期刊文献+

防御信任攻击的无线传感器网络安全信任评估模型 被引量:17

A Security Trust Evaluation Model for Wireless Sensor Networks Defense Against Trust Attacks
在线阅读 下载PDF
导出
摘要 现有的无线传感器网络信任模型极少考虑针对信任体系本身的攻击,因此提出了一种防御信任体系攻击的信任评价模型(DTSA)。首先引入模糊综合评判模型计算直接信任,并利用控制因子来降低开关攻击节点的信任值域范围。其次对推荐信任进行过滤与权重分配,降低恶意节点对间接信任评估结果的影响。最后在计算综合信任时,为历史信任设计了自适应权重,抑制了恶意节点信任值的快速上升。仿真结果表明本模型与其他模型相比,开关攻击节点的平均信任值下降了16.4%,坏嘴攻击和串谋攻击所造成的平均误差分别由0.118和0.101降低到了0.051和0.039。因此,本模型能有效地处理信任模型攻击,提升信任评估的准确性。 The existing trust model for wireless sensor networks rarely consider attacks against the trust system itself,therefore,a trust evaluation model for defense against trust system attacks(DTSA)is proposed.Firstly,the direct trust is calculated by the fuzzy comprehensive evaluation model,and the control factor is used to reduce the range of the trust value of the On-off attack node.Then filter and weight the recommendation trust to reduce the impact of malicious nodes on indirect trust.When calculating the integrated trust,self-adaptive weight is designed for historical trust,which inhibits the rapid rise of the malicious node’s trust value.The simulation results show that the average trust value of the On-off attack node is reduced by16.4%compared with other models.The average errors caused by bad mouth attack and collusion attack decreased from0.118and0.101to0.051and0.039,respectively.Therefore,DTSA can effectively deal with the attack of trust model and improve the accuracy of trust evaluation.
作者 陶洋 潘蕾娜 王进 杨柳 TAO Yang;PAN Leina;WANG Jin;YANG Liu(College of Communication and Information Engineering,Chongqing University of Posts and Telecommunication,Chongqing 400065,China)
出处 《传感技术学报》 CAS CSCD 北大核心 2018年第12期1876-1881,共6页 Chinese Journal of Sensors and Actuators
基金 无线传感器网络中基于信任机制的安全层次路由协议研究项目(cstc2018jcyjAX0344) 应急环境下自适应数据采集与业务调度关键技术的研究项目(cstc2017jcyjAX0135)
关键词 无线传感器网络 信任模型 模糊综合评判 恶意节点 节点信任 wireless sensor network trust model fuzzy comprehensive evaluation malicious node node trust
  • 相关文献

参考文献1

二级参考文献17

  • 1HANG J, JIANG J F, SHU L, et al. Management and applications of trust in wireless sensor networks : A survey[ J]. Journal of Computer and System Sciences, 2013, 80: 6024517.
  • 2YU Y, LI K, ZHOU W, et al. Trust mechanisms in wireless sensor networks: Attack analysis and counter- measures [ J ]. Journal of Network and Computer Applica- tions, 2012, 35(3): 867-880.
  • 3KHALID O, KHAN SAMEE U, MADANI SAJJAD A, et al. Comparative study of trust and reputation systems for wireless sensor networks [ J]. Security and Communica- tion Networks, 2013, 6(6): 6694588.
  • 4AYMAN T, AYMAN K, ALI C, et al. Fuzzy reputation- based trust model [ J ]. Applied Soft Computing Journal, 2011, 11(1) : 345-355.
  • 5XIA H, JIA Z, JU L, et al. Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory [ J ]. IET Wireless Sensor Sys- tems, 2011, 1(4) : 248-251.
  • 6CHEN Z G, LI L M, GUI J S. Fuzzy theory for the P2P subject trust evaluation model [ J ]. International Journal of Advancements in Computing Technology, 2012, 4(8) : 67-74.
  • 7ZHANG F, JIA Z P, XIA H, et al. Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and markov SCGM ( 1,1 ) model [ J ]. Computer Communications, 2012, 35 (5) : 589-596.
  • 8KHATDRI P, TAPASWI S, VERMA U P. Trust evalua- tion in wireless ad-hoc networks using fuzzy system [ J ]. Computer Systems Science and Engineering, 2014, 9(1) : 43-50.
  • 9ISHUZAKA A, LABIB A. Review of the main develop- ments in the analytic hierarchy process [ J ]. Expert Sys- tems with Applications, 2011, 38( 11 ) : 14336-14345.
  • 10陈珊珊,杨庚.非结构化对等网络环境中基于超级路径的信任汇聚模型[J].仪器仪表学报,2010,31(1):223-228. 被引量:3

共引文献11

同被引文献150

引证文献17

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部