CN109548029A - A kind of two-stage method for trust evaluation of nodes of Wireless Sensor Networks - Google Patents

A kind of two-stage method for trust evaluation of nodes of Wireless Sensor Networks Download PDF

Info

Publication number
CN109548029A
CN109548029A CN201910019272.9A CN201910019272A CN109548029A CN 109548029 A CN109548029 A CN 109548029A CN 201910019272 A CN201910019272 A CN 201910019272A CN 109548029 A CN109548029 A CN 109548029A
Authority
CN
China
Prior art keywords
trust
node
cloud
value
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910019272.9A
Other languages
Chinese (zh)
Other versions
CN109548029B (en
Inventor
杨柳
周远林
鲁银芝
郭坦
吴雪刚
梁志芳
熊炼
陶洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201910019272.9A priority Critical patent/CN109548029B/en
Publication of CN109548029A publication Critical patent/CN109548029A/en
Application granted granted Critical
Publication of CN109548029B publication Critical patent/CN109548029B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

The present invention discloses a kind of two-stage method for trust evaluation of nodes of Wireless Sensor Networks, carries out trust evaluation for the node that behavioral data obscures, prevents attack of the malicious node to sensor network.Specific step is as follows: firstly, to the behavioral data deblurring that evaluated node directly monitors, to obtain node direct trust value;Secondly, combining direct, history and the final trust value of recommendation trust data assessment node;Then, sample of establishing trust repeatedly is assessed, and introduces cloud model and establishes normal state trust cloud, assesses foundation as the final reliability rating of node;Finally, the criteria for classifying trusts cloud group according to actual needs, and cloud is trusted using classification method matched node optimality criterion is simplified, so that it is determined that node reliability rating.The present invention analyzes influence of the behavioral data ambiguity to trust evaluation, constructs two-stage Trust Valuation Model, including fuzzy reasoning, multi-source trust Intelligent Fusion and trust cloud reconstruct and classification, to improve the Evaluation accuracy of node reliability rating.

Description

A kind of two-stage method for trust evaluation of nodes of Wireless Sensor Networks
Technical field
The present invention relates to the faith mechanism technical field of the network information security more particularly to wireless sensor network nodes Method for evaluating trust.
Background technique
Wireless sensor network is especially subject to physical entrapment since the particularity of its application environment causes its vulnerable And become compromise node, and traditional safe practice not can be used directly and solve the problems, such as Security routing in wireless sensor network, Therefore security mechanism must be added.Node is endowed certain trust value and reflects its reliability, and the past part of the node or The foundation that all behavior evidences will be assessed as trust value.However quality of wireless channel has unstability, and node failure Also random to occur, there is certain ambiguity and randomness by the behavioral data that dynamic monitoring obtains.How to monitoring Carrying out trust evaluation with the behavioral data of ambiguity and randomness is that one, wireless sensor network security field urgent need solves The problem of.
Summary of the invention
Present invention aims at solving above-mentioned the deficiencies in the prior art, a kind of Wireless Sensor Networks are proposed Two-stage method for trust evaluation of nodes, this method analyzes wireless channel unreliability and node malfunctions at random or failure is to trust The influence of assessment constructs two-stage Trust Valuation Model, trusts Intelligent Fusion and trust by behavioral data fuzzy reasoning, multi-source Cloud reconstruct and classification, influence of the ambiguity and randomness for solving to trust evidence to Evaluation accuracy.
The technical scheme adopted by the invention to solve the technical problem is that: a kind of two-stage section of Wireless Sensor Networks Point method for evaluating trust, this method comprises the following steps:
Step 1: the behavioral data directly monitored to evaluated node is handled through fuzzy system, is obtained to evaluated section The direct trust value of point;
The data obtained by behavior dynamic monitoring system, i.e. average delay (Average Delay, AD) and data packet pass Defeated rate (Packet Delivery Rate, PDR) first passes around and trusts fuzzy reasoning subsystem processes to obtain the direct of node Trust evaluation value.Fuzzy inference system includes that blurring, fuzzy reasoning and de-fuzzy handle three parts:
(1) blurring is to convert corresponding mould according to AD and PDR for the trust of input according to the fuzzy set in knowledge base Paste set;
(2) fuzzy reasoning is will to trust the fuzzy set that trust value is mapped to according to fuzzy set according to fuzzy rule;
(3) de-fuzzy is will to trust fuzzy set to be converted into specific trust numerical value.
Step 2: the history and recommendation trust data for the direct trust value combination node that step 1 is obtained are obtained to quilt Assess the final trust value of node;
The direct trust data that obtains through Fuzzy Processing is simultaneously insufficient, it is necessary to further combined with the history and recommendation of node These three types of trust datas are carried out fusion treatment realization and comprehensively assessed node trust by trust data, specific fusion process point Three steps:
(1) design is reasonable trusts prediction model, realizes the prediction to current trust value according to historical trusted data, thus Obtain prediction trust value TF
(2) according to the Value Realization of trust recommendation node to the weighting fusion treatment of recommendation trust data, to be pushed away Recommend trust value TR
(3) reasonable adaptive weighted system is designed, is realized to direct trust value TD, prediction trust value TFAnd recommendation Appoint value TRWeighting fusion treatment, to obtain the final trust value T of evaluated node.
Step 3: repeatedly assessing obtained trust sample combination cloud model to normal state trust cloud reconstruct, as section by utilizing The foundation of the final reliability rating assessment of point;
The problems such as in view of wireless channel poor reliability and node random fault, repeatedly assesses obtained letter by utilizing Appoint sample combination cloud model to trust cloud reconstruct to normal state, can remove random error or mistake in single evaluation.In this project The reliability rating evaluation process of node is carried out with taking turns, wherein each round several times assesses node trust value, obtains k Current trust value T1、T2、…、Tk, these trust datas as sample and are combined into trust cloud model, node can reconstructed just State trusts cloud, using the foundation as the final reliability rating assessment of node.The main purpose of this method is to avoid becoming because of network topology Change, channel reliability difference and the problems such as node random fault caused single evaluation random error or mistake, with as far as possible Improve the precision assessed node reliability rating.
Step 4: standard credit cloud being constructed according to the division combination normal cloud model of practical reliability rating, using with low multiple The method for classifying modes of miscellaneous degree trusts cloud classification to node, to obtain best match standard credit cloud to determine that node is trusted Grade.
Compared with prior art, the invention has the following beneficial technical effects:
The present invention analyzes wireless channel unreliability and node and malfunctions at random or influence of the failure to trust evaluation, structure Two-stage Trust Valuation Model is built, Intelligent Fusion is trusted by behavioral data fuzzy reasoning, multi-source and trusts cloud reconstruct and classification, Solve the influence of the ambiguity and randomness of trust evidence to Evaluation accuracy.
Detailed description of the invention
Fig. 1 is node Trust Valuation Model figure.
Fig. 2 is fuzzy inference system figure.
Fig. 3 is behavioral data fuzzy set degree of membership functional arrangement.
Fig. 4 is trust value fuzzy set degree of membership functional arrangement.
Fig. 5 is degree of membership, trusts fuzzy set curve and x-axis intersecting area area schematic diagram.
Fig. 6 is that multi-source trusts fusion process figure.
Fig. 7 is that node history trusts change curve.
Fig. 8 is reliability rating estimation flow figure.
Table 1 is fuzzy reasoning table.
Specific embodiment
The present invention is described in detail with reference to the accompanying drawings and examples.
As shown in Figure 1, being needed the present invention provides a kind of two-stage method for trust evaluation of nodes of Wireless Sensor Networks By the trust evaluation process of two-stage four-stage.Wherein first order Trust Valuation Model includes trusting fuzzy reasoning and multi-source Trust fusion;Second level Trust Valuation Model includes trusting cloud reconstruct and trusting cloud classification, and estimation flow includes the following steps:
Step 1: the behavioral data directly monitored to evaluated node is handled through fuzzy system, is obtained to evaluated section The direct trust value of point;
The data obtained by behavior dynamic monitoring system, i.e. data packet mean transit delay AD and Successful transmissions rate PDR, It first passes around and trusts fuzzy reasoning subsystem processes to obtain the direct trust evaluation value of node.Fuzzy reasoning system as shown in Figure 2 System handles three parts comprising blurring, fuzzy reasoning and de-fuzzy:
(1) blurring is to convert corresponding mould according to AD and PDR for the trust of input according to the fuzzy set in knowledge base Paste set;
The fuzzy set subordinating degree function of behavioral data is as shown in Figure 3.The wherein subordinating degree function of fuzzy set " low " and "high" Curve be it is trapezoidal, the subordinating degree function curve of fuzzy set " moderate " is triangle, and design parameter a, b, c and d are according to practical application It determines, but the sum of cross sectional area that must assure that three subordinating degree function homologous threads and x-axis is equal to 1.
(2) fuzzy reasoning is will to trust the fuzzy set that trust value is mapped to according to fuzzy set according to fuzzy rule;
The corresponding fuzzy set subordinating degree function of trust evaluation value is as shown in Figure 4.Wherein fuzzy set " completely distrust " and The subordinating degree function curve of " trusting completely " is triangle, the subordinating degree function of fuzzy set " moderate distrust " and " moderate trust " Curve be it is trapezoidal, each fuzzy membership function parameter is specifically determined according to practical situations, but must assure that all degrees of membership The sum of area of curve and x-axis intersecting area is equal to 1.Fuzzy rule is specifically defined as shown in table 1.
(3) de-fuzzy is will to trust fuzzy set to be converted into specific trust numerical value.
De-fuzzy processing step is as follows:
1. (being expressed as v according to specific behavioral data AD and PDR valueADAnd vPDR), combine the behavioral data in Fig. 3 Fuzzy set subordinating degree function finds out three pairs of degrees of membership of corresponding fuzzy set " low ", " moderate " and "high": (DL respectivelyAD,DLPDR)、 (DMAD,DMPDR)、(DHAD,DHPDR)。
2. select 4 fuzzy rules (such as regular Isosorbide-5-Nitrae, 5,9) to respectively correspond 4 groups of trust value fuzzy sets from table 1, will 1. in Three pairs of obtained degrees of membership are combined into 4 pairs and respectively correspond 4 fuzzy rules: (DLAD,DHPDR)、(DLAD,DMPDR)、(DMAD, DMPDR)、(DHAD,DLPDR)。
3. taking the minimum value of 4 pairs of degrees of membership respectively, 4 groups of trust value fuzzy sets are mapped to, are asked respectively and x-axis intersecting area Area ACNT、AMNT、AMTAnd ACT, as shown in Figure 5.
The behavioral data directly monitored to evaluated node is handled through fuzzy system, is finally obtained to evaluated node Direct trust value TD, it is expressed as follows:
TD=ACNT+AMNT+AMT+ACTFormula (1)
Step 2: the history and recommendation trust data for the direct trust value combination node that step 1 is obtained are obtained to quilt Assess the final trust value of node;
The direct trust data that obtains through Fuzzy Processing is simultaneously insufficient, it is necessary to further combined with the history and recommendation of node These three types of trust datas are carried out fusion treatment realization and comprehensively assessed node trust by trust data, multi-source letter as shown in Figure 6 Appoint three steps of fusion process point:
(1) design is reasonable trusts prediction model, realizes the prediction to current trust value according to historical trusted data, thus Obtain prediction trust value TF
By combining distribution function appropriate to be fitted, it can be achieved that the pre- of current trust value node historical trusted data It surveys, and history trust distribution curve should have slow raising speed drop characteristic, make congenial sexual assault to avoid malicious node.Work as node It is always maintained at cooperative attitude, then corresponds to trust value and slowly rises;And malicious act trust value if occurring declines rapidly.It is this The trust that mode can effectively reduce malicious node is expected, prevents the purpose of its selection cooperation only for that can cater to trust evaluation System.
The history trust value for having n item to be evaluated node: Th is assumed according to chronological order1、Th2、...、Thn, wherein ThnFor nearest history trust value.If ThiAnd Thj(i < j) is to detect the final trust value obtained after malicious act, then this n item The variation tendency of history trust value is as shown in Figure 7.
The history trust value variation tendency of node should meet changing rule shown in Fig. 7: for continuous cooperation behavior, section The trust value of point will be slow increase, when reaching certain threshold value TthrWhen curve there is inflection point, subsequent trust value increases to always infinitely Close to 1;When there is uncooperative behavior, trust value declines rapidly, if there is continuous uncooperative behavior, can drop to minimum value 0.Finding suitable secondary or exponential Function Model by segmentation can be obtained the history trust distribution curve of similar Fig. 7, in conjunction with Currently stored historical trusted data is fitted curve design parameter, so that obtaining complete history trusts distribution curve equation, It is final to obtain the prediction trust value T of evaluated node using distribution curve equationF
(2) according to the Value Realization of trust recommendation node to the weighting fusion treatment of recommendation trust data, to be pushed away Recommend trust value TR
When using neighbor node recommendation trust data, it is necessary to the trust state for considering recommended node itself, for having The recommended node of higher reliability rating should give its recommending data higher value, and with value for according to recommending data fusion Processing obtains recommendation trust TR.Assuming that the recommendation trust that m neighbor node is obtained in assessment node one is TR1、TR2、...、 TRm, and the current trust value of m neighbor node for assessing node storage is T respectivelyN1、TN2、...、TNm, then it is evaluated node Recommendation trust TRIt can calculate as follows:
(3) reasonable adaptive weighted system is designed, is realized to direct trust value TD, prediction trust value TFAnd recommendation Appoint value TRWeighting fusion treatment, to obtain the final trust value T of evaluated node.
It is main to consider two aspects in system adaptive weighted for recommendation trust design data:
1. there is the fitting precision when history trust distribution curve of slow raising speed drop characteristic using historical trusted data fitting, The average variance of i.e. practical trust value and fitting trust value.
2. the size of the quantity of trust recommendation node and its average trust value.
When historical trusted data fitting average variance it is bigger, show that fitting precision is lower, trust value predicted obtained from Precision is also lower, therefore predicts trust value T for assigningFLesser weight;When trust recommendation number of nodes is less or recommends section When the average trust value of point is smaller, show that the recommendation trust data of recommended node have lesser utility value, therefore imparting is pushed away Recommend trust value TRLesser weight.Final trust value can calculate as follows:
T=wD·TD+wF·TF+wR·TRFormula (3)
Wherein wD、wFAnd wRRespectively correspond to direct trust value TD, prediction trust value TFAnd recommendation trust TRWeight.
Step 3: repeatedly assessing obtained trust sample combination cloud model to normal state trust cloud reconstruct, as section by utilizing The foundation of the final reliability rating assessment of point;
The problems such as in view of wireless channel poor reliability and node random fault, repeatedly assesses obtained letter by utilizing Appoint sample combination cloud model to trust cloud reconstruct to normal state, can remove random error or mistake in single evaluation.In the present invention The reliability rating evaluation process of node is carried out with taking turns, wherein each round several times assesses node trust value, obtains k Current trust value T1、T2、…、Tk, as shown in figure 8, these trust datas as sample and are combined trust cloud model, Ke Yichong The normal state of structure node trusts cloud, using the foundation as the final reliability rating assessment of node.The main purpose of this method be avoid because Network topology change, channel reliability difference and the problems such as node random fault caused single evaluation random error or mistake Accidentally, to improve the precision to the assessment of node reliability rating as far as possible.
Present invention introduces normal cloud model theories, utilize k trust evaluation sample of each round in conjunction with specific generating algorithm Value constructs the water dust for meeting normal distribution, thus by cognition randomness and ambiguity be included in probabilistic framework and uniformly retouch It states.Normal cloud model introduces three numerical characteristics based on normal distribution and Gauss member function to describe, i.e. desired value Ex, entropy EnWith super entropy He.Its expected value ExIt is the center of gravity of number field where all water dusts, represents the basic certainty of qualitativing concept; Entropy EnIt is probabilistic measurement to qualitativing concept, reflects the randomness and ambiguity of concept;Super entropy HeReflect entropy En's Uncertainty degree.
Evaluated node trusts water dust TCDIt indicates, T can be obtained according to normal state Clouds theoryCD~N (Ex,Eσ 2), and Eσ~N (En,He 2).The subordinating degree function of normal state water dust is expressed as follows:
Using k trust evaluation value in every wheel reliability rating assessment as k water dust of normal cloud model, unite in conjunction with mathematics Meter method obtains three numerical characteristic Ex、EnAnd He, and then can determine that the normal state of evaluated node trusts cloud completely.Wherein believe Cloud is appointed it is expected ExIt can calculate as follows:
Wherein TiIndicate the i-th trust evaluation value in a certain wheel reliability rating assessment.
Trust cloud entropy EnIt may be expressed as:
Trust the super entropy H of cloudeIt may be expressed as:
Wherein TS 2The sample variance that water dust is trusted for k times, may be expressed as:
Step 4: standard credit cloud being constructed according to the division combination normal cloud model of practical reliability rating, using with low multiple The method for classifying modes of miscellaneous degree trusts cloud classification to node, to obtain best match standard credit cloud to determine that node is trusted Grade.
Assuming that trust value section [0,1] is divided into M standard credit grade subinterval, M reliability rating is respectively represented TG1,TG2,…,TGM, wherein m-th of subinterval is represented by [Tmin m,Tmax m], Tmin mIndicate the trust value lower limit in the subinterval, Tmax mIndicate the trust value upper limit.It is corresponding each trust subinterval and will construct a standard credit cloud, m-th trust subinterval Standard credit cloud TCD mThree numerical characteristics be denoted as Ex m、En mAnd He m.Due to it is expected Ex mIt is the central value of standard credit cloud, therefore It can calculate as follows:
Entropy En mThe uncertainty for representing standard credit water dust is determined according to the randomness of water dust and ambiguity, can be calculated It is as follows:
En m=Prf(Tmax m-Tmin m) formula (10)
Wherein PrfFor standard water dust uncertain parameters (0 < Prf≤ 1) it, is determined according to concrete application situation, value is got over The big randomness for indicating water dust and ambiguity are bigger.
Super entropy He mThe thickness for representing standard credit cloud indicates the ambiguity of trust value, and the more big then trust value of value is fuzzyyer, Its calculating formula is as follows in the present invention:
The reliability rating of evaluated node is obtained, it need to be compared and trust cloud TCDWith M standard credit cloud TCD 1,TCD 2,…, TCD MSimilarity, to obtain best match standard credit cloud, so that it is determined that node reliability rating.However the meter of sensor node Calculation ability is limited, if will compared with each standard credit cloud similarity, calculation amount it is considerable.In this patent will Simplify sorting algorithm, M standard credit cloud is obtained using mode identification method first and wherein any one standard credit cloud is (false If TCD 1) similarity, be denoted as DS 1、DS 2、…、DS M;Then relatively more evaluated node trusts cloud TCDWith standard credit cloud TCD 1Phase Like degree, it is denoted as DS;The finally similarity D of relatively more evaluated nodeSWith the Euclidean distance between M standard similarity, distance is selected The corresponding standard credit cloud of a smallest similarity is as best match cloud.
The characteristics of present invention is according to massive wireless sensor distributed frame establishes one kind towards wireless sensor The two-stage method for trust evaluation of nodes of network, it is contemplated that the unreliability and node random fault or malfunction etc. of wireless channel Problem carries out fusion treatment to direct, history and recommendation trust data by establishing two-stage Trust Valuation Model, with Improve the confidence level of trust evaluation.
In first order Trust Valuation Model, the Fuzzy Inference Model directly trusted node is initially set up, eliminates behavior Influence of the ambiguity and randomness of data to Evaluation accuracy;Then node historical trusted data is fitted, construction has The history of slow raising speed drop characteristic trusts distribution function, to establish the forecasting mechanism trusted node, malicious node is avoided to cater to Trust evaluation system and the speculative attack made;Then to trust recommendation node, itself credit worthiness is analyzed, and is established To the fusion treatment model of recommendation trust data, prevent malicious node from carrying out attack row to trust evaluation system using recommendation information For;The reliability of ultimate analysis multi-source trust data, and the Fusion Model to multi-source trust data is established with this, to obtain essence The high node trust evaluation sample value of exactness.
In the Trust Valuation Model of the second level, the trust sample value that first obtains first order trust evaluation as water dust, Normal state is rebuild in conjunction with cloud model and trusts cloud, to reject the water dust with randomness and ambiguity and obtain more complete trust number According to;Then standard credit cloud is established according to the division of standard credit grade, the reference standard that will be assessed as node reliability rating; The method for classifying modes with low complex degree for being suitable for sensor network is finally proposed, thus according to standard credit cloud to node Trust cloud to classify, to obtain node best match reliability rating.
1 fuzzy rule of table

Claims (8)

1. a kind of two-stage method for trust evaluation of nodes of Wireless Sensor Networks, it is characterised in that assessed by the first order It to enough sample datas, is established in the assessment of the second level using sample data and trusts cloud, and introduce method for classifying modes Determine the final reliability rating of node.It the described method comprises the following steps:
Step 1: the behavioral data directly monitored to evaluated node is handled through fuzzy system, is obtained to evaluated node Direct trust value;
Step 2: the history and recommendation trust data for the direct trust value combination node that step 1 is obtained are obtained to evaluated The final trust value of node;
Step 3: repeatedly assessing obtained trust sample combination cloud model to normal state trust cloud reconstruct, most as node by utilizing The foundation of whole reliability rating assessment;
Step 4: standard credit cloud being constructed according to the division combination normal cloud model of practical reliability rating, using with low complex degree Method for classifying modes to node trust cloud classification, to obtain best match standard credit cloud to determine node reliability rating.
2. a kind of two-stage method for evaluating trust of Wireless Sensor Networks node according to claim 1, feature Be, in the step 1, establish the Fuzzy Inference Model directly trusted node, eliminate behavioral data ambiguity and with Influence of the machine to Evaluation accuracy.
3. a kind of two-stage method for evaluating trust of Wireless Sensor Networks node according to claim 1, feature It is, in the step 2, node historical trusted data is fitted, constructs the history with slow raising speed drop characteristic and trust Distribution function avoids malicious node from catering to trust evaluation system and the throwing made to establish the forecasting mechanism trusted node Machine sexual assault behavior.
4. a kind of two-stage method for evaluating trust of Wireless Sensor Networks node according to claim 1, feature It is, in the step 2, to trust recommendation node, itself credit worthiness is analyzed, and establishes the fusion to recommendation trust data Model is handled, prevents malicious node from carrying out attack to trust evaluation system using recommendation information.
5. a kind of two-stage method for evaluating trust of Wireless Sensor Networks node according to claim 1, feature It is, in the step 2, analyzes the reliability of multi-source trust data, and the fusion mould to multi-source trust data is established with this Type, to obtain the high node trust evaluation sample value of accuracy.
6. a kind of two-stage method for evaluating trust of Wireless Sensor Networks node according to claim 1, feature It is, in the step 3, the trust sample value that first order trust evaluation is obtained is rebuild just as water dust in conjunction with cloud model State trusts cloud, to reject the water dust with randomness and ambiguity and obtain more complete trust data.
7. a kind of two-stage method for evaluating trust of Wireless Sensor Networks node according to claim 1, feature It is, in the step 4, standard credit cloud is established according to the division of standard credit grade, will be commented as node reliability rating The reference standard estimated.
8. a kind of two-stage method for evaluating trust of Wireless Sensor Networks node according to claim 1, feature It is, in the step 4, using the method for classifying modes with low complex degree for being suitable for sensor network, thus according to Standard credit cloud trusts cloud to node and classifies, to obtain node best match reliability rating.
CN201910019272.9A 2019-01-09 2019-01-09 Two-stage node trust evaluation method for wireless sensor network Active CN109548029B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910019272.9A CN109548029B (en) 2019-01-09 2019-01-09 Two-stage node trust evaluation method for wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910019272.9A CN109548029B (en) 2019-01-09 2019-01-09 Two-stage node trust evaluation method for wireless sensor network

Publications (2)

Publication Number Publication Date
CN109548029A true CN109548029A (en) 2019-03-29
CN109548029B CN109548029B (en) 2021-10-22

Family

ID=65834561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910019272.9A Active CN109548029B (en) 2019-01-09 2019-01-09 Two-stage node trust evaluation method for wireless sensor network

Country Status (1)

Country Link
CN (1) CN109548029B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111953679A (en) * 2020-08-11 2020-11-17 中国人民解放军战略支援部队信息工程大学 Intranet user behavior measurement method and network access control method based on zero trust
CN112672299A (en) * 2020-12-09 2021-04-16 电子科技大学 Sensor data reliability evaluation method based on multi-source heterogeneous information fusion
CN112689281A (en) * 2020-12-21 2021-04-20 重庆邮电大学 Sensor network malicious node judgment method based on two-type fuzzy system
CN113242237A (en) * 2021-05-08 2021-08-10 电子科技大学 Node equipment detection system based on industrial Internet of things and detection method thereof
CN114245384A (en) * 2021-11-12 2022-03-25 重庆邮电大学 Sensor network malicious node detection method based on generation countermeasure network
CN115460097A (en) * 2022-08-25 2022-12-09 国网安徽省电力有限公司信息通信分公司 Mobile application sustainable trust evaluation method and device based on fusion model

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765231A (en) * 2009-12-30 2010-06-30 北京航空航天大学 Wireless sensor network trust evaluating method based on fuzzy logic
CN102131193A (en) * 2010-01-12 2011-07-20 中国人民解放军总参谋部第六十一研究所 Secure routing method for converged network of wireless sensor network and computer network
CN102333307A (en) * 2011-09-28 2012-01-25 北京航空航天大学 Wireless sensor network (WSN) trust evaluation method based on subjective belief
CN102802158A (en) * 2012-08-07 2012-11-28 湖南大学 Method for detecting network anomaly of wireless sensor based on trust evaluation
US20170048308A1 (en) * 2015-08-13 2017-02-16 Saad Bin Qaisar System and Apparatus for Network Conscious Edge to Cloud Sensing, Analytics, Actuation and Virtualization
CN106789947A (en) * 2016-11-30 2017-05-31 安徽大学 The assessment of Internet of things node trust value and task delegation method based on environment
CN106888430A (en) * 2017-04-17 2017-06-23 华侨大学 A kind of believable sensing cloud Data Collection appraisal procedure
CN108093406A (en) * 2017-11-29 2018-05-29 重庆邮电大学 A kind of wireless sense network intrusion detection method based on integrated study
CN108684038A (en) * 2018-05-14 2018-10-19 华侨大学 The hiding data attack detection method that mechanism is evaluated with hierarchical trust is calculated based on mist

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765231A (en) * 2009-12-30 2010-06-30 北京航空航天大学 Wireless sensor network trust evaluating method based on fuzzy logic
CN102131193A (en) * 2010-01-12 2011-07-20 中国人民解放军总参谋部第六十一研究所 Secure routing method for converged network of wireless sensor network and computer network
CN102333307A (en) * 2011-09-28 2012-01-25 北京航空航天大学 Wireless sensor network (WSN) trust evaluation method based on subjective belief
CN102802158A (en) * 2012-08-07 2012-11-28 湖南大学 Method for detecting network anomaly of wireless sensor based on trust evaluation
US20170048308A1 (en) * 2015-08-13 2017-02-16 Saad Bin Qaisar System and Apparatus for Network Conscious Edge to Cloud Sensing, Analytics, Actuation and Virtualization
CN106789947A (en) * 2016-11-30 2017-05-31 安徽大学 The assessment of Internet of things node trust value and task delegation method based on environment
CN106888430A (en) * 2017-04-17 2017-06-23 华侨大学 A kind of believable sensing cloud Data Collection appraisal procedure
CN108093406A (en) * 2017-11-29 2018-05-29 重庆邮电大学 A kind of wireless sense network intrusion detection method based on integrated study
CN108684038A (en) * 2018-05-14 2018-10-19 华侨大学 The hiding data attack detection method that mechanism is evaluated with hierarchical trust is calculated based on mist

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
FARRUH ISHMANOV AND YOUSAF BIN ZIKRIA: "Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues", 《JOURNAL OF SENSORS》 *
YANG ZHANG ECT.: "An Efficient EH-WSN Energy Management Mechanism", 《TSINGHUA SCIENCE AND TECHNOLOGY》 *
ZHENGWANG YE ECT.: "An Efficient Dynamic Trust Evaluation Model for Wireless sensor networks", 《JOURNAL OF SENSORS》 *
李东振: "云计算环境下电子商务两级信任评估机制研究", 《中国优秀硕士学位论文全文数据库 经济与管理科学辑》 *
荆琦等: "无线传感器网络中的信任管理", 《软件学报》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111953679A (en) * 2020-08-11 2020-11-17 中国人民解放军战略支援部队信息工程大学 Intranet user behavior measurement method and network access control method based on zero trust
CN112672299A (en) * 2020-12-09 2021-04-16 电子科技大学 Sensor data reliability evaluation method based on multi-source heterogeneous information fusion
CN112672299B (en) * 2020-12-09 2022-05-03 电子科技大学 Sensor data reliability evaluation method based on multi-source heterogeneous information fusion
CN112689281A (en) * 2020-12-21 2021-04-20 重庆邮电大学 Sensor network malicious node judgment method based on two-type fuzzy system
CN112689281B (en) * 2020-12-21 2022-08-05 重庆邮电大学 Sensor network malicious node judgment method based on two-type fuzzy system
CN113242237A (en) * 2021-05-08 2021-08-10 电子科技大学 Node equipment detection system based on industrial Internet of things and detection method thereof
CN113242237B (en) * 2021-05-08 2022-03-18 电子科技大学 Node equipment detection system based on industrial Internet of things and detection method thereof
CN114245384A (en) * 2021-11-12 2022-03-25 重庆邮电大学 Sensor network malicious node detection method based on generation countermeasure network
CN114245384B (en) * 2021-11-12 2024-02-02 黑龙江两极科技有限公司 Sensor network malicious node detection method based on generation countermeasure network
CN115460097A (en) * 2022-08-25 2022-12-09 国网安徽省电力有限公司信息通信分公司 Mobile application sustainable trust evaluation method and device based on fusion model
CN115460097B (en) * 2022-08-25 2023-09-22 国网安徽省电力有限公司信息通信分公司 Fusion model-based mobile application sustainable trust evaluation method and device

Also Published As

Publication number Publication date
CN109548029B (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN109548029A (en) A kind of two-stage method for trust evaluation of nodes of Wireless Sensor Networks
Biswas et al. Pythagorean fuzzy multicriteria group decision making through similarity measure based on point operators
Rabie et al. A fog based load forecasting strategy for smart grids using big electrical data
Babazadeh et al. Application of particle swarm optimization to transportation network design problem
Amelio et al. Correction for closeness: Adjusting normalized mutual information measure for clustering comparison
CN102075352A (en) Method and device for predicting network user behavior
Xia et al. An evidential reliability indicator-based fusion rule for Dempster-Shafer theory and its applications in classification
Chen et al. Trust-aware and location-based collaborative filtering for web service QoS prediction
Hu et al. A user selection algorithm for aggregating electric vehicle demands based on a multi‐armed bandit approach
Tang et al. Novel distance and similarity measures for hesitant fuzzy sets and their applications to multiple attribute decision making
Gu et al. Application of fuzzy decision tree algorithm based on mobile computing in sports fitness member management
Wang et al. Multiple attribute group decision making approach based on extended VIKOR and linguistic neutrosophic Set
Chen et al. A new prioritized multi-criteria outranking method: The prioritized PROMETHEE
Liang et al. Tri-reference point method for q-rung orthopair fuzzy multiple attribute decision making by considering the interaction of attributes with Bayesian network
CN117150416B (en) Method, system, medium and equipment for detecting abnormal nodes of industrial Internet
CN109697531A (en) A kind of logistics park-hinterland Forecast of Logistics Demand method
Kant et al. Incorporating fuzzy trust in collaborative filtering based recommender systems
Maksimović et al. Comparative analysis of data mining techniques applied to wireless sensor network data for fire detection
Sun et al. A new probabilistic neural network model based on backpropagation algorithm
CN113884807B (en) Power distribution network fault prediction method based on random forest and multi-layer architecture clustering
Cabrerizo et al. Group decision making in linguistic contexts: an information granulation approach
Wang et al. Multi-attribute decision making models under interval type-2 fuzzy environment
Robertazzi et al. Machine learning in networking
Kim et al. Dynamic patterns of knowledge flows across technological domains: empirical results and link prediction
Bhanodia et al. Supervised shift k‐means based machine learning approach for link prediction using inherent structural properties of large online social network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant