期刊文献+

基于分簇的无线传感器网络中信任节点的研究 被引量:2

Study on trust node in clustering-based wireless sensor networks
下载PDF
导出
摘要 对节点的信任值进行研究,来判断节点是否值得信赖。对节点的信任要素进行分析,重点介绍分簇的无线传感器网络(WSNs)中信任的计算模型。在该模型中,综合直接信任和信誉给出信任度的计算方法。直接信任度采用基于贝叶斯评估方法,在推荐信任度的基础上描述信誉。仿真结果表明:在识别恶意节点和簇头选举时显示出该模型的优越性。 By studing on trust value, node is determined whether it is worth trusted. The trust elements of the node is analyzed, trusted computing model focuses on clustering in wireless sensor networks is focused on. In the model, the calculation method of credibility is given by integrated direct confidence and trust. Direct trust assessment based on Bayesian methods, the credibility is described at the foundation of Recommend trust . The simulation results show that while identifing malicious nodes, the superiority of the model is showed at the same time.
出处 《传感器与微系统》 CSCD 北大核心 2010年第1期18-20,共3页 Transducer and Microsystem Technologies
基金 国家自然科学基金资助项目(60873058) 山东省自然科学基金资助项目(Y2008G16)
关键词 无线传感器网络 分簇 信任 wireless sensor networks (WSNs) clustering trust
  • 相关文献

参考文献6

  • 1荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730. 被引量:62
  • 2Heinzehnan W R, Chandrakasan A, Balak Rishnan H. Energy-efficient communication protocol for wireless microsensor networks [ C ] //Hawaii, USA : Proceedings of the 33 rd Annual Hawaii International Conference on Sciences System,2000:1 -10.
  • 3吴鹏,吴国新,方群.一种基于概率统计方法的P2P系统信任评价模型[J].计算机研究与发展,2008,45(3):408-416. 被引量:27
  • 4Momani M, Challa S, Alhmouz R. Can we trust trusted nodes in wireless sensor networks [ C ]//Kuala Lumpur, Malaysia: Proceedings of the International Conference on Computer and Communication Engineering,2008 ;1125-1130.
  • 5Ganeriwal S, Srivastava M B. Reputation-based framework for high integrity sensor networks[ C ]//2nd ACM Workshop on Security of Ad Hoc And Sensor Networks,2004 :1282 -1291.
  • 6卢伟勤,张煜,李建欣,刘旭东.面向网格的信任评估模型GTruMod[J].计算机工程,2008,34(5):139-141. 被引量:3

二级参考文献55

  • 1朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 2唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 3D E Zand. Trust and managerial problem solving [J]. Administrative Science Quarterly, 1972, 17(2) : 229-239.
  • 4T Grandison, M Sloman. A survey of trust in Internet applications [J]. IEEE Communications Surveys and Tutorials, 2000, 3(4): 2-16.
  • 5P Macnaughton-Smith, W T Williams, M B Dale, et al. Dissimilarity analysis: A new technique of hierarchical subdivision [J]. Nature, 1964, 202(6):1034-1035.
  • 6E Adar, B A Huberman. Free riding on Gnutella [R]. Xerox Palo Alto Research Center, Tech Rep: CSL-00-3, 2000.
  • 7S Kamvar. EigenRep; Reputation management in P2P networks [R]. Stanford University, Tech Rep: SCCM-02-16, 2002.
  • 8K Aberer, Z Despotovic. Managing trust in a peer-2-peer information system [C]. In: Proc of the 10th Int'l Conf on Information and Knowledge Management. New York: ACM Press, 2001. 310-317.
  • 9S Lee, R Sherwood, B Bhattacharjee. Cooperative peer groups in NICE [C]. IEEE INFOCOM 2003, San Francisco, 2003.
  • 10L Mul, M Mohtashemi, A Halberstadt. A computational model of trust and reputation [C]. The 35th Hawaii Int'l Conf on System Science (HICSS 2002), Hawaii, 2002.

共引文献88

同被引文献9

引证文献2

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部