期刊文献+

WSNs中基于重复博弈的信任评价方法研究 被引量:2

Study on Trust Evaluation Method in WSNs based on Repeated Games
下载PDF
导出
摘要 通过全面感知、可靠传输、智能化处理来实现人与人、物与物、人与物之间相连的物联网,是继计算机与互联网的应用与普及之后,信息世界掀起的第三次技术革命浪潮。在中国,物联网已经被纳入到国家"十二五"专项规划,毫无疑问,随着技术的成熟与体系的完善,它将彻底改变我们的生活。而无线传感器网络作为物联网时代最具有标志性的感知与传输技术之一,将会是今后网络研究与应用的热点。然而,传统无线传感器网络的研究重点往往在路由算法、密钥分配、体系结构等方面,节点信任问题却很容易受到忽视。已有的一些信任管理模型中,并没有充分考虑节点之间信任的时效问题,且信誉值计算方式以及权重存在着不合理性。因此,文章在前人研究的基础上,根据无线传感器网络性质,设置合理可行的博弈机制,提出了一种基于重复博弈的信任模型,并通过设立惩罚激励机制,依据节点策略的选择,对其信誉值进行更新以解决时效问题;通过仿真实验,证明该信任管理模型能够有效地对无线传感器网络节点进行信任的评价,抑制自私节点、打击恶意节点,可明显提高网络的可靠性。 The IOT which is to achieve the connection between human and things through the complete perception, reliable transmission and intelligent processing is the third wave of technology revolution in information industry after the application and popularization of computer and Internet. In China, IOT is taken into account as the twelfth ifve-year plan. Undoubtedly, with the Maturity of technology and system, it will completely change our lives. As one of the most iconic technology in the Internet of things era, the wireless sensor networks (WSNs) will be the focus and focal point of the present and future application and research. However, the focuses of WSNs are the routing algorithm, key distribution and architecture in previous studies. And the trust of node has been always overlooked. In some existing trust management models, they didn't quite take the time effect issue among nodes into consideration, and there were irrationality in weights and the way of computing reputation value. According to WSNs’ characteristics, a reasonable and feasible model which is based on repeated games is created in this paper .Besides ,we establish a punishment and reward mechanism to solve the time issue of node’ reputation. Finally, we conifrmed the trust manage model could evaluation node’ reputation effectively in WSNs. Through inhibition selifsh node and malicious node, the reliability of WSNs has got a great progress.
出处 《信息网络安全》 2014年第8期82-87,共6页 Netinfo Security
基金 四川省科技支撑计划[2013GZX0137] CUIT学术带头人科研基金[J201107]
关键词 重复博弈 无线传感器网络 信任模型 信任评价 repeated games WSNs trust model trust evaluation
  • 相关文献

参考文献19

二级参考文献135

共引文献486

同被引文献28

  • 1张琳,饶凯莉,王汝传.云计算环境下基于评价可信度的动态信任评估模型[J].通信学报,2013,34(S1):31-37. 被引量:6
  • 2STANOEVSKA-SLABEVA K, WOZNIAK T, RISTOL S. Grid and Cloud Computing: A Business Perspective on Technology and Applications[M]. Heidelberg : Springer Publishing Company, Incorporated, 2009.
  • 3ZHANG Qi, LU Cheng, BOUTABA R. Cloud Computing: State- of-the-Art and Research Challenges[J]. Journal of Internet Services and Applications. 2010, 1(1): 7-18.
  • 4XU Zeshui, LIAO Huchang. Intuitionistic Fuzzy Analytic Hierarchy Process[J].Fuzzy Systems, IEEE Transactions on, 2014, 22(4): 749-761.
  • 5TIAN Liqin, LIN Chuang, JI Tieguo. Quantitative Analysis of Trust Evidence in Internet[C]//IEEE.Communication Technology.November 27-30, 2006.Guilin,Guangxi, China.Piscataway:IEEE,2006: 1-5.
  • 6BROSSO I, LA Neve A, BRESSAN G, et al. A Continuous Authentication System Based on User Behavior Analysis[C]//IEEE. Availability, Rehability, and Security, ARES'10 International Conference. February 15-18,2010.Krakow.Piscatawav:IEEE, 2010: 380-385.
  • 7BROSSO I,NEVE A,BRESSAN G.A Continuous Authentication System Based on User Behavior Analysis[J].Nature Photonics, 2010, 4(10):700-705.
  • 8DILLON T, WU Cang. Cloud Computing:Issues and Challenges[J]. IEEE International Conference on Advanced Information Networking & Applications, 2010, 4(4):27-33.
  • 9DAVID O, JAQUET C.Trust and Identification in the Light of Virtual Persons[EB/OL].http://www.~dis.net/resources/deliverables/ identify- of-identify/,2011-3-10.
  • 10BOUTABA R. Cloud Computing: State-of-the-art and Research ChaUenges[J]. Journal of Intemet Services and Applications, 2010, 1(1): 7-18.

引证文献2

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部