期刊文献+

容忍入侵的无线传感器网络模糊信任评估模型 被引量:11

Fuzzy trust model for wireless sensor networks with intrusion tolerance
下载PDF
导出
摘要 针对无线传感器网络的"数据感知融合"和"数据转发"两类关键服务面临的内部攻击,提出了一种基于信任—信心值的二元组模糊信任评估模型,可有效识别路由和数据分组丢弃攻击,并通过限制数据的篡改范围,实现对难以发现的数据篡改攻击的容忍。以示例给出并分析了基于模糊信任模型的容忍入侵机制,以仿真实验说明了模糊信任模型针对路由和数据分组丢弃攻击在入侵节点与普通节点分类上的效果;最后分析了模糊信任模型对网络性能的影响,并阐述了与相关工作的异同。 To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.
出处 《通信学报》 EI CSCD 北大核心 2010年第12期37-44,54,共9页 Journal on Communications
基金 国家自然科学基金项目(60703115) 国家高技术研究发展计划("863"计划)基金资助项目(2007AA01Z405) 国家社科基金资助项目(09CTJ006) 中国博士后科学基金资助项目(200801357 20070420955) 江苏省博士后科研基金资助项目(0702003B) 江苏省青蓝工程基金资助项目 江苏大学科研启动经费基金资助项目(07JDG080)~~
关键词 无线传感器网络 容忍入侵 可信模型 模糊信任 wireless sensor networks intrusion tolerance trust model fuzzy trust
  • 相关文献

参考文献15

  • 1PERRIG A,STANKOVIC J,WAGNER D.Security in wireless sensor networks[J].Communications of the ACM,2004,47(6):53-57.
  • 2KARLOF C,WANGER D.Secure routing in wireless sensor networks:attacks and countermeasures[J].Elsevier's Ad Hoc Networks Journal,2003,1(2-3):293-315.
  • 3PERRIG A,SZEWCZYK R,et al.SPINS:security protocols for sensor networks[J].Wireless Network,2002,8(5):521-534.
  • 4MA R,XING L,MICHEL E.Fault-intrusion tolerant techniques in wireless sensor networks[A].DASC06[C].Washington,DC,US,2006.85-94.
  • 5荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730. 被引量:62
  • 6SUN Y,YU W,et al.Information theoretic framework of trust modeling and evaluation for ad hoc networks[J].IEEE Journal on Selected Areas in Communications,2008,19 (7):1716-1730.
  • 7肖德琴,冯健昭,杨波,张焕国.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87. 被引量:11
  • 8杨光 印桂生 杨武等.无线传感器网络基于节点行为的信誉评测模型.通信学报,2007,28(6):84-87.
  • 9王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度[J].电子学报,2006,34(8):1446-1451. 被引量:22
  • 10DENG J,HAN R,MISHRA S.INSENS:intrusion-tolerant routing for wireless sensor networks[J].Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks,2006,29 (2):216-230.

二级参考文献79

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度[J].电子学报,2006,34(8):1446-1451. 被引量:22
  • 3Yu M, Mokhtar H, Merabti M. Fault nlanagement in wireless sensor networks [J]. Wireless Communications, 2007, 14(6): 13-19.
  • 4Albert R, Jeong H, Barabasi A L. Error and attack tolerance of complex networks[J]. Nature, 2000, 406(27): 378-382.
  • 5Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing for wireless sensor networks[J]. Computer Communications, 2006, 29(2): 216-230.
  • 6Ma R, Xing L, Michel H E. Fault-intrusion tolerant techniques in wireless sensor networks [C] //Proc of the 2nd IEEE Int Symp on Dependable, Autonomic and Secure Computing (DASC'06). Los Alamitos, CA: IEEE Computer Society, 2006.- 85-94.
  • 7Parvin S, Kim D S, Jong S. Towards survivable sensor networks using self-regenerative rejuvenation and reconfiguration [C]//Int Conf on Computational Intelligence and Security Workshops. Piscataway, NJ: IEEE, 2007: 546- 549.
  • 8Khin M, Jong S. Survivability analysis of a cluster system with 4th generation security mechanism: Regeneration[J]. 2006, 3(3): 271.
  • 9Chen It, Youssif B, Qu G, et al. Self-configuration of network security [C]//Proc of the 11th IEEE Int Enterprise Distributed Object Computing Conference. Piscataway, NJ: IEEE, 2007:97-108.
  • 10Santi P. Topology control in wireless ad hoc and sensor networks[J]. ACM Comp Surveys, 2005, 37(2) :164-194.

共引文献93

同被引文献156

引证文献11

二级引证文献159

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部