid point p iAdjacent mesh in, participate in nerve of a covering lattice point p iThe overlay node collection of task, k 0Maximum node number (the k that expression overlay node collection allows 0Be system parameters, maximum is 7), k represents the node number of current overlay node collection. Node confidence threshold value when expression overlay node number is k, and
Figure GDA00002469962200024
The node that degree of belief is lower than this threshold value is judged as malicious node,
Figure GDA00002469962200025
Slightly write as Tmin.Tmax represents the associating degree of belief threshold value of grid point, is system parameters, if be lower than quality and fail safe that this threshold value then can not the ensuring coverage zone after the grid point degree of belief quantizes.T iExpression grid point p iCorresponding overlay node collection S iThe associating degree of belief that obtains, wherein
Figure GDA00002469962200026
T i(k) expression grid point p iThe associating degree of belief of the node number that corresponding overlay node integrates during as k.Among Fig. 1, Na is expressed as malicious node (hostile node), and the degree of belief of node is lower than Tmin.Nb is expressed as dormancy node (sleeping node), although the degree of belief of node is higher than the node confidence threshold value, finally is judged as redundant node through dispatching algorithm.Nc is expressed as working node (working node), and the degree of belief of node is higher than Tmin, and through the active node of dispatching algorithm.Rc: node communication radius.Rs: node perceived radius.
Provide in addition the term definition of content of the present invention:
Define 1. grid point p iCorresponding overlay node collection S iIn have working node over half normal operation to obtain perception data probability be called the associating degree of belief T of this grid i
If definition 2. grid point p iCorresponding overlay node collection S iThe associating degree of belief T that obtains iMore than or equal to the value of Tmax, then claim p iBy highly reliable covering.
If each grid point is then claimed this zone by highly reliable covering by highly reliable covering in definition 3. target areas.
Definition 4. is with grid point p iCentered by, be in the adjacent mesh or frame on sensor node be called p iInterdependent node, p iThe associated section point set we use Ω iRepresent.According to the virtual grid size that arranges, p iInterdependent node all can cover p iThe basic process of node associating nerve of a covering lattice point as shown in Figure 1, each grid point selects several working nodes as the overlay node collection in adjacent mesh, and this grid point is united execution covering task.If current nerve of a covering lattice point, greater than trust threshold
Figure GDA00002469962200031
The associating degree of belief that obtains of overlay node collection be higher than predetermined value Tmax, illustrate that this grid point has reached the requirement of highly reliable covering.For grid point p i, corresponding overlay node collection S i={ n 1, n 2, n 3, n 4Because degree of belief is lower than
Figure GDA00002469962200032
Then be judged to be broken into malicious node, therefore be excluded and uniting covering p iTask outside, n 5Although be normal working node, also can cover p i, but or owing to can not help to increase p iAssociating degree of belief T i, or because the node number k of overlay node collection has arrived maximum k 0(k 0Be system parameters), also be rejected to outside the overlay node collection.If all grid points are all by highly reliable covering, then covering task is finished.If have the associating degree of belief of grid point to be lower than threshold value Tmax, then need to re-start scheduling.
In order to make grid point can have better fail safe, requiring overlay node to concentrate has working node normal operation over half to obtain the probability of perception data greater than grid point associating degree of belief threshold value Tmax, can guarantee that like this through after (merging such as the numerical value) relevant treatment such as data fusion, data have high credible.For conserve energy, participate in to cover this grid point the working node number, be that the overlay node collection is unsuitable excessive, should be limited in k 0Individual with interior (k 0Be system parameters).
Too much for fear of the working node number, if k 0The probability that the individual node that surpasses or equal trust threshold Tmin satisfies the working node normal operation that surpasses half reaches the standard of associating degree of belief Tmax, just working node can be limited in k 0In individual.The problems referred to above can be formulated as minimum Tmin:
x k + C k 1 x k - 1 ( 1 - x ) 1 + L C k k - 1 2 x k k - 1 2 ( 1 - x ) k - 1 2 = T max 0 < x < 1 x &GreaterEqual; T min - - - ( 1 )
K is odd number, and x is the node confidence value, works as Tmax=0.95, k 0=5, the threshold value Tmin that obtains can not be less than 0.8.
When x 〉=Tmin>0.5, k is during greater than 1 odd number, Be increasing function.Therefore can obtain k 0The individual node that surpasses or equal trust threshold Tmin satisfies the probability of the working node normal operation that surpasses half more than or equal to Tmax.In like manner can obtain Tmax=0.9, k 0=5, Tmin=0.75.Work as Tmax=0.95, k 0=7, Tmin=0.77.Tmax=0.9,k 0=7,Tmin=0.72。
X coordinate among Fig. 2 is the number k of working node, and the Y coordinate is the value of the Tmin that chooses, and the Z coordinate is that the working node number is that k namely is satisfied with the poor of probability corresponding when being k+1 above half the probability of working node normal operation with the node number.If be in Tmin (0<Tmin<0.8), in this scope of k≤7, when the trust value of all working node is Tmin, when the working node number is k, the probability the when probability that satisfies the working node normal operation that surpasses half is k+1 greater than the node number, order That is:
x k + C k 1 c k - 1 ( 1 - x ) 1 + L + C k k - 1 2 x k - k - 1 2 ( 1 - x ) k - 1 2 (2)
> x k + 1 + C k + 1 1 x k ( 1 - x ) 1 + L + C k + 1 k 1 x k + 1 - k 1 ( 1 - x ) k 1
Be no more than k in the node number 0Situation under, the working node that participates in task should be odd number, if the associating trust value that the work at present set of node obtains less than Tmax, each node number that increases increases progressively with 2.
Grid point p iThe overlay node collection
Figure GDA00002469962200044
Corresponding trust value be r ' 1, r ' 2..., r ' k, r ' wherein 1〉=r ' 2〉=r ' kWherein k represents the size of overlay node collection, W KoRepresent just to have in this k the different nodes set of all combinations of o node perceived error in data,
Figure GDA00002469962200045
Represent j combination, wherein
Figure GDA00002469962200046
For example,
Figure GDA00002469962200047
The node that represents the perception data mistake has n ' 1, n ' 2..., n ' oGrid point p then iAssociating degree of belief Mathematical Modeling be:
T i = &Sigma; o = 1 k - 1 2 { &Sigma; j = 1 C k o [ &Pi; n l &prime; &Element; W k , o j ( 1 - r l &prime; ) &Pi; n l &prime; &NotElement; w k , o j r l &prime; ] } + &Sigma; l = 1 k r l &prime; &ForAll; r l &prime; &GreaterEqual; T min k ;
Exist several active nodes in the covering algorithm scheduling scheme requirement grid based on trust management and monitoring the target area, and allow all the other nodes enter resting state, reach the effect that not only keeps covering quality but also can prolong network lifetime.At this time is divided with timeslice, be divided into again node scheduling stage and working stage in each timeslice, dispatch by said method in the scheduling phase interior nodes, judge whether to participate in the covering task.If participate in, then remain on active state at working stage always, otherwise enter into resting state until next timeslice is arrived.
Convenient for afterwards statement, node is divided into four classes: a class is to belong to and only belong to S iIn set of node, use Expression; One class is to belong to but not only belong to S iIn set of node, use Expression; One class is not belong to S iBut belong to S y(other arbitrary grid point P of expression node place grid yThe overlay node collection) set of node, use
Figure GDA000024699622000411
Expression; One class is not belong to S iBut do not belong to any S yet ySet of node, use `S iExpression.Order &Omega; ^ i = S ^ i U S i % = { n ^ 1 , n ^ 2 , . . . , n ^ l } , The trust value of their correspondences is And r ^ 1 &GreaterEqual; r ^ 2 &GreaterEqual; L &GreaterEqual; r ^ l . Order S &OverBar; i = &Omega; i - &Omega; ^ i = { n &OverBar; 1 , n &OverBar; 2 , . . . , n &OverBar; f } , Wherein the trust value of their correspondences is
Figure GDA00002469962200052
And r &OverBar; 1 &GreaterEqual; r &OverBar; 2 &GreaterEqual; L &GreaterEqual; r &OverBar; f . Make Ω i=n ' 1, n ' 2..., n ' L+f, corresponding trust value be r ' 1, r ' 2..., r ' L+f, r ' wherein 1〉=r ' 2〉=r ' L+fObviously, if some node n jParticipate in the grid point set W of covering Nj={ p i, then expression If W Nj={ p i, * }, * number expression quantity is greater than 1 grid point set, then expression
Figure GDA00002469962200055
If obviously Then be illustrated in working stage node n jDo not participate in the task of any nerve of a covering lattice point, it will adjust to resting state.
Performing step based on the covering algorithm scheduling scheme of trust management is as follows:
Initialization. in the node scheduling stage, according to system parameters k 0, T Max, calculate
Figure GDA00002469962200057
L,
Figure GDA00002469962200058
Value.With Ω i,
Figure GDA00002469962200059
With
Figure GDA000024699622000510
In node be arranged in order according to the size order from big to small of trust value.
Step 1. makes k=1, if Ω iIn, r ' 1<T Max, then execution in step 2.Otherwise, judge whether Then allow if set up
Figure GDA000024699622000512
Carry out separately and cover p iTask, namely
Figure GDA000024699622000513
Figure GDA000024699622000514
In other node and
Figure GDA000024699622000515
In node all no longer participate in nerve of a covering lattice point p iTask.If be false, then order
Figure GDA000024699622000517
In node and
Figure GDA000024699622000518
In node all no longer participate in nerve of a covering lattice point p iTask.
Step 2. makes k=3, with Ω i,
Figure GDA000024699622000519
With
Figure GDA000024699622000520
Middle trust value less than
Figure GDA000024699622000521
Node in step 2, temporarily reject.Judge Ω iIn whether have k or k above node, if do not have, then execution in step 3.If have, then the decision node collection n ' 1, n ' 2, n ' 3Whether the associating trust value that obtains more than or equal to T MaxIf, be false, then execution in step 3.If set up, judge n ' 1, n ' 2, n ' 3In which node belong to
Figure GDA000024699622000522
Then at first attempt the k set of node
Figure GDA000024699622000523
Judge that whether the associating trust value that obtains is more than or equal to T MaxIf set up, then
Figure GDA000024699622000525
If be false, then will attempt successively and will belong in the current k set of node
Figure GDA000024699622000526
The node of trust value minimum, with do not belong to the k set of node,
Figure GDA000024699622000527
In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T MaxTill, if current k set of node equal n ' 1, n ' 2, n ' 3, then finish.For example, if
Figure GDA000024699622000528
Then attempt successively
Figure GDA000024699622000530
{ n ^ 1 , n ^ 2 , n &OverBar; 1 } = { n 1 &prime; , n 3 &prime; , n 2 &prime; } ; If only
Figure GDA000024699622000533
Then attempt successively
Figure GDA000024699622000534
Figure GDA000024699622000535
{ n ^ 1 , n &OverBar; 2 , n &OverBar; 1 } = { n 1 &prime; , n 3 &prime; , n 2 &prime; } .
Step 3. makes k=5<k 0, carry out according to the mode of step 2.
...
Step
Figure GDA000024699622000537
Work as k=k 0, with Ω i,
Figure GDA000024699622000538
With
Figure GDA000024699622000539
Middle trust value is less than T MinNode temporarily reject in this step.Judge Ω iIn whether have k 0Individual or k 0Individual above node if do not have, then shows p iCan not realize highly reliable covering.If have, by to the definition of trust model as can be known, set of node n ' 1, n ' 2..., n ' K0The associating trust value that obtains is necessarily more than or equal to T MaxWhich node belongs in then judging in this set of node
Figure GDA00002469962200061
Then at first attempt
Figure GDA00002469962200062
In all node with Those nodes of trust value maximum jointly form k 0Set of node judges that whether the associating trust value that obtains is more than or equal to T MaxIf, set up, then obtain S iIf, be false, then will attempt successively current k 0Belong in the set of node
Figure GDA00002469962200064
The node of trust value minimum, and do not belong to k 0Set of node,
Figure GDA00002469962200065
In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T MaxTill, if current k 0Set of node equal n ' 1, n ' 2..., n ' K0, then finish.
Step
Figure GDA00002469962200066
Readjust Ω iIn each node participate in the grid point set that covers, the grid point set according to each node regenerates
Figure GDA00002469962200067
And `S i
Description of drawings
Fig. 1 is the schematic diagram of node associating nerve of a covering lattice point.
Fig. 2 is when k is odd number, T i(k+1)-T i(k) with the graph of a relation of k, Tmin
Embodiment
The performing step of the covering algorithm scheduling scheme based on trust management of the present invention is as follows:
Initialization. in the node scheduling stage, according to system parameters k 0, T Max, calculate
Figure GDA00002469962200068
L,
Figure GDA00002469962200069
Value.With Ω i,
Figure GDA000024699622000610
With
Figure GDA000024699622000611
In node be arranged in order according to the size order from big to small of trust value.
Step 1. makes k=1, if Ω iIn, r ' 1<T Max, then execution in step 2.Otherwise, judge whether
Figure GDA000024699622000612
Then allow if set up
Figure GDA000024699622000613
Carry out separately and cover p iTask, namely
Figure GDA000024699622000614
Figure GDA000024699622000615
In other node and
Figure GDA000024699622000616
In node all no longer participate in nerve of a covering lattice point p iTask.If be false, then order
Figure GDA000024699622000617
Figure GDA000024699622000618
In node and
Figure GDA000024699622000619
In node all no longer participate in nerve of a covering lattice point p iTask.
Step 2. makes k=3, with Ω i,
Figure GDA000024699622000620
With
Figure GDA000024699622000621
Middle trust value less than
Figure GDA000024699622000622
Node in step 2, temporarily reject.Judge Ω iIn whether have k or k above node, if do not have, then execution in step 3.If have, then the decision node collection n ' 1, n ' 2, n ' 3Whether the associating trust value that obtains more than or equal to T MaxIf, be false, then execution in step 3.If set up, judge n ' 1, n ' 2, n ' 3In which node belong to
Figure GDA000024699622000623
Then at first attempt the k set of node
Figure GDA000024699622000624
Judge that whether the associating trust value that obtains is more than or equal to T MaxIf set up, then
Figure GDA000024699622000625
Figure GDA000024699622000626
If be false, then will attempt successively and will belong in the current k set of node
Figure GDA000024699622000627
The node of trust value minimum, with do not belong to the k set of node, In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T MaxTill, if current k set of node equal n ' 1, n ' 2, n ' 3, then finish.For example, if
Figure GDA000024699622000629
Figure GDA000024699622000630
Then attempt successively
Figure GDA000024699622000631
{ n ^ 1 , n ^ 2 , n &OverBar; 1 } = { n 1 &prime; , n 3 &prime; , n 2 &prime; } ; If only
Figure GDA000024699622000634
Then attempt successively
Figure GDA000024699622000635
Figure GDA000024699622000636
{ n ^ 1 , n &OverBar; 2 , n &OverBar; 1 } = { n 1 &prime; , n 3 &prime; , n 2 &prime; } .
Step 3. makes k=5<k 0, carry out according to the mode of step 2.
...
Step
Figure GDA00002469962200071
Work as k=k 0, with Ω i,
Figure GDA00002469962200072
With
Figure GDA00002469962200073
Middle trust value is less than T MinNode temporarily reject in this step.Judge Ω iIn whether have k 0Individual or k 0Individual above node if do not have, then shows p iCan not realize highly reliable covering.If have, set of node n ' 1, n ' 2..., n ' K0The associating trust value that obtains is necessarily more than or equal to T MaxJudge then which node belongs in this set of node Then at first attempt In all node with
Figure GDA00002469962200076
Those nodes of trust value maximum jointly form k 0Set of node judges that whether the associating trust value that obtains is more than or equal to T MaxIf, set up, then obtain S iIf, be false, then will attempt successively current k 0Belong in the set of node
Figure GDA00002469962200077
The node of trust value minimum, and do not belong to k 0Set of node,
Figure GDA00002469962200078
In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T MaxTill, if current k 0Set of node equal n ' 1, n ' 2..., n ' K0, then finish.
Step
Figure GDA00002469962200079
Readjust Ω iIn each node participate in the grid point set that covers, the grid point set according to each node regenerates
Figure GDA000024699622000710
And `S i
List of references
[1] Tang Qiuling, willow is blue or green, Qin Tuanfa, Zhang Shuyi. the energy-conservation modulation scheme of PPM in the wireless sensor network. and Chinese science E collects, and 2007,37 (12): 1583-1596.
[2] woods is rushed, Peng Xuehai. trustable network research. and Chinese journal of computers, 2005,28 (5): 751-758
[3]S.Ganeriwal,B.Srivastava.Trustworthy?sensor?networks:Issues,Challenges&Solutions.NESLTechnical?Report,2004.http://www.cc.ucla.edu/~saurabh/publications/tech-report-integrity.pdf
[4]S.Tanachaiwiwat,P.Dave,R.Bhindwale,A.Helmy.Secure?locations:routing?on?trust?and?isolating?compromised?sensors?inlocation-aware?sensor?networks.In:Proc.of?the?SenSys?2003.New?York:ACM?Press,2003.324-325.
[5]M.D.Krasniewski,P.Varadharajan,B.Rabeler,S.Bagchi,Y.C.Hu.TIBFIT:Trust?index?based?fault?tolerance?for?ability?datafaults?in?sensor.In:Werner?B,ed.Proc.of?the?Int'l?Conf.on?Dependable?Systems?and?Networks(DSN).Piscataway:IEEEComputerSociety,2005.672-681.
[6]Y.Zeng,J.Cao,J.Hong,L.Xie.Secure?localization?and?location?verification?inwireless?sensor?networks.MASS2009,864-869.
[7]Y.Yang,Y.Sun.Securing?Time-Synchronization?Protocols?in?Sensor?Networks:Attack?Detection?and?Self-Healing.GlobeCom2008,1-6.
[8]J.Wang,S.Medidi.Topology?control?for?reliable?sensor-to-sink?data?transport?in?sensor?networks.In:Proceedings?of?ICC,2008.3215-3219.
[9] Xu Qiang, Wang Yun. the solution of reliable covering problem among the fault-tolerant energy-saving wireless WSN. Journal of Software, 2006,17 (11): 184-191.
[10]A.Howard,M.Mataric,G.Sukhatme.An?incremental?self-deployment?algorithm?for?mobile?sensor?networks.AutonomousRobots,2002,13(2):113-126.
[11]Z.Yin,H.Zhao,K.Lin,P.Sun,D.Luo,X.Zhang,X.Wang.A?coverage-preserving?node?scheduling?scheme?based?on?trustselection?model?in?wireless?sensor?networks.Proceeding?of?ISPCA2006,2007,8:696-698.
[12]Ganeriwal?S,Srivastava?M.Reputation-based?framework?for?high?integrity?sensor?networks.In:Proc.of?the?2nd?ACMWorkshop?on?Security?of?Ad?Hoc?and?Sensor?Network(SASN?2004).New?York:ACM?press,2004.66-77.
[13]R.A.Shaikh,H.Jameel,B.J.Auriol,etc.Group-Based?Trust?Management?Scheme?for?Clustered?Wireless?Sensor?Networks.IEEE?Transactions?on?Parallel?and?Distributed?Systems.2009,20(11):1698–1712.
[14]J.W.Ho.Zone-based?tust?management?in?sensor?networks.PerCom?2009,1-2.
[15]Tian?D,Georganas?ND.A?node?scheduling?scheme?for?energy?conservation?in?large?wireless?sensor?networks.WirelessCommunications?and?Mobile?Computing,2003,3(2):271-290.
[16]He?J.,Ji?S.,Pan?Y.,et?al.Reliable?and?Energy?Efficient?Target?Coverage?for?Wireless?Sensor?Networks.2011,16(5):464-474.
[17] Wang good citizen, Guo Yuanbo, Zhan Yongzhao. inbreak-tolerated wireless sensor network blurs Trust Valuation Model. communication journal, 2010,31 (12): 37-44.
[18] Feng Renjian, Cheng Jian, Xu Xiaofeng, Wan Jiangwen. based on the credible election of cluster head algorithm of the wireless sensor network of Mamdani fuzzy reasoning. high-tech communication, 2010,20 (12): 1253-1259.
[19]X.Wang,L.Ding,S.Wang.Trust?Evaluation?Sensing?for?Wireless?Sensor?Networks.IEEE?transaction?on?instrumentation?andmeasurement,2011,60(6):2088-2095.
[20]H.Feng,G.Li,W.Lu,L.Huang.Trust?based?secure?in-network?data?processing?schema?in?wireless?sensor?networkks.Journal?ofnetworks,2011,6(2):295-302.

Claims (4)

  1. In the wireless sensor network based on the highly reliable covering mechanism of trust management, comprise general trust management system, it is characterized in that: also comprise the covering algorithm scheduling scheme based on trust management, with the virtual subdivision in sensor network overlay area, the coordinate infall is grid point in length and breadth, will
    Figure FDA00002469962100011
    With In less value as the size of virtual grid, Rs is the node perceived radius, by take grid point as the center of circle, live-vertex in take node communication radius R c as the circle of radius is to the grid point covering that walks abreast, take the quantized data of general trust management system as node confidence, through quantizing to obtain the associating degree of belief, described operating state of dispatching working node in each grid according to node confidence and associating degree of belief based on the covering algorithm scheduling scheme of trust management.
  2. 2. highly reliable covering based on trust management is machine-processed in a kind of wireless sensor network as claimed in claim 1, it is characterized in that: described
    Live-vertex be the node that degree of belief surpasses the node confidence threshold value, this node confidence threshold value is obtained by following mathematical expression:
    x k + C k 1 x k - 1 ( 1 - x ) 1 + L C k k - 1 2 x k k - 1 2 ( 1 - x ) k - 1 2 = T max 0 < x < 1 x &GreaterEqual; T min ;
    In the formula:
    K is odd number;
    Figure FDA00002469962100014
    Node trust threshold when being k0 for the overlay node number simply is expressed as Tmin;
    Tmax represents the associating degree of belief threshold value of grid point, and this is worth by default.
  3. 3. highly reliable covering based on trust management is machine-processed in a kind of wireless sensor network as claimed in claim 1, and it is characterized in that: described associating degree of belief is obtained by following mathematical expression:
    T i = &Sigma; o = 1 k - 1 2 { &Sigma; j = 1 C k o [ &Pi; n l &prime; &Element; W k , o j ( 1 - r l &prime; ) &Pi; n l &prime; &NotElement; w k , o j r l &prime; ] } + &Sigma; l = 1 k r l &prime; &ForAll; r l &prime; &GreaterEqual; T min k ;
    In the formula:
    T iExpression grid point p iCorresponding overlay node collection S iThe associating degree of belief that obtains;
    p iThe expression grid point;
    S iExpression p iCorresponding overlay node collection;
    Figure FDA00002469962100016
    Corresponding trust value be r ' 1, r ' 2..., r ' k, r ' wherein 1〉=r ' 2〉=r ' k
    K represents node number that current overlay node integrates and as odd number;
    W KoRepresent just to have in this k the different nodes set of all combinations of o node perceived error in data;
    N represents to form the sensor node collection of sensor network;
    Represent j combination, wherein
  4. 4. highly reliable covering based on trust management is machine-processed in a kind of wireless sensor network as claimed in claim 1, and it is characterized in that: described covering algorithm scheduling scheme based on trust management is realized by following steps:
    Initialization. in the node scheduling stage, according to system parameters k 0, T Max, calculate
    Figure FDA00002469962100023
    L,
    Figure FDA00002469962100024
    Value, with Ω i,
    Figure FDA00002469962100025
    With
    Figure FDA00002469962100026
    In node be arranged in order according to the size order from big to small of trust value;
    Step 1. makes k=1, if Ω iIn, r ' 1<T Max, then execution in step 2, otherwise, judge whether Then allow if set up
    Figure FDA00002469962100028
    Carry out separately and cover p iTask, namely
    Figure FDA00002469962100029
    Figure FDA000024699621000210
    In other node and
    Figure FDA000024699621000211
    In node all no longer participate in nerve of a covering lattice point p iTask, if be false, then the order
    Figure FDA000024699621000212
    Figure FDA000024699621000213
    In node and
    Figure FDA000024699621000214
    In node all no longer participate in nerve of a covering lattice point p iTask;
    Step 2. makes k=3, with Ω i, With Middle trust value less than
    Figure FDA000024699621000217
    Node in step 2, temporarily reject, judge Ω iIn whether have k or k above node, if do not have, then execution in step 3.If have, then the decision node collection n ' 1, n ' 2, n ' 3Whether the associating trust value that obtains more than or equal to T MaxIf, be false, then execution in step 3.If set up, judge n ' 1, n ' 2, n ' 3In which node belong to
    Figure FDA000024699621000218
    Then at first attempt the k set of node
    Figure FDA000024699621000219
    Judge that whether the associating trust value that obtains is more than or equal to T MaxIf set up, then
    Figure FDA000024699621000221
    If be false, then will attempt successively and will belong in the current k set of node The node of trust value minimum, with do not belong to the k set of node,
    Figure FDA000024699621000223
    In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T MaxTill, if current k set of node equal n ' 1, n ' 2, n ' 3, then finish;
    Step 3. makes k=5<k 0, carry out according to the mode of step 2;
    ......
    Step
    Figure FDA000024699621000224
    Work as k=k 0, with Ω i,
    Figure FDA000024699621000225
    With
    Figure FDA000024699621000226
    Middle trust value is less than T MinNode temporarily reject in this step; Judge Ω iIn whether have k 0Individual or k 0Individual above node if do not have, then shows p iCan not realize highly reliable covering; If have, by to the definition of trust model as can be known, set of node n ' 1, n ' 2..., n ' K0The associating trust value that obtains is necessarily more than or equal to T MaxWhich node belongs in then judging in this set of node
    Figure FDA000024699621000227
    Then at first attempt
    Figure FDA000024699621000228
    In all node with
    Figure FDA000024699621000229
    Those nodes of trust value maximum jointly form k 0Set of node judges that whether the associating trust value that obtains is more than or equal to T MaxIf, set up, then obtain S iIf, be false, then will attempt successively current k 0Belong in the set of node
    Figure FDA000024699621000230
    The node of trust value minimum, and do not belong to k 0Set of node, In the node replacement of trust value maximum, until satisfy the associating trust value that obtains more than or equal to T MaxTill, if current k 0Set of node equal n ' 1, n ' 2..., n ' K0, then finish;
    Step
    Figure FDA00002469962100031
    Readjust Ω iIn each node participate in the grid point set that covers, the grid point set according to each node regenerates
    Figure FDA00002469962100032
    Figure FDA00002469962100033
    And `S i
    Wherein:
    N represents to form the sensor node collection of sensor network, N={n 1, n 2..., n b; { r 1, r 2..., r hTrust value corresponding to expression N, h represents the node number; K represents node number that current overlay node integrates and as odd number; k 0The maximum node number that expression overlay node collection allows, k 0By default;
    Figure FDA00002469962100034
    Node trust threshold when being k for the overlay node number, and
    Figure FDA00002469962100035
    Tmax represents the associating degree of belief threshold value of grid point, and this is worth by default;
    p iExpression grid point center; S iExpression p iCorresponding overlay node collection; Ω iExpression p iThe associated section point set;
    Figure FDA00002469962100036
    Expression belongs to and only belongs to S iIn set of node;
    Figure FDA00002469962100037
    Expression belongs to but not only belongs to S iIn set of node;
    Figure FDA00002469962100038
    Expression does not belong to S iBut belong to S iSet of node, j ∈ { N-{i}}; `S iExpression does not belong to S iBut do not belong to any S yet jSet of node;
    &Omega; ^ i = S ^ i U S i % = { n ^ 1 , n ^ 2 , . . . , n ^ l } , Corresponding trust value is
    Figure FDA000024699621000310
    And r ^ 1 &GreaterEqual; r ^ 2 &GreaterEqual; L &GreaterEqual; r ^ l ; S &OverBar; i = &Omega; i - &Omega; ^ i = { n &OverBar; 1 , n &OverBar; 2 , . . . , n &OverBar; f } , Corresponding trust value is
    Figure FDA000024699621000313
    And r &OverBar; 1 &GreaterEqual; r &OverBar; 2 &GreaterEqual; L &GreaterEqual; r &OverBar; f ; Ω i=n ' 1, n ' 2..., n ' L+f,, corresponding trust value be r ' 1, r ' 2..., r ' L+f,, r ' wherein 1〉=r ' 2〉=r ' L+f
CN201210487585.5A 2012-11-27 2012-11-27 Highly reliable covering mechanism based on trust management in wireless sensor network Expired - Fee Related CN102932804B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210487585.5A CN102932804B (en) 2012-11-27 2012-11-27 Highly reliable covering mechanism based on trust management in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210487585.5A CN102932804B (en) 2012-11-27 2012-11-27 Highly reliable covering mechanism based on trust management in wireless sensor network

Publications (2)

Publication Number Publication Date
CN102932804A true CN102932804A (en) 2013-02-13
CN102932804B CN102932804B (en) 2015-04-29

Family

ID=47647481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210487585.5A Expired - Fee Related CN102932804B (en) 2012-11-27 2012-11-27 Highly reliable covering mechanism based on trust management in wireless sensor network

Country Status (1)

Country Link
CN (1) CN102932804B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152741A (en) * 2013-03-23 2013-06-12 江南大学 Rapid detection method of deployment effect of terminals in region
CN103281748A (en) * 2013-06-13 2013-09-04 清华大学 Wireless sensor network node routing method based on link liveness
CN107027172A (en) * 2017-03-13 2017-08-08 浙江大学 A kind of distributed object location estimation method for resisting suspicious data
CN107426790A (en) * 2017-07-28 2017-12-01 广东技术师范学院 A kind of passive sensory network node scheduling system and method
CN110267323A (en) * 2019-05-21 2019-09-20 杭州电子科技大学 A kind of connection target K covering method based on adjustable the perception radius model

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090328148A1 (en) * 2008-06-30 2009-12-31 Industry-Academic Cooperation Foundation Of Kyung Hee University Method of trust management in wireless sensor networks
CN101977395A (en) * 2010-10-04 2011-02-16 桂林电子科技大学 Node trust management system in wireless sensor network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090328148A1 (en) * 2008-06-30 2009-12-31 Industry-Academic Cooperation Foundation Of Kyung Hee University Method of trust management in wireless sensor networks
CN101977395A (en) * 2010-10-04 2011-02-16 桂林电子科技大学 Node trust management system in wireless sensor network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李小龙: "无线传感器网络中的覆盖算法研究", 《中国博士学位论文全文数据库 信息科技辑》, 15 January 2010 (2010-01-15) *
荆琦,唐礼勇,陈钟: "无线传感器网络中的信任管理", 《软件学报》, vol. 19, no. 7, 31 July 2008 (2008-07-31), pages 1716 - 1730 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152741A (en) * 2013-03-23 2013-06-12 江南大学 Rapid detection method of deployment effect of terminals in region
CN103281748A (en) * 2013-06-13 2013-09-04 清华大学 Wireless sensor network node routing method based on link liveness
CN103281748B (en) * 2013-06-13 2015-08-12 清华大学 Based on the wireless sensor network node route selecting method of link liveness
CN107027172A (en) * 2017-03-13 2017-08-08 浙江大学 A kind of distributed object location estimation method for resisting suspicious data
CN107027172B (en) * 2017-03-13 2019-11-15 浙江大学 A kind of distributed object location estimation method fighting suspicious data
CN107426790A (en) * 2017-07-28 2017-12-01 广东技术师范学院 A kind of passive sensory network node scheduling system and method
CN110267323A (en) * 2019-05-21 2019-09-20 杭州电子科技大学 A kind of connection target K covering method based on adjustable the perception radius model

Also Published As

Publication number Publication date
CN102932804B (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN102932804B (en) Highly reliable covering mechanism based on trust management in wireless sensor network
Jin et al. Multi-agent trust-based intrusion detection scheme for wireless sensor networks
Bhuiyan et al. Sensor placement with multiple objectives for structural health monitoring in WSNs
CN101917777B (en) Wireless sensor network node sleep qualification judging method based on cooperation between neighboring nodes
Zhang et al. An energy-efficient multilevel secure routing protocol in IoT networks
CN104270805A (en) Dynamic-target-tracking-oriented sleeping scheduling method for nodes of energy capturing sensor network
Akhtar et al. Classification of selfish and regular nodes based on reputation values in MANET using adaptive decision boundary
CN102983948B (en) A kind of radio sensing network self-adaption cluster transmission method and device thereof
Li et al. Communication cost minimization in wireless sensor and actor networks for road surveillance
Forootaninia et al. An improved watchdog technique based on power-aware hierarchical design for ids in wireless sensor networks
CN104168631A (en) Wireless sensor network energy balance coverage scheduling and cross-layer routing design method
Wang et al. Optimization of Wireless Sensor Network Architecture with Security System
Li et al. Mobile agents-based intrusion detection system for mobile ad hoc networks
Abdel-Fattah et al. Dynamic intrusion detection technique for dynamic mobile ad hoc network
CN103002438A (en) Network behavior monitoring method based on support vector machine (SVM) and trust control
Bello et al. Energy efficient for data aggregation in wireless sensor networks
Ye et al. Energy allocation for stochastic event detection in rechargeable sensor networks
Sun et al. CoC-SCS: Cooperative-optimization coverage algorithm based on sensor cloud systems in intelligent computing
Carnevale et al. From Cloud-Edge to Edge-Edge Continuum: the Swarm-Based Edge Computing Systems
Jangid et al. Mobile Wireless ADHOC Networks Energy Consumption Monitoring and Quality of Service Analysis
Pandey et al. The use of Analytical Hierarchy Process in sensor-based networks for security-aware congestion control.
Sivasakthiselvan et al. Cluster based Routing Schemes in Mobile Sensor Networks: A Review
Yang et al. An energy-efficient data gathering algorithm based on clustering for wireless sensor networks
Kumari et al. Revival of selfish nodes in clustered MANET
Wang et al. Energy-efficient routing algorithm for WSNs in underground mining

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150429

Termination date: 20151127

EXPY Termination of patent right or utility model