期刊文献+

基于能量监测的传感器信任评估方法研究 被引量:7

A Trust Evaluation Method of Sensors Based on Energy Monitoring
下载PDF
导出
摘要 目前解决无线传感网节点安全的方式多种多样,无线传感器也将随着物联网的发展而呈现多样化.根据物联网传感层的特点和其特有的安全问题,本文提出了一种基于能量监测的信任评估方法来解决无线传感网节点的信任问题.该方法首先针对无线传感器能耗情况,创建了传感器能量监测机制;然后,根据监测能量机制中的监测信息,通过互相关系数方法分析计算,得出传感器所处的几种信任度;最后,对传感器进行信任评估,并给出评估结果.仿真对比结果表明,本文提出的方法具有较高的准确性. At present all kinds of security methods are used to solve security problems of WSNs (wireless sensor networks). Along with the development of Internet of Things, wireless sensors in sensing layer of Internet of Things will also be diversified. Therefore,according to the sensing layer's characteristics and its unique security problems of Intemet of Things, we propose a trust evaluation mechanism based on energy monitoring to solve the security issues of sensing layer. Firstly, this paper establishes an ener- gy monitoring mechanism of wireless sensors. Secondly, it uses the correlation coefficient method to calculate the data of energy monitoring and conclude the trust melric of sensors. Simulation results show that the lrust evaluation method of wireless sensors pro- posed in this paper has higher accuracy.
出处 《电子学报》 EI CAS CSCD 北大核心 2013年第4期646-651,共6页 Acta Electronica Sinica
基金 教育部新世纪优秀人才支持计划(No.NCET100263) 教育部博士点基金-优先发展领域(No.20110005130001) 国家863高技术研究发展计划(No.2011AA01A102) 国家973重点基础研究发展规划(No.2009CB320406) 中国博士后科学基金(No.2011M500226)
关键词 无线传感网 能量监测 信任评估 相关系数 WSNs(wireless sensor networks ) energy monitoring trust evaluation correlation coefficient
  • 相关文献

参考文献17

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2Rui Sushmita, Nayak Amiya, Stojmenovic Ivan. Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs[ A]. Proceedings IEEE INFOCOM [ C ]. USA: IF.F.E Press, 2011.326 - 330.
  • 321aao Xin, Wang Xiaodong, Yu Wanrong, et al. An efficient broadcast authentication protocol in wireless sensor networks [J] .Chinese Journal of Electronics, 2009,18(2) :368 - 372.
  • 4Ning P, Liu A, Du WL. Mitigating DoS attacks against broad- cast authentication in wireless sensor networks[ J]. ACM Trans- actions on Sensor Networks, 2008,4( 1):1 - 35.
  • 5Kim J, Baek J, Shon T. An efficient and scalable re-authentica- tion protocol over wireless sensor network[ J ]. IEEE Transac- tions on Consumer Eleclronics,2011,57(2) :516 - 522.
  • 6Samir G, Tornasz I. Prediction-based monitoring in sensor net- works: Taking lessons from MPEG[ J]. ACM SIGCOMM Com- puter Communication Review ,2001,31 (5) :82 - 98.
  • 7Edward C, Song Han. Energy efficient residual energy monitor- ing in wireless sensor networks[ J]. International JoulTlal of Dis- tributed Sensor Networks, 2009, (5) : 748 - 770.
  • 8艾春丽,张凤登,刘荣鹏.无线传感网能量监测方法研究[J].自动化仪表,2007,28(12):5-7. 被引量:9
  • 9成小良,邓志东,董志然.基于无线通信和计算特征分析的能耗模型[J].计算机研究与发展,2009,46(12):1985-1993. 被引量:20
  • 10Choongill Yeh, Hyoungsoo Lim, Dongsetmg Kwon. IEEE C802.16d-03/92. RSSI Measurements[ S ]. 2003.

二级参考文献68

  • 1郑丽国,周怡颋,凌志浩,彭瑜.基于ZigBee技术的产品开发流程及其实现方法[J].自动化仪表,2006,27(z1):162-165. 被引量:13
  • 2Edgar H, Callaway Jr. Wireless sensor networks architectures and protocols [M]. London, UK: Auerbaeh Press, Part of Taylor & Francis Group LLC, 2003.
  • 3[美]Edgar H,Callaway Jr.无线传感器网络:体系结构与协议[M].王永斌,屈晓旭,译.北京:电子工业出版社,2007:12-18,54-56,324-331.
  • 4Gregory J P, William J K. Embedding the Internet.. Wireless integrated network sensors [J]. Communications of the ACM, 2000, 43(5): 51-58.
  • 5Chatterjea S, Nieberg T, et al. A distributed and selforganizing scheduling algorithm for energy-efficient data aggregation in wireless sensor network [J]. ACM Trans on Sensor, 2008, 4(4), 20: 1-20, 41.
  • 6Kim M, Jeong E, et al. An energy-aware multipath routing algorithm in wireless sensor network [J]. IEICE Trans on Information and Systems, 2008, E91D(10): 2419-2427.
  • 7How does ZigBee compare with other wireless standards [EB/OL]. Software Technologies Group (STG). [2009-04- 21]. http://www. stg. com/wireless/ZigBee_comp. html.
  • 8ZigBee Alliance. ZigBee document 053474r13 [EB/OL]. (2006-12-01) [2009-04-20]. http://www.zigbee. org.
  • 9Freescale Co. Freescale BeeStack^TM Software Reference Manual [EB/OL]. ( 2008-01-06 ) [ 2009-04-20 ]. http:// www. freescale. com.
  • 10Zhao Y J, Govindan R, et al. Residual energy scans for monitoring wireless sensor network [C] //Proc of IEEE WCNC'02. Piscataway: IEEE, 2002:356-362.

共引文献111

同被引文献43

  • 1金连,王宏志,黄沈滨,高宏.基于Map-Reduce的大数据缺失值填充算法[J].计算机研究与发展,2013,50(S1):312-321. 被引量:18
  • 2范存群,王尚广,谷文哲,孙其博,杨放春.车联网下基于网络编码的高吞吐量多径路由算法[J].通信学报,2013,34(S1):133-141. 被引量:6
  • 3艾春丽,张凤登,刘荣鹏.无线传感网能量监测方法研究[J].自动化仪表,2007,28(12):5-7. 被引量:9
  • 4HE D, CHEN C, CHAN S, et al. A distributed trust evaluation model and its application scenarios for medical sensor networks[J]. IEEE Transactions on Information Technology in Biomedicine, 2012, 16(6): 1164-1175.
  • 5LI X, ZHOU F, DU J. LDTS: a lightweight and dependable trust system for clustered wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 924-935.
  • 6ZHANG B, HUANG Z H, XIANG Y. A novel multiple-level trust management framework for wireless sensor networks[J]. Computer Networks, 2014, 72: 45-61.
  • 7SAIED Y B, OLIVEREAU A, ZEGHLACHE D, et al. Trust management system design for the Internet of things: a context-aware and multi-service approach[J]. Computers & Security, 2013, 39(B): 351-365.
  • 8HAN G, JIANG J, SHU L, et al. Management and applications of trust in wireless sensor networks: a survey[J]. Journal of Computer and System Sciences, 2014, 80(3): 602-617.
  • 9YAN Z, ZHANG P, VASILAKOS A V. A survey on trust management for Internet of things[J]. Journal of Network and Computer Applications, 2014, 42: 120-134.
  • 10SICARI S, RIZZARDI A, GRIECO L A, et al. Security, privacy and trust in Internet of things: the road ahead[J]. Computer Networks, 2015, 76: 146-164.

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部