CN103209453B - Trust routing algorithm of wireless sensor network based on topological structure - Google Patents

Trust routing algorithm of wireless sensor network based on topological structure Download PDF

Info

Publication number
CN103209453B
CN103209453B CN201310148141.3A CN201310148141A CN103209453B CN 103209453 B CN103209453 B CN 103209453B CN 201310148141 A CN201310148141 A CN 201310148141A CN 103209453 B CN103209453 B CN 103209453B
Authority
CN
China
Prior art keywords
node
trust
value
interval
crs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310148141.3A
Other languages
Chinese (zh)
Other versions
CN103209453A (en
Inventor
张瑞华
陈中伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University
Original Assignee
Shandong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University filed Critical Shandong University
Priority to CN201310148141.3A priority Critical patent/CN103209453B/en
Publication of CN103209453A publication Critical patent/CN103209453A/en
Application granted granted Critical
Publication of CN103209453B publication Critical patent/CN103209453B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a trust routing algorithm of a wireless sensor network based on a topological structure. The method includes that (1) a topological value is initialized so as to enable a node to locate its topological position in the network and informs a neighbor node; (2) a node trust value is calculated, an attacking node of the network is detected, and whether the attacking node meets a trust value updating condition is judged, on yes judgment, the trust value is updated and a step (3) is entered, on no judgment, the step (3) is entered directly; (3) node selecting probability is calculated: the topological value is combined with the trust value to obtain the probability CRS of all neighbor nodes to be selected as next hop routing node; and (4) fuzzy selection is conducted, whether the next hop routing node is selected is judged, on yes judgment, information is sent or forwarded, on no judgment, whether the nodes to be selected are empty is judged, on yes judgment, the step (1) is returned, and on no judgment, node information forwarding failure is informed.

Description

Based on the trust routing algorithm of the radio sensing network of topological structure
Technical field
The present invention relates to a kind of trust routing algorithm, be specifically related to a kind of trust routing algorithm of the radio sensing network based on topological structure.
Background technology
Radio sensing network forms by being deployed in cheap microsensor nodes a large amount of in monitored area, a multihop self-organizing network system is formed by communication, its objective is the information of perceived object in perception collaboratively, acquisition and processing network's coverage area, and send to observer.Along with the extensive use of radio sensing network, especially in military affairs with business, network is needed to have enough security credibility.
The factors such as foundation-free facility, wireless link cause radio sensing network to have the system vulnerability such as eavesdropping, personation, are vulnerable to various attack, as node capture attack, selective forwarding attack, Sybil attack, Sinkhole attack, wormhole attack.Credible and secure route becomes an important research direction of radio sensing network.Because sensor node calculates, to store and the restriction of energy consumption resource makes common routing safety mechanism well can not be applied to radio sensing network.
Existing radio sensing network Routing Protocol is roughly divided into following a few class: Energy-aware routing protocol, based on the Routing Protocol of inquiry and geographic routing agreement etc.These agreements mainly discuss the routing mechanism of sensing network from energy consumption and implementation aspect, in order to ensure the reliability of transfer of data, being reached, cause the part of network energy to waste, and can not effectively resist various attack by the mode increasing redundancy.More existing security routing are propose for general self-organizing Ad hoc network mostly, and it is still little for the research of radio sensing network Security routing aspect, the representational agreement of most is SPINS [Perrig A.SPINS:security protocols for sensor networks.Wireless Networks, 2002,8 (8): 521-534.], this agreement is intended to solve the secure communication problem of the wireless sensor network with limited resources, and it introduces SNEP and μ TESLA2 safety member.SNEP agreement adopts 2 synchronous counters at communicating pair, and is applied to during encryption and message authentication code (MAC, message authentication code) calculate, thus acquisition data confidentiality, data authentication and integrity function.μ TESLA agreement realizes certification broadcast by application symmetric key algorithm, it is at TESTLA [Hu Y, Perrig A, Johnson D.Ariadne:a secure on demand routing protocol for Ad hocnetworks.Proceedings of ACM MOBICOM.Atlanta:[s.n.], 2002:12-23.] protocol basis carries out expansion and applicability transformation, the wireless sensor network that resource is height-limited can be met.SPINS agreement also utilizes the point-to-point key agreement of SNEP and μ TESLA protocol realization Routing Authentication scheme and safety respectively.
The security routing of radio sensing network is mostly the transformation based on Ad hoc security routing in summary, and traditional trust management is suitably simplified.And traditional trust management is as public key encryption, authentication etc., because need complicated software, hardware, mass storage, high processing rate and communication bandwidth to be not suitable for radio sensing network.Therefore, the novel trust management system being applied to radio sensing network is suggested, the trust management that it only needs a small amount of node resource just can realize radio sensing network, resists various attack.
Summary of the invention
The object of the invention is the deficiency for overcoming above-mentioned existing traditional trust management technology, proposing a kind of trust routing algorithm of novel trust management system of the radio sensing network based on topological structure.It considers that node security is on the impact of Route Selection, and whether the confidence level according to node meets constraints to form active path, ensures the safety of RFDC better.
For achieving the above object, the present invention adopts following technical proposals:
Based on a trust routing algorithm for the radio sensing network of topological structure, concrete steps are as follows:
The initialization of step 1) topology value, to make node locating oneself topology location in a network, and informs neighbor node;
Step 2) node trust value computing, the attack node of Sampling network, and judge whether to reach belief updating condition, if enter step 3) after if so, then upgrading trust value, if no, then directly enter step 3);
Step 3) sensor selection problem probability calculation: topology value and trust value are combined and obtains the proportionality coefficient CRS that each neighbor node is chosen as down hop routing node;
Step 4) Fuzzy Selection, and judge whether to select down hop routing node, if if so, then transmission or forwarding messages, to next-hop node, if no, then judge whether node to be selected is empty; If if so, then return step 1), if no, then notify upper hop sending node information retransmission failure.
Described step 1) is divided into two parts:
A) network start-up phase node initializing: it is initiated primarily of base station, carries out the distinguishing hierarchy of network, and node initializing self topology value also records neighbor information; Its flow process is: by base station broadcast initialization information, cell site topology value level=0, and neighbor node is initialization after receiving broadcast message;
B) running interior joint upgrades: in network operation process, when node finds its upper strata neighbor node and this layer of neighbor node is all in non-operating state, node will upgrade the topology value of self again, wherein, what topology value was little is upper strata, equal is this layer, and large is lower floor, and described non-operating state is node dormancy or death; Its flow process is: self is reset to no initializtion state by node, and to neighbours' broadcast request neighbor information, self information is sent to requesting node by neighbours after receiving the request; Node reinitializes after receiving neighbor information.
Described initialized concrete grammar is:
Step 1-1) receive neighbours' topology value information, its topology value is i, determines whether that first time receives, if if so, then enter step 1-2), if no, then judge whether self topology value j is greater than i+1; If if so, then enter step 1-2), if no, then enter step 1-3);
Step 1-2) self topology value is for i+1, broadcast topology value information, to neighbor node, enters step 1-3);
Step 1-3) record neighbor information.
Described step 2) interior joint trust value comprises direct trust, indirectly trusts and comprehensively trust three parts:
Described direct trust be evaluation node A according to be evaluated the direct interaction of Node B and the trust evaluation value made, be designated as T direct (A → B); The acquisition of direct trust value is mainly according to the history trust value T of node olddirectwith current trust value T newdirectformula (1) and (2) are utilized to calculate:
T direct(A→B)=w old×T olddirect+w new×T newdirect(1)
T newdirect ( A → B ) = S A → B C A → B - - - ( 2 )
W oldand w newrefer to the proportion that history trust value and current trust value are shared in the calculation, and w old+ w new=1; S a → Brefer to the number of times of Node B normal process from node A message, C a → Brefer to that node A sends message to the total degree of Node B;
Described indirect trust be evaluation node A according to be evaluated Node B and self all have the trust evaluation information of third party's node C of direct interaction and the evaluation of estimate made, be designated as T recommend (A → B); Indirect trust values utilizes formula (3) to calculate:
T recommend ( A → B ) = 1 m × Σ j = 1 m ( T driect ( A → C j ) × T direct ( C j → B ) ) - - - ( 3 )
Wherein m is the number of third party's node, C jrepresent jth tripartite's node;
Described comprehensive trust is node A according to the direct trust of Node B and the assessment of totally trusting of indirectly trusting and carrying out, and is designated as T integrate (A → B); Formula (4) is utilized to calculate:
T integrate (A → B)=w direct× T direct (A → B)+ w recommend× T recommend (A → B)(4) w directand w recommendrefer to and directly trust and indirectly trust proportion shared in the calculation, w direct+ w recommend=1; Work as T in the calculation direct (A → B)value, for time empty, remembers w recommend=1, in like manner, work as T recommend (A → B)during for sky, note w direct=1.
Described step 3) interior joint A selection neighbor node B is the proportionality coefficient CRS of next-hop node, and formula is as follows:
CRS ( A → B ) = 1 C A . TL - B . TL × T integrate ( A → B ) - - - ( 5 )
Wherein, C is constant and C<1, and concrete value defines according to application scenarios, and A.TL is the topology value of node A, and B.TL is the topology value of Node B.
In described step 4), Fuzzy Selection, selects down hop routing node, and concrete steps are:
Step 4-1) core of Fuzzy Selection is that fuzzy interval divides, its general principle is:
Interval [0,1] is divided into n interval [0, A 1+ F/2], [A 1-F/2, A 2+ F/2] ..., [A i-F/2, A i+1+ F/2] ..., [A n-1-F/2,1], A ifor constant, equal i=1,2 ..., (n-1), F is fuzzy interval width, is less than interval overlapping portion is fuzzy interval, and interval non-superimposed part is between absolute field, [A i-F/2, A i+1+ F/2] interval of to be grade be i;
Step 4-2) fuzzy interval divide after, be chosen as the proportionality coefficient CRS value of next-hop node according to both candidate nodes, both candidate nodes put into fuzzy interval, then carries out Fuzzy Selection:
First [0,1] between selection area is divided into n interval, both candidate nodes is put into relevant position, fuzzy interval by CRS value size; Then according to the Fuzzy Selection grade γ that system pre-sets, start to choose from interval [1, ∞], if choose next-hop node, return results, otherwise again from [A n-1-F/2, ∞] choose ..., until interval [A n-k-F/2, ∞] till, subscript k meets relational expression wherein, n is the interval number that interval [0,1] is divided equally, and γ is the Fuzzy Selection grade that system pre-sets; The node selected is down hop routing node.
Described step 4-2) in, proportionality coefficient CRS and interval [A i-F/2, A i+1+ F/2] attaching relation represent with formula (6), n is the interval number that interval [0,1] is divided equally.
P = 1 , CRS &Element; [ A i , A i + 1 ] &cup; ( CRS &GreaterEqual; 1 ) f ( CRS ) , CRS &Element; [ A i - F / 2 , A i ] &cup; [ A i + 1 , A i + 1 + F / 2 ] Wherein, i=1,2 ..., n-2 (6)
P is that CRS belongs to interval [A i-F/2, A i+1+ F/2] probability, f (CRS) is ownership function, and according to the definition of embody rule scene, and 0≤f (CRS)≤1, f (CRS) are
f ( CRS ) = cos ( &pi; F &times; ( A i - CRS ) ) , CRS &Element; [ A i - F / 2 , A i ] cos ( &pi; F &times; ( CRS - A i + 1 ) ) , CRS &Element; [ A i + 1 , A i + 1 + F / 2 ] Wherein, i=1,2 ..., n-2 (7)
N is the interval number that interval [0,1] is divided equally.
Beneficial effect of the present invention:
1. the computational methods of the node trust value described in the present invention are based on a kind of novel trust management system, need special software and hardware support relative to traditional trust management system and take the factors such as great deal of nodes resource, this algorithm is without the need to special software and hardware support and without the need to taking ample resources.
2. the present invention specifically comprises the initialization of topology value, node trust value computing, sensor selection problem probability calculation and Fuzzy Selection four steps.Make node locating oneself topology location in a network by the initialization of topology value, and inform neighbor node, for Fuzzy Selection below provides location parameter.Detected the attack node of network by node trust value computing, strengthen the anti-attack ability of network.
3. before carrying out Fuzzy Selection, first according to the topology value of node and the selection percentage coefficient of trust value computing node.The lower node of node topology value from base station more close to, select the low node of topology value as down hop, can reduce hop count, under identical trust value condition, jumping figure is fewer, and link is more stable; For trust value, select the higher node of trust value as down hop, then link is more stable.
4., when selecting down hop route according to trust value size, the principle of application fuzzy mathematics carries out Fuzzy Selection to down hop routing node, effectively prevent and occurs that node energy consumes unbalanced situation when selecting high trusted node.
5 in a word, and the present invention can make information be transferred to destination node with higher accuracy and less time delay from source node, and can make network attack and reacting fast, and it takies less node resource simultaneously.
Accompanying drawing explanation
Fig. 1 is overall flow figure of the present invention;
Fig. 2 is the initialized flow chart of topology value;
Fig. 3 is [A i-F/2, A j+ F/2] fuzzy interval schematic diagram.
Embodiment
Below in conjunction with drawings and Examples, the present invention will be further elaborated, should be noted that following explanation is only to explain the present invention, not limiting its content.
As shown in Figure 1, the invention provides a kind of trust routing algorithm of the radio sensing network based on topological structure, concrete steps are as follows:
The initialization of step 1) topology value, to make node locating oneself topology location in a network, and informs neighbor node;
Step 2) node trust value computing, the attack node of Sampling network, and judge whether to reach belief updating condition, if enter step 3) after if so, then upgrading trust value, if no, then directly enter step 3);
Step 3) sensor selection problem probability calculation: topology value and trust value are combined and obtains the proportionality coefficient CRS that each neighbor node is chosen as down hop routing node;
Step 4) Fuzzy Selection, and judge whether to select down hop routing node, if if so, then transmission or forwarding messages, to next-hop node, if no, then judge whether node to be selected is empty; If if so, then return step 1), if no, then notify upper hop sending node information retransmission failure.
Described step 1) is divided into two parts:
A) network start-up phase node initializing: it is initiated primarily of base station, carries out the distinguishing hierarchy of network, and node initializing self topology value also records neighbor information; Its flow process is: by base station broadcast initialization information, cell site topology value level=0, and neighbor node is initialization after receiving broadcast message;
B) running interior joint upgrades: in network operation process, when node finds its upper strata neighbor node and this layer of neighbor node is all in non-operating state, node will upgrade the topology value of self again, wherein, what topology value was little is upper strata, equal is this layer, and large is lower floor, and non-operating state is node dormancy or death; Its flow process is: self is reset to no initializtion state by node, and to neighbours' broadcast request neighbor information, self information is sent to requesting node by neighbours after receiving the request; Node reinitializes after receiving neighbor information.
Wherein, initialized concrete grammar (Fig. 2) is:
Step 1-1) receive neighbours' topology value information, its topology value is i, determines whether that first time receives, if if so, then enter step 1-2), if no, then judge whether self topology value j is greater than i+1; If if so, then enter step 1-2), if no, then enter step 1-3);
Step 1-2) self topology value is for i+1, broadcast topology value information, to neighbor node, enters step 1-3);
Step 1-3) record neighbor information.
Described step 2) interior joint trust value comprises direct trust, indirectly trusts and comprehensively trust three parts:
Direct trust be evaluation node A according to be evaluated the direct interaction of Node B and the trust evaluation value made, be designated as T direct (A → B); The acquisition of direct trust value is mainly according to the history trust value T of node olddirectwith current trust value T newdirectformula (1) and (2) are utilized to calculate:
T direct(A→B)=w old×T olddirect+w new×T newdirect(1)
T newdirect ( A &RightArrow; B ) = S A &RightArrow; B C A &RightArrow; B - - - ( 2 )
W oldand w newrefer to the proportion that history trust value and current trust value are shared in the calculation, and w old+ w new=1; S a → Brefer to the number of times of Node B normal process from node A message, C a → Brefer to that node A sends message to the total degree of Node B;
Indirect trust be evaluation node A according to be evaluated Node B and self all have the trust evaluation information of third party's node C of direct interaction and the evaluation of estimate made, be designated as T recommend (A → B); Indirect trust values utilizes formula (3) to calculate:
T recommend ( A &RightArrow; B ) = 1 m &times; &Sigma; j = 1 m ( T driect ( A &RightArrow; C j ) &times; T direct ( C j &RightArrow; B ) ) - - - ( 3 )
Wherein m is the number of third party's node, C jrepresent jth tripartite's node;
Comprehensive trust is node A according to the direct trust of Node B and the assessment of totally trusting of indirectly trusting and carrying out, and is designated as T integrate (A → B); Formula (4) is utilized to calculate:
T integrate (A → B)=w direct× T direct (A → B)+ w recommend× T recommend (A → B)(4) w directand w recommendrefer to and directly trust and indirectly trust proportion shared in the calculation, w direct+ w recommend=1; Work as T in the calculation direct (A → B)value, for time empty, remembers w recommend=1, together should T recommend (A → B)during for sky, note w direct=1.
Described step 3) interior joint A selection neighbor node B is the proportionality coefficient CRS of next-hop node, and formula is as follows:
CRS ( A &RightArrow; B ) = 1 C A . TL - B . TL &times; T integrate ( A &RightArrow; B ) - - - ( 5 )
Wherein, C is constant and C<1, and occurrence artificially defines according to scene, and A.TL is the topology value of node A, and B.TL is the topology value of Node B.Known according to formula (5), when being evaluated node trust value and being equal, the less then select probability value of topology value is larger; When topology value is identical, trust value larger then select probability value is larger.
In described step 4), Fuzzy Selection, selects down hop routing node, and concrete steps are:
Step 4-1) core of Fuzzy Selection is that fuzzy interval divides, its general principle is:
Interval [0,1] is divided into n interval [0, A 1+ F/2], [A 1-F/2, A 2+ F/2] ..., [A i-F/2, A i+1+ F/2] ..., [A n-1-F/2,1], A ifor constant, equal i=1,2 ..., (n-1), namely i is for being more than or equal to the natural number that 1 is less than or equal to (n-1), and F is fuzzy interval width, is less than interval overlapping portion is fuzzy interval, and interval non-superimposed part is between absolute field, [A i-F/2, A i+1+ F/2] interval of to be grade be i;
Step 4-2) fuzzy interval divide after, be chosen as the proportionality coefficient CRS value of next-hop node according to both candidate nodes, both candidate nodes put into fuzzy interval, then carries out Fuzzy Selection:
First [0,1] between selection area is divided into n interval, both candidate nodes is put into relevant position, fuzzy interval by CRS value size, and the code 1-6 namely in table 1 is capable; Then according to the Fuzzy Selection grade γ that system pre-sets, start to choose from interval [1, ∞], if choose next-hop node, return results, otherwise again from [A n-1-F/2, ∞] choose ..., until interval [A n-k-F/2, ∞] till, subscript k meets relational expression wherein, n is the interval number that interval [0,1] is divided equally, and γ is the Fuzzy Selection grade that system pre-sets; The node selected is down hop routing node.
Described step 4-2) in, Fig. 3 is [A i-F/2, A j+ F/2] fuzzy interval divide schematic diagram, wherein, abscissa is fuzzy interval, and ordinate is probability, j=i+1, i=1,2 ..., n-2, n be interval [0, the 1] interval number of dividing equally; In figure, [A i, A j] between absolute field, [A i-F/2, A i] and [A j, A j+ F/2] be fuzzy interval, proportionality coefficient CRS and interval [A i-F/2, A i+1+ F/2] attaching relation represent with formula (6), n is the interval number that interval [0,1] is divided equally.
P = 1 , CRS &Element; [ A i , A i + 1 ] &cup; ( CRS &GreaterEqual; 1 ) f ( CRS ) , CRS &Element; [ A i - F / 2 , A i ] &cup; [ A i + 1 , A i + 1 + F / 2 ] Wherein, i=1,2 ..., n-2 (6)
P is that CRS belongs to interval [A i-F/2, A i+1+ F/2] probability, f (CRS) is ownership function, and according to the definition of embody rule scene, and 0≤f (CRS)≤1, f (CRS) is herein
f ( CRS ) = cos ( &pi; F &times; ( A i - CRS ) ) , CRS &Element; [ A i - F / 2 , A i ] cos ( &pi; F &times; ( CRS - A i + 1 ) ) , CRS &Element; [ A i + 1 , A i + 1 + F / 2 ] Wherein, i=1,2 ..., n-2 (7)
N is the interval number that interval [0,1] is divided equally.
The false code of the detailed process of Fuzzy Selection algorithm is as shown in table 1.In table, A is all node set that topology value is less than local node.K is step 4-2) in definition.
Table 1. Fuzzy Selection algorithm false code
By reference to the accompanying drawings the specific embodiment of the present invention is described although above-mentioned; but not limiting the scope of the invention; on the basis of technical scheme of the present invention, those skilled in the art do not need to pay various amendment or distortion that creative work can make still within protection scope of the present invention.

Claims (6)

1., based on a trust routing algorithm for the radio sensing network of topological structure, it is characterized in that, concrete steps are as follows:
Step 1) initialization of topology value, to make node locating oneself topology location in a network, and inform neighbor node;
Step 2) node trust value computing, the attack node of Sampling network, and judge whether to reach belief updating condition, if enter step 3 after if so, then upgrading trust value), if no, then directly enter step 3);
Step 3) sensor selection problem probability calculation: topology value and trust value are combined and obtains the proportionality coefficient CRS that each neighbor node is chosen as down hop routing node;
Step 4) Fuzzy Selection, and judge whether to select down hop routing node, if if so, then send or forward the message to next-hop node, if no, then judge whether node to be selected is empty; If if so, then return step 1), if no, then notify sending node information retransmission failure;
Described step 2) interior joint trust value comprises direct trust, indirectly trusts and comprehensively trust three parts:
Described direct trust be evaluation node A according to be evaluated the direct interaction of Node B and the trust evaluation value made, be designated as T direct (A → B); The acquisition of direct trust value is mainly according to the history trust value T of node olddirectwith current trust value T newdirectformula (1) and (2) are utilized to calculate:
T direct(A→B)=w old×T olddirect+w new×T newdirect(1)
T newdirect ( A &RightArrow; B ) = S A &RightArrow; B C A &RightArrow; B - - - ( 2 )
W oldand w newrefer to the proportion that history trust value and current trust value are shared in the calculation, and w old+ w new=1; S a → Brefer to the number of times of Node B normal process from node A message, C a → Brefer to that node A sends message to the total degree of Node B;
Described indirect trust be evaluation node A according to be evaluated Node B and self all have the trust evaluation information of third party's node C of direct interaction and the evaluation of estimate made, be designated as T recommend (A → B); Indirect trust values utilizes formula (3) to calculate:
T recommend ( A &RightArrow; B ) = 1 m &times; &Sigma; j = 1 m T driect ( A &RightArrow; C j ) &times; T direct ( C i &RightArrow; B ) - - - ( 3 )
Wherein m is the number of third party's node, C jrepresent jth tripartite's node;
Described comprehensive trust is node A according to the direct trust of Node B and the assessment of totally trusting of indirectly trusting and carrying out, and is designated as T integrate (A → B); Formula (4) is utilized to calculate:
T integrate(A→B)=w direct×T direct(A→B)+w recommend×T recommend(A→B)(4)
W directand w recommendrefer to and directly trust and indirectly trust proportion shared in the calculation, w direct+ w recommend=1; Work as T in the calculation direc (tA → B)value, for time empty, remembers w recommend=1, together should T recomme (nAd → B)during for sky, note w direct=1.
2. trust routing algorithm according to claim 1, is characterized in that, described step 1) be divided into two parts:
A) network start-up phase node initializing: it is initiated primarily of base station, carries out the distinguishing hierarchy of network, and node initializing self topology value also records neighbor information; Its flow process is: by base station broadcast initialization information, cell site topology value level=0, and neighbor node is initialization after receiving broadcast message;
B) running interior joint upgrades: in network operation process, when node finds its upper strata neighbor node and this layer of neighbor node is all in non-operating state, node will upgrade the topology value of self again, wherein, what topology value was little is upper strata, equal is this layer, and large is lower floor, and described non-operating state is node dormancy or death; Its flow process is: self is reset to no initializtion state by node, and to neighbours' broadcast request neighbor information, self information is sent to requesting node by neighbours after receiving the request; Node reinitializes after receiving neighbor information.
3. trust routing algorithm according to claim 2, is characterized in that, described initialized concrete grammar is:
Step 1-1) receive neighbours' topology value information, its topology value is i, determines whether that first time receives, if if so, then enter step 1-2), if no, then judge whether self topology value j is greater than i+1; If if so, then enter step 1-2), if no, then enter step 1-3);
Step 1-2) self topology value is for i+1, broadcast topology value information, to neighbor node, enters step 1-3);
Step 1-3) record neighbor information.
4. trust routing algorithm according to claim 1, is characterized in that, described step 3) interior joint A selects neighbor node B to be the proportionality coefficient CRS of next-hop node, and formula is as follows:
CRS ( A &RightArrow; B ) = 1 C A . TL - B . TL &times; T integrate ( A &RightArrow; B ) - - - ( 5 )
Wherein, C is constant and C<1, and concrete value defines according to application scenarios, and A.TL is the topology value of node A, and B.TL is the topology value of Node B.
5. trust routing algorithm according to claim 4, is characterized in that, described step 4) in, Fuzzy Selection, selects down hop routing node, and concrete steps are:
Step 4-1) core of Fuzzy Selection is that fuzzy interval divides, its general principle is:
Interval [0,1] is divided into n interval [0, A 1+ F/2], [A 1-F/2, A 2+ F/2] ..., [A i-F/2, A i+1+ F/2] ..., [A n-1-F/2,1], A ifor constant, equal i=1,2 ..., (n-1), F is fuzzy interval width, is less than interval overlapping portion is fuzzy interval, and interval non-superimposed part is between absolute field, [A i-F/2, A i+1+ F/2] interval of to be grade be i;
Step 4-2) fuzzy interval divide after, be chosen as the proportionality coefficient CRS value of next-hop node according to both candidate nodes, both candidate nodes put into fuzzy interval, then carries out Fuzzy Selection:
First [0,1] between selection area is divided into n interval, both candidate nodes is put into relevant position, fuzzy interval by CRS value size; Then according to the Fuzzy Selection grade γ of Operation system setting, start to choose from interval [1, ∞], if choose next-hop node, return results, otherwise again from [A n-1-F/2, ∞] choose ..., until interval [A n-k-F/2, ∞] till, subscript k meets relational expression wherein, n is the interval number that interval [0,1] is divided equally, and γ is the Fuzzy Selection grade that system pre-sets; The node selected is down hop routing node.
6. trust routing algorithm according to claim 5, is characterized in that, described step 4-2) in, proportionality coefficient CRS and interval [A i-F/2, A i+1+ F/2] attaching relation represent with formula (6), n is the interval number that interval [0,1] is divided equally; p = 1 , CRS &Element; [ A i , A i + 1 ] &cup; ( CRS &GreaterEqual; 1 ) f ( CRS ) , CRS &Element; [ A i - F / 2 , A i ] &cup; [ A i + 1 , A i + 1 + F / 2 ] Wherein, i=1,2 ..., n-2 (6)
P is that CRS belongs to interval [A i-F/2, A i+1+ F/2] probability, f (CRS) is ownership function, and according to the definition of embody rule scene, and 0≤f (CRS)≤1, f (CRS) are
f ( CRS ) = cos ( &pi; F &times; ( A i - CRS ) ) , CRS &Element; [ A i - F / 2 , A i ] cos ( &pi; F &times; ( CRS - A i + 1 ) ) , CRS &Element; [ A i + 1 , A i + 1 + F / 2 ] Wherein, i=1,2 ..., n-2 (7)
N is the interval number that interval [0,1] is divided equally.
CN201310148141.3A 2013-04-25 2013-04-25 Trust routing algorithm of wireless sensor network based on topological structure Expired - Fee Related CN103209453B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310148141.3A CN103209453B (en) 2013-04-25 2013-04-25 Trust routing algorithm of wireless sensor network based on topological structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310148141.3A CN103209453B (en) 2013-04-25 2013-04-25 Trust routing algorithm of wireless sensor network based on topological structure

Publications (2)

Publication Number Publication Date
CN103209453A CN103209453A (en) 2013-07-17
CN103209453B true CN103209453B (en) 2015-07-08

Family

ID=48756505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310148141.3A Expired - Fee Related CN103209453B (en) 2013-04-25 2013-04-25 Trust routing algorithm of wireless sensor network based on topological structure

Country Status (1)

Country Link
CN (1) CN103209453B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103384384B (en) * 2013-07-19 2016-07-06 哈尔滨工程大学 A kind of cognitive junction network trust management device and method based on dynamic evolution
CN105848242A (en) * 2016-03-25 2016-08-10 黑龙江大学 Safety route optimization method based on trust perception in wireless sensor network
CN109474461B (en) * 2018-10-31 2022-02-22 上海无线通信研究中心 Wireless sensor network trust management method and system based on credit poisson distribution
CN111654891B (en) * 2020-05-06 2023-02-28 长春工业大学 Wireless sensor network secure routing method based on self-adaptive trust mechanism
CN113329204B (en) * 2021-08-03 2021-10-01 北京电信易通信息技术股份有限公司 Data security transmission method and system based on terminal trust management

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036229A (en) * 2010-12-22 2011-04-27 河海大学常州校区 Method for establishing trust mechanism of network hierarchical routing protocol of wireless sensor
CN102802158A (en) * 2012-08-07 2012-11-28 湖南大学 Method for detecting network anomaly of wireless sensor based on trust evaluation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036229A (en) * 2010-12-22 2011-04-27 河海大学常州校区 Method for establishing trust mechanism of network hierarchical routing protocol of wireless sensor
CN102802158A (en) * 2012-08-07 2012-11-28 湖南大学 Method for detecting network anomaly of wireless sensor based on trust evaluation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
无线传感器网络地理位置路由相关技术研究;顾一中;《中国优秀博士论文数据库》;20081001;正文第91-100页 *

Also Published As

Publication number Publication date
CN103209453A (en) 2013-07-17

Similar Documents

Publication Publication Date Title
Baronti et al. Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards
Youssef et al. Overlapping multihop clustering for wireless sensor networks
CN103209453B (en) Trust routing algorithm of wireless sensor network based on topological structure
Alghamdi et al. Energy-Efficient and Blockchain-Enabled Model for Internet of Things (IoT) in Smart Cities.
Hamedheidari et al. A novel agent-based approach to detect sinkhole attacks in wireless sensor networks
CN106454815A (en) Routing method for wireless sensor network based on LEACH protocol
Han et al. Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks
Sharma et al. Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes
CN103347011A (en) Ad hoc network security routing method based on trust model
CN105848242A (en) Safety route optimization method based on trust perception in wireless sensor network
Yilmaz et al. Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks
CN105915545A (en) Trust measurement method oriented to application environment of mobile internet of things
Rehman et al. Towards resilient and secure cooperative behavior of intelligent transportation system using sensor technologies
Srinath et al. Ac: Cluster based secure routing protocol for wsn
Suguna et al. Establishment of stable certificate chains for authentication in mobile ad hoc networks
Haddar SEALEA: scalable and energy aware k-leaders election algorithm in IoT wireless sensor networks
Zhang et al. An authentication scheme for locating compromised sensor nodes in WSNs
CN101969405A (en) Safe routing method based on credibility in P2P (Peer-to-Peer) environment
Menchaca-Mendez et al. Opportunistic mobile sensing in the fog
AU2018101627A4 (en) An apparatus and method based on trust index of wireless node for multiple / best route discovery in the wireless sensor network platform.
Singh et al. A new energy-efficient clustering protocol for wireless sensor networks
Lavanya et al. Secured backup routing protocol for ad hoc networks
Sharma Energy-efficient secure routing in wireless sensor networks
Kumar et al. Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks
CN103347260A (en) Reliable Ad hoc network security routing device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150708

Termination date: 20160425