CN103812696B - A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm - Google Patents

A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm Download PDF

Info

Publication number
CN103812696B
CN103812696B CN201410040848.7A CN201410040848A CN103812696B CN 103812696 B CN103812696 B CN 103812696B CN 201410040848 A CN201410040848 A CN 201410040848A CN 103812696 B CN103812696 B CN 103812696B
Authority
CN
China
Prior art keywords
node
frog
group
credit
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410040848.7A
Other languages
Chinese (zh)
Other versions
CN103812696A (en
Inventor
张明川
郑瑞娟
吴庆涛
魏汪洋
马正朝
李腾昊
汪兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan gunz Information Technology Co., Ltd
Original Assignee
Henan University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Science and Technology filed Critical Henan University of Science and Technology
Priority to CN201410040848.7A priority Critical patent/CN103812696B/en
Publication of CN103812696A publication Critical patent/CN103812696A/en
Application granted granted Critical
Publication of CN103812696B publication Critical patent/CN103812696B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm, analyze the Local Features of Internet of Things interior joint, calculate the importance of the node in Internet of Things Autonomous Domain, the foundation that node importance after calculating is screened as node, node is clustered using shuffled frog leaping algorithm, the higher class node of node importance is chosen as the neighbor node of credit assessment, according to credit assessment algorithm, credit assessment is carried out to the node for needing to assess using neighbor node, more accurate node credit value is calculated according to the current prestige of node and history prestige, given threshold, node credit value and the threshold value are compared predicate node whether credible;When credit value is less than given threshold, then predicate node is insincere node, and no person is trusted node;The present invention can be prevented effectively from the problem of insincere node occurred in traditional credit standing evaluation system produces interference to assessment result.

Description

A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm
Technical field
The present invention relates to communication technical field, a kind of Internet of things node based on shuffled frog leaping algorithm is particularly related to Credit assessment method.
Background technology
At present, the credible Journal of Sex Research for distributed system is concentrated mainly on credible management and the aspect of credible evaluation two, can The essence of fuse tube reason is the access control model and method based on certification and mandate in one.Method for evaluating trust is then with inter-entity Recommendation trust relation based on, evaluation is made to entity confidence level with reference to experience, then according to confidence level carry out decision-making. Classical Prestige Management technology asks prestige average value scheme, Bayesian network and cluster filtering.Letter is set up between node, between domain Appoint particularly significant, in general, level of trust can pass through the behavior of neighbor node and information that they generate to corresponding event It is estimated.However, node is very easily under attack, and then provide insecure or malice feedback, the real section of influence Point credit value.
The defect of existing method has:
1st, credit rating, which is assessed, lacks indirect prestige recommendation
Common credit rating, which is assessed, to be needed to consider subjective and objective both sides factor, and such as resource is commented user's credibility Valency is not only determined by the direct credit worthiness locally obtained, be should also be considered and is calculated the indirect prestige recommendation that Agency obtains(Sound Reputation);And the evaluation of the node degree of reliability is not also single by determining using the user of the node, need also exist for considering other self-control domains User recommends the prestige of the node.Consider during user, the prestige of node and credit assessment it is subjective it is objective because Element.
2nd, interference of the unreliable node to credit assessment
Node in the high isomery having by Internet of Things itself and high hybrid characteristic, Autonomous Domain likely suffers from non- The Network Intrusion of method, so as to do the degrees of comparison evaluation made mistake, is disturbed final assessment result, impact evaluation result Accuracy.
The content of the invention
The present invention produces interference for the insincere node being likely to occur in traditional credit standing evaluation system to assessment result Problem, proposes a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm.
The technical solution adopted in the present invention is:A kind of Internet of things node credit assessment side based on shuffled frog leaping algorithm Method, described method comprises the following steps:
Step 1, the Local Features for analyzing Internet of Things interior joint, calculate the importance of the node in Internet of Things Autonomous Domain;
Step 2, the foundation for screening the node importance after calculating as node, are entered using shuffled frog leaping algorithm to node Row cluster;
The higher class node of the node importance that is obtained in step 3, selecting step 2 is saved as the neighbours of credit assessment Point;
Step 4, according to credit assessment algorithm, the neighbor node obtained using step 3 to need assess node believe Reputation is assessed;
Step 5, more accurate node credit value calculated according to the current prestige of node and history prestige;
Whether step 6, given threshold, predicate node is compared by the node credit value obtained in step 5 and the threshold value It is credible;When credit value is less than given threshold, then predicate node is insincere node, and no person is trusted node.
The computational methods of node importance in the step 1 comprise the following steps:
Step 201, by network representation it is two tuple YK, EY, node set is expressed as, connecting node The set expression on side be, wherein, n and m represent the nodes and side number of network, and the side of connecting node is got over Important then node is more important;
Step 202, utilize formulaTo calculate the weight on side, whereinRepresent the side number being connected with node i;
Step 203, the weights for connecting side to node i are summedRepresent the weight of node i;
Step 204, utilize formulaCalculate node i importance, wherein
The hybrid algorithm that leapfrogs in the step 2 comprises the following steps:
Step 301, using node importance as screening foundation, neighbor node is screened using shuffled frog leaping algorithm, often Individual frog individualThe importance of a node can be representedAnd utilize formulaCalculate frog Fitness;
The frog colony of step 302, P frog composition of random initializtion, i=1,2 ... ... P;
Step 303, the fitness progress descending arrangement according to the every frog calculated, the optimal frog individual of functional value It is set to
Step 304, whole frog colony is divided into F group, each group includes G frog, therefore, the One frog enters the 1st group, and second frog enters the 2nd group, and the F frog enters the F group, afterwards F+ 1 frog enters the 1st group again, and the F+2 frog enters the 2nd group, by that analogy, until whole frogs have divided Finish;
After step 305, group's division are finished, i.e., each group is carried out in local area deep-searching, each group with optimal Individual with worst fitness isWith, iteration is for worst fitness each timeCarry out, more new strategy is:Frog Displacement, update worst frog position)Wherein,It isBetween random number,It is the ultimate range for allowing frog to move, by above formula to being fitted in group The worst frog individual of response is updated, and each group performs the Local Search number of times of setting;
Step 306, one new group of merging composition of group that local area deep-searching will be passed through, and judge whether to meet calculation The end condition of method, completes the reliable neighbor node of screening.
Credit assessment in the step 4 specifically includes following steps:
According to the node obtained after screening, using them as neighbor node, in TPIn cycle, have multiple neighbor nodes and see Examine evaluated node, each node is owned by and safeguards the neighboring node list of itself, in list comprising neighbor node ID and The information such as credit value, when node i sends packet to node n, it is necessary to which intermediate node j is forwarded, node passes through existing prison Survey condition calculates node point reliability,Calculation formula it is as follows:, whereinRepresent section Point i requesting nodes j forwards the quantity of packet;It is the quantity that i forwards packet to represent j, in the cycleIt is interior, j forwardings The more reliabilitys of packet it is higher.
In order to avoid the high node of credit value provides too high right to speak, subjective bias is caused, global prestige R conducts are introduced Parameter, for reducing risk, reduces the specific formula of subjective bias as follows:
Wherein, i is N neighbor node, SNIt is the set of N neighbor node,It is to provide the prestige for monitoring node Value, T is reliability threshold value, and the nodes ' behavior less than threshold value can be considered as bad node, the parameter of introducing, whereinFor adjustment function,, MikiFor the total transaction amount of node i,It is root Local prestige expectation according to node i relative to its neighbor node, and
Beneficial effects of the present invention:The present invention is filtered before credit assessment is carried out to node to the node in network, Filtering show that node importance is higher as neighbours, preferably avoids interference of the unreliable neighbours to credit assessment result, carries The high accuracy of credit assessment;The present invention utilizes shuffled frog leaping algorithm, part and the overall situation is scanned for, and then node is entered Row screening, with faster convergence and stronger robustness.
Brief description of the drawings
Fig. 1 is structured flowchart of the invention.
Embodiment
As illustrated, a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm, described method includes Following steps:
Step 1, the Local Features for analyzing Internet of Things interior joint, calculate the importance of the node in Internet of Things Autonomous Domain;
Step 2, the foundation for screening the node importance after calculating as node, are entered using shuffled frog leaping algorithm to node Row cluster;
The higher class node of the node importance that is obtained in step 3, selecting step 2 is saved as the neighbours of credit assessment Point;
Step 4, according to credit assessment algorithm, the neighbor node obtained using step 3 to need assess node believe Reputation is assessed;
Step 5, more accurate node credit value calculated according to the current prestige of node and history prestige;
Whether step 6, given threshold, predicate node is compared by the node credit value obtained in step 5 and the threshold value It is credible;When credit value is less than given threshold, then predicate node is insincere node, and no person is trusted node.
The computational methods of node importance in the step 1 comprise the following steps:
Step 201, by network representation it is two tuple YK, EY, node set is expressed as, connection section The set expression on side of point is, wherein, n and m represent the nodes and side number of network, the side of connecting node More important then node is more important;
Step 202, utilize formulaTo calculate the weight on side, whereinRepresent the side number being connected with node i;
Step 203, the weights for connecting side to node i are summedRepresent the weight of node i;
Step 204, utilize formulaCalculate node i importance, wherein
The hybrid algorithm that leapfrogs in the step 2 comprises the following steps:
Step 301, using node importance as screening foundation, neighbor node is screened using shuffled frog leaping algorithm, often Individual frog individualThe importance of a node can be representedAnd utilize formulaCalculate frog Fitness;
The frog colony of step 302, P frog composition of random initializtion, i=1,2 ... ... P;
Step 303, the fitness progress descending arrangement according to the every frog calculated, the optimal frog individual of functional value It is set to
Step 304, whole frog colony is divided into F group, each group includes G frog, therefore, the One frog enters the 1st group, and second frog enters the 2nd group, and the F frog enters the F group, afterwards F+ 1 frog enters the 1st group again, and the F+2 frog enters the 2nd group, by that analogy, until whole frogs have divided Finish;
After step 305, group's division are finished, i.e., each group is carried out in local area deep-searching, each group with optimal Individual with worst fitness isWith, iteration is for worst fitness each timeCarry out, more new strategy is:Frog Displacement, update worst frog position)Wherein,It isBetween random number,It is the ultimate range for allowing frog to move, by above formula to being fitted in group The worst frog individual of response is updated, and each group performs the Local Search number of times of setting;
Step 306, one new group of merging composition of group that local area deep-searching will be passed through, and judge whether to meet calculation The end condition of method, completes the reliable neighbor node of screening.
Credit assessment in the step 4 specifically includes following steps:
According to the node obtained after screening, using them as neighbor node, in TPIn cycle, have multiple neighbor nodes and see Examine evaluated node, each node is owned by and safeguards the neighboring node list of itself, in list comprising neighbor node ID and The information such as credit value, when node i sends packet to node n, it is necessary to which intermediate node j is forwarded, node passes through existing prison Survey condition calculates node point reliability,Calculation formula it is as follows:, whereinRepresent section Point i requesting nodes j forwards the quantity of packet;It is the quantity that i forwards packet to represent j, in the cycleIt is interior, j forwardings The more reliabilitys of packet it is higher.
In order to avoid the high node of credit value provides too high right to speak, subjective bias is caused, global prestige R conducts are introduced Parameter, for reducing risk, reduces the specific formula of subjective bias as follows:
Wherein, i is N neighbor node, SNIt is the set of N neighbor node,It is to provide the prestige for monitoring node Value, T is reliability threshold value, and the nodes ' behavior less than threshold value can be considered as bad node, the parameter of introducing, whereinFor adjustment function,, MikiFor the total transaction amount of node i,It is root Local prestige expectation according to node i relative to its neighbor node, and
The neighbor node number of participation credit rating is more and volume of transmitted data is bigger, and the expectation of global prestige is more accurate Really.
Node in Internet of Things is and relatively inexpensive because the feature with mobility.Recognized if as accidental cause The unreliable node for being set to passive forwarding packet just seems and is unfair.Therefore we are also required to when calculating current credit value History credit value is taken into account, new credit value is formed.Specific formula is as follows:
, therefore, according to different Autonomous Domain environment, we can lead to The α factors are overregulated to weigh proportion of the history credit value to present node prestige.
The present invention is filtered before credit assessment is carried out to node to the node in network, and filtering draws node importance It is higher as neighbours, preferably avoid interference of the unreliable neighbours to credit assessment result, improve the accurate of credit assessment Property;The present invention utilizes shuffled frog leaping algorithm, and part and the overall situation are scanned for, and then node is screened, with faster Convergence and stronger robustness.

Claims (4)

1. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm, it is characterised in that:Described method includes Following steps:
Step 1, the Local Features for analyzing Internet of Things interior joint, calculate the importance of the node in Internet of Things Autonomous Domain;
Step 2, the foundation for screening the node importance after calculating as node, are gathered using shuffled frog leaping algorithm to node Class;
The higher class node of the node importance that is obtained in step 3, selecting step 2 as credit assessment neighbor node;
Step 4, according to credit assessment algorithm, the neighbor node obtained using step 3 to need assess node carry out prestige comment Estimate;
Step 5, more accurate node credit value calculated according to the current prestige of node and history prestige;
Whether credible step 6, given threshold, be compared predicate node by the node credit value obtained in step 5 and the threshold value; When credit value is less than given threshold, then predicate node is insincere node, and no person is trusted node;
Wherein, the hybrid algorithm that leapfrogs comprises the following steps:Step 301, using node importance as screening foundation, leapfroged using mixing Algorithm is screened to neighbor node, each frog individualThe importance of a node can be representedAnd utilize formulaCalculate the fitness of frog;
The frog colony of step 302, P frog composition of random initializtion, i=1,2 ... ... P;
Step 303, the fitness progress descending arrangement according to the every frog calculated, the optimal frog individual of functional value are set to
Step 304, whole frog colony is divided into F group, each group includes G frog, therefore, first Frog enters the 1st group, and second frog enters the 2nd group, and the F frog enters the F group, F+1 afterwards Frog enters the 1st group again, and the F+2 frog enters the 2nd group, by that analogy, is finished until whole frogs divide;
Step 305, group divide finish after, i.e., local area deep-searching is carried out to each group, with optimal and most in each group The individual of poor fitness isWith, iteration is for worst fitness each timeCarry out, more new strategy is:Frog is moved Distance, update worst frog position)Wherein,It isBetween random number,It is the ultimate range for allowing frog to move, by above formula to being fitted in group The worst frog individual of response is updated, and each group performs the Local Search number of times of setting;
Step 306, one new group of merging composition of group that local area deep-searching will be passed through, and judge whether to meet algorithm End condition, completes the reliable neighbor node of screening.
2. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 1, its feature exists In:The computational methods of node importance in the step 1 comprise the following steps:
Step 201, by network representation it is two tuple YK, EY, node set is expressed as, connecting node The set expression on side is, wherein, n and m represent the nodes and side number of network, and the side of connecting node is heavier Will then node it is more important;
Step 202, utilize formulaTo calculate the weight on side, whereinRepresent the side number being connected with node i;
Step 203, the weights for connecting side to node i are summedRepresent the weight of node i;
Step 204, utilize formulaCalculate node i importance, wherein
3. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 1, its feature exists In:Credit assessment in the step 4 specifically includes following steps:
According to the node obtained after screening, using them as neighbor node, in TPIn cycle, multiple neighbor node observation quilts are had Node is assessed, each node is owned by and safeguards the neighboring node list of itself, neighbor node ID and prestige are included in list The information such as value, when node i sends packet to node n, it is necessary to which intermediate node j is forwarded, node passes through existing monitoring bar Part calculates node point reliability,Calculation formula it is as follows:, whereinRepresent that node i please Node j is asked to forward the quantity of packet;It is the quantity that i forwards packet to represent j, in the cycleIt is interior, the number of j forwardings It is higher according to many reliabilitys of Bao Yue.
4. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 3, its feature exists In:In order to avoid the high node of credit value provides too high right to speak, subjective bias is caused, overall situation prestige R is introduced as parameter, For reducing risk, the specific formula of subjective bias is reduced as follows:
Wherein, i is N neighbor node, SNIt is the set of N neighbor node,It is to provide the credit value for monitoring node, T is Reliability threshold value, the nodes ' behavior less than threshold value can be considered as bad node, the parameter of introducing, its InFor adjustment function,, MikiFor the total transaction amount of node i,It is adjacent relative to it according to node i The local prestige expectation of node is occupied, and
CN201410040848.7A 2014-01-28 2014-01-28 A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm Active CN103812696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410040848.7A CN103812696B (en) 2014-01-28 2014-01-28 A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410040848.7A CN103812696B (en) 2014-01-28 2014-01-28 A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm

Publications (2)

Publication Number Publication Date
CN103812696A CN103812696A (en) 2014-05-21
CN103812696B true CN103812696B (en) 2017-07-28

Family

ID=50708938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410040848.7A Active CN103812696B (en) 2014-01-28 2014-01-28 A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm

Country Status (1)

Country Link
CN (1) CN103812696B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104467999B (en) * 2014-11-18 2017-02-22 北京邮电大学 Spectrum sensing algorithm based on quantum leapfrog
US10785125B2 (en) 2018-12-03 2020-09-22 At&T Intellectual Property I, L.P. Method and procedure for generating reputation scores for IoT devices based on distributed analysis
CN112185419A (en) * 2020-09-30 2021-01-05 天津大学 Glass bottle crack detection method based on machine learning

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223627A (en) * 2011-06-17 2011-10-19 北京工业大学 Beacon node reputation-based wireless sensor network safety locating method
CN102378217A (en) * 2011-11-01 2012-03-14 北京工业大学 Beacon node credit assessment method in localization in wireless sensor networks

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8010460B2 (en) * 2004-09-02 2011-08-30 Linkedin Corporation Method and system for reputation evaluation of online users in a social networking scheme

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223627A (en) * 2011-06-17 2011-10-19 北京工业大学 Beacon node reputation-based wireless sensor network safety locating method
CN102378217A (en) * 2011-11-01 2012-03-14 北京工业大学 Beacon node credit assessment method in localization in wireless sensor networks

Non-Patent Citations (10)

* Cited by examiner, † Cited by third party
Title
WNN-Based Network Security Situation Quantitive Prediction Method and Its Optimization;赖积保,王慧强,刘效武,梁颖,郑瑞娟,赵国生;《Computer Science and Technology》;20080331;全文 *
一种面向云服务的自主信誉管理机制;吴庆涛,张旭龙,张明川,郑瑞娟,娄颖;《武汉大学学报(理学版)》;20131031;第59卷(第5期);全文 *
协同多目标攻击的混合蛙跳融合蚁群算法研究;孔凡光,何建华,唐奎;《计算机工程与应用》;20131231;全文 *
可信网络连接中的可信度仿真评估;吴庆涛,郑瑞娟,华彬,杨馨桐;《计算机应用研究》;20110228;第28卷(第2期);全文 *
基于信赖域的系统可信性自调节算法;郑瑞娟,张明川,吴庆涛,李冠峰,魏汪洋;《河南科技大学学报:自然科学版》;20100831;第31卷(第4期);全文 *
基于自律计算的系统可信性自调节模型;吴庆涛,郑瑞娟,张明川,魏汪洋,李冠峰;《计算机工程与应用》;20111231;全文 *
基于自律计算的系统服务可信性自优化方法;朱丽娜,吴庆涛,娄颖,郑瑞娟;《微电子学与计算机》;20130831;第30卷(第8期);全文 *
混合蛙跳算法研究综述;崔文华,刘晓冰,王伟,王介生;《控制与决策》;20120430;第27卷(第4期);全文 *
混合蛙跳算法综述;邹采荣,张潇丹,赵力;《信息化研究》;20121031;第38卷(第5期);全文 *
自适应混沌变异蛙跳算法;葛宇, 王学平, 梁静;《计算机应用研究》;20110331;第28卷(第3期);全文 *

Also Published As

Publication number Publication date
CN103812696A (en) 2014-05-21

Similar Documents

Publication Publication Date Title
Theodorakopoulos et al. Trust evaluation in ad-hoc networks
Jayasinghe et al. Rpr: A trust computation model for social internet of things
CN107864695A (en) Peer-group is guarded against
Kokoris-Kogias et al. TRM-SIoT: A scalable hybrid trust & reputation model for the social internet of things
Liu et al. A semi-centralized trust management model based on blockchain for data exchange in iot system
Maheswaran et al. Towards a gravity-based trust model for social networking systems
CN103812696B (en) A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm
De Meo et al. Recommending users in social networks by integrating local and global reputation
Jiang et al. A new evidential trust model for open distributed systems
JP5666019B2 (en) Credit management method and system in distributed computing system
Liu et al. Uncovering the mystery of trust in an online social network
Xia et al. A reputation-based model for trust evaluation in social cyber-physical systems
Stefanova et al. Off-policy q-learning technique for intrusion response in network security
Mühlbauer et al. Impact of routing parameters on route diversity and path inflation
Huang et al. Using reputation measurement to defend mobile social networks against malicious feedback ratings
Halgamuge et al. Trust model to minimize the influence of malicious attacks in sharding based blockchain networks
Wang et al. An accurate and multi-faceted reputation scheme for cloud computing
Suryani et al. ConTrust: a trust model to enhance the privacy in internet of things
Song et al. Dynamic trust evaluation of wireless sensor networks based on multi-factor
Nguyen Vu et al. Trustsets: using trust to detect deceitful agents in a distributed information collecting system
Valverde-Rebaza et al. Exploiting social and mobility patterns for friendship prediction in location-based social networks
CN109474461A (en) Wireless sensor network trust management method and system based on prestige Poisson distribution
CN110896360B (en) Denial of service attack protection method based on historical information and hierarchical reinforcement learning
Dubey et al. Bayesian network based trust model with time window for pure P2P computing systems
Zhou et al. Traffic matrix estimation: Advanced‐Tomogravity method based on a precise gravity model

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191104

Address after: 471000 Room 202, building 3-1, science and Technology Park, Luoyang National University, Longyu Road, Jianxi District, Luoyang area, China (Henan) pilot Free Trade Zone, Luoyang City, Henan Province

Patentee after: Henan gunz Information Technology Co., Ltd

Address before: 471000 Xiyuan Road, Jianxi District, Henan, No. 48, No.

Patentee before: Henan University of Science and Technology

TR01 Transfer of patent right