期刊文献+

无线传感器网络的基于信任管理的分布式高可靠覆盖机制 被引量:1

Highly reliable distributed coverage mechanism based on trust management for wireless sensor networks
下载PDF
导出
摘要 为解决无线传感器网络中的安全覆盖问题,将覆盖算法整合到信任管理系统中,提出了一种基于信任管理的分布式高可靠覆盖机制(HRCMTM)。通过分析信任管理系统的潜在要求,从理论上推导和分析了网格尺寸选择。引入动态信任阈值新的概念,定量分析了覆盖节点集大小、联合信任度与动态信任阈值之间的关系。在此基础上,设计了确保可靠覆盖目标区域的节点调度覆盖算法。仿真结果验证了这一新的机制在覆盖率和联合信任度等方面的有效性。 To realize the secure coverage in wireless sensor networks, a Highly Reliable distributed Coverage Mechanism based on Trust Management (HRCMTM) was proposed by integrating a coverage algorithm into a trust management system. Through the analysis of the underlying requirements of trust management systems, the proper grid size was derived theoretically. The new concept of dynamic trust threshold was introduced to quantitatively analyze the rela- tionship between the size of coverage node set, the joint trust level and the dynamic trust threshold. Futher more, a node scheduling coverage algorithm was designed to guarantee that the target area is covered reliably. The experimental results demonstrated the effectiveness of this mechanism in terms of coverage ratio and joint trust level.
出处 《高技术通讯》 CAS CSCD 北大核心 2014年第5期465-471,共7页 Chinese High Technology Letters
基金 国家自然科学基金(61063040 61262074)资助项目
关键词 无线传感器网络(WSN) 信任管理 高可靠覆盖机制 动态信任阈值 网格 分布式 wireless sensornetworks (WSN), trust management, highly reliable coverage mechanism, dynamic trust threshold, grid, distributed
  • 相关文献

参考文献12

  • 1唐秋玲,杨柳青,覃团发,张淑仪.无线传感器网络中PPM节能调制方案[J].中国科学(E辑),2007,37(12):1583-1596. 被引量:3
  • 2徐强,汪芸.容错节能无线WSN中可靠覆盖问题的解决方案.软件学报,2006,17(zk):184-191.
  • 3Liu Z Y,Lu S J,Yan J.Analytical models for trust based routing protocols in wireless ad hoc networks.SIGSOFT Software Engineering Notes,2012,37(4).
  • 4Huang Y,Huang C.Cluster Algorithm for Electing Cluster Heads Based on Threshold Energy [C].International Conference on Electrical and Control Engineering 2010,2692-2695.
  • 5Feng H,Li G,Lu W,et al.Trust based secure in-network data processing schema in wireless sensor networks.Journal oJnetworks,2011,6(2):295-302.
  • 6Leligou H C,Trakadas P,Maniatis S,et al.Combining trust with location information for routing in wireless sensor networks.Wireless Communications and Mobile Com-puting,2012,12(12):1091-1103.
  • 7Zabihi S,Hadidi S,Khani M.A New Energy-Efficient Reliable Data Transfer Protocol for Data Transfer in WSN.Journal of Basic and Applied Scientific Research,2012,2(2):1972-1980.
  • 8Ma H D,Zhang X,Ming A.A Coverage-Enhancing Method for 3D Directional Sensor Networks.In:Proceedings of INFOCOM,Riode Janeiro,Brazil,2009.2791-2795.
  • 9Ganeriwal S,Srivastava M.Reputation-based framework for high integrity sensor networks.In:Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Network(SASN 2004),New York,USA,2004.66-77.
  • 10Bao F,Chen I R,MoonJeong Chang,et al.Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routin and Intrusion Detection.IEEE Transactions on network and seroice management,2012,9(2):169-183.

二级参考文献13

  • 1Goldsmith A J,Wicker S B.Design challenges for energy-constrained Ad Hoc wireless networks.IEEE Wirel Commun Mag,2002,9 (8):8-27.
  • 2Li X,Yu Z B.Study on cross-layer design and power conservation in Ad Hoc network.In:Proceedings of the 4th International Conference on Parallel & Distributed Computing,Application & Technology,Chengdu.Piscataway:IEEE,2003.324-328.
  • 3Laneman J N,Tse D N C,Wornell G W.Cooperative diversity in wireless networks:Efficient protocols and outage behavior.IEEE Trans Inf Theory,2004,50(12):3062-3080.
  • 4Prakash Y,Gupta S K S.Energy efficient source coding and modulation for wireless applications.In:Proceedings of Wireless Communications.& Networking Conference,New Orleans.Piscataway:IEEE,2003.212-217.
  • 5Yong Y.An energy aware multi-hop cooperative MIMO scheme in wireless sensor network.Sens Lett,2005,3:55-58.
  • 6Wang A Y,SeongHwan C,Sodini C G,et al.Energy efficient modulation and MAC for asymmetric RF microsensor systems.In:Proceedings of the International Symposium on Low Power Electronics & Design,Huntington Beach.New York:ACM,2001.106-111.
  • 7Cui S,Goldsmith A J,Bahai A.Energy-constranined modulation optimization.IEEE Trans Wirel Commun,2005,4(5):2349-2360.
  • 8Tang Q,Yang L,Giannakis G B,et al.Battery power efficiency of PPM and FSK in wireless sensor networks.IEEE Trans Wirel Commun,2007,6(4):1308-1319.
  • 9Pedram M,Wu Q.Design considerations for battery-powered electronics.In:Proceedings of the 36th ACM/IEEE Conference on Design Automation,New Orleans.New York:ACM,1999.861-866.
  • 10Rakhmatov D,Vrudhula S.Time to failure estimation for batteries in portable systems.In:Proceedings of International Symposium on Low Power Electronics & Design,Huntington Beach.New York:ACM,2001.88-91.

共引文献2

同被引文献19

  • 1Han Guangjie, Jiang Jinfang, Shu Lei, et al. Management and applications of trust in wireless sensor networks:a survey[J] . Journal of Computer and System Sciences, 2014, 80(3):602-617.
  • 2Zhang B, Huang Zhenhua, Xiang Yang. A novel multiple-level trust management framework for wireless sensor networks[J] . Computer Networks, 2014, 72(1):45-61. [6] Fabrice L F, Antonis P, Aline C V, et al. A sinkhole resilient protocol for wireless sensor networks:performance and security analysis[J] . Computer Communications, 2012, 35(2):234-248.
  • 3Fabrice L F, Antonis P, Aline C V, et al. A sinkhole resilient proto- col for wireless sensor networks: performance and security analysis [J]. Computer Communications,2012,35(2) :234-248.
  • 4Oussama S, Mounir F, Mahmoud B H. Load-balancing in MANET shortest-path routing protocols[J] . Ad hoc Networks, 2009, 7(2):431-442.
  • 5Liu Anfeng, Zhang Penghui, Chen Zhigang. Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks[J] . Journal of Parallel and Distributed Computing, 2011, 71(10):1327-1355.
  • 6Yu Yanli, Li Keqiu, Zhou Wanlei, et al. Trust mechanisms in wireless sensor networks:attack analysis and countermeasures[J] . Journal of Network and Computer Applications, 2012, 35(3):867-880.
  • 7Leligou H C, Trakadas P, Maniatis S, et al. Combining trust with location information for routing in wireless sensor networks[J] . Wireless Communications and Mobile Computing, 2012, 12(12):1091-1103.
  • 8Govind P G, Manoj M, Kumkum G. Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks[J] . Journal of Network and Computer Applications, 2014, 41(2):300-311.
  • 9Hsieh M Y, Huang Y M, Chao H C. Adaptive security design with malicious node detection in cluster-based sensor networks[J] . Computer Communications, 2007, 30(1):2385-2400.
  • 10Zhan Guoxing, Shi Weisong, Deng Julia. Design and implementation of TARF:a trust-aware routing framework for WSNs[J] . IEEE Trans on Dependable and Secure Computing, 2012, 9(2):184-197.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部