期刊文献+

基于物联网节点行为检测的信任评估方法 被引量:14

Trust system based on node behavior detection in Internet of Things
下载PDF
导出
摘要 针对物联网感知层节点的信任研究未能兼顾信任评估的主客观性且信任传递能耗大的问题,提出一种基于节点行为检测的低能耗信任评估模型。该模型采用事件触发检测与周期性检测相结合的方式,通过直接信任值、统计信任值与推荐信任值3种信任因子计算综合信任值,进而判断节点行为是否发生异常。仿真实验结果表明本方法有效兼顾信任评估的主客观性,同时可以快速规避恶意节点并降低信任传递能耗。 Establishing a trust system, which considers energy efficiency and a trust metric aware both subjectivity and objectivity in the Interact of Things, is a powerful technique to defend against malicious attacks and improve the performance of network. A trust system based on behavior detection was proposed, which takes direct trust, recommended trust as well as history statistical trust into trust evaluation periodically and in communication. Recommended trust and history statistical trust were calculated by evidence combination and Bayes respectively. Simulation results show that nodes occur abnormal behavior could be quickly detected by the proposed trust system and the energy consumption of transmitting recommended trust was saved greatly.
出处 《通信学报》 EI CSCD 北大核心 2014年第5期8-15,共8页 Journal on Communications
基金 国家自然科学基金资助项目(61272400 61309031) 教育部NCET基金资助项目 重庆高校创新计划基金资助项目(KJTD201310 KJZH11206) 重庆市教委科学研究基金资助项目(KJ130523&120512) 重庆邮电大学青年科学研究基金资助项目(A2012-79)~~
关键词 物联网 行为检测 信任评估 能耗 Internet of Things behavior detection trust evaluation energy consumption
  • 相关文献

参考文献16

  • 1ATZORI L, IERA A, MORABITO G. The Internet of Things: a sur- vey[J]. Computer Networks, 2010, 54(15):2787-2805.
  • 2ROMANA R, ZHOUAJ, LOPEZB J. On the features and challenges of security & privacy in distributed Intemet of Things[J]. Computer Networks, 2013, 57 (10):2266-2279.
  • 3ZHU H, DU S, GAO Z, et al. A probabilistic misbehavior detection scheme towards efflcient trust establishment in delay-tolerant net- works[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, (99): 1-6.
  • 4LI X Y, ZHOU F, DU J, et al. LDTS: a lightweight and dependable trust system for clustered wireless sensor networks[J]. IEEE on Trans- actions on Information Forensics and Security, 2012, 8(6):924-935.
  • 5BAO F, CHEN R, CHANG M J, et al. Trust-based intrusion detection in wireless sensor networks[A]. 2011 IEEE International Conference on Communications (ICC)[C]. Kyoto, Japan, 201 1. 1-6.
  • 6HE D, CHEN C, CHAN S, et al. A distributed trust evaluation model and its application scenarios for medical Sensor networks[J]. IEEE Transaction on information Technology in Biomedicine, 2012, 16(6):1164-1175.
  • 7SUN B, SHAN X M, WU K, et al. Anomaly detection based secure in-network aggregation for wireless sensor networks[J]. IEEE Systems Journal, 2013, 7(1): 13-25.
  • 8肖德琴,冯健昭,周权,杨波.基于高斯分布的传感器网络信誉模型[J].通信学报,2008,29(3):47-53. 被引量:22
  • 9CROSBY G.V, HESTERL, PISSION N. Location-aware, trnst-based detection and isolation of compromised nodes in wireless sensor net- works[J]. International Journal Network Security, 2011, 12(2): 107- 117.
  • 10ZHANG J, SHANKARAN R, ORGUN M A, et al. A dynamic trust establishment and management framework for wireless sensor net- works[A]. 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC)[C]. Hong Kong, China, 2010. 484-491.

二级参考文献27

共引文献100

同被引文献82

引证文献14

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部