期刊文献+

基于信任评估模型的IWSN安全路由研究 被引量:9

Research on IWSN Secure Routing Based on Trust Evaluation Model
下载PDF
导出
摘要 针对工业无线传感器网络对网络传输安全的要求,研究了一种基于改进的信任评估模型的节点可信安全路由协议。采用惩罚因子和直接信任值交互次数更新,防止恶意节点的暴力攻击以及伪装攻击;采用基于推荐节点的推荐信任可靠度,阻止恶意节点对其他节点的群体诽谤。仿真结果显示,与IASR中典型的信任评估模型相比,采用的模型在恶意行为防御性能上优于IASR信任评估模型;与实时可靠的THTR路由相比,采用的路由方法在丢包率、平均端到端时延、吞吐量以及路由开销上有着显著改善。 Aiming at the security requirements of network transmission in industrial wireless sensor networks,a node trusted security routing protocol based on improved trust evaluation model is studied. The number of interactions between the penalty factor and the direct trust value is updated to prevent violent attacks and camouflage attacks by malicious nodes. The recommendation trust reliability based on the recommendation node is adopted to prevent malicious nodes from vilifying other nodes. The simulation results show that compared with the typical trust assessment model in IASR,the adopted model is superior to the IASR trust assessment model in the defense performance of malicious behavior;compared with the real-time and reliable THTR routing,there is a significant improvement in end-to-end latency,throughput,and routing overhead.
作者 孙子文 吴平 SUN Ziwen;WU Ping(School of Internet of Things Jiangnan University, Wuxi Jiangsu 214122, China;Engineering Research Center of Internet of Things Technology Applications Ministry of Education, Wuxi Jiangsu 214122, China)
出处 《传感技术学报》 CAS CSCD 北大核心 2019年第6期858-865,共8页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61373126) 江苏省自然科学基金项目(BK20131107) 中央高校基本科研业务费专项资金项目(JUSRP51510)
关键词 工业无线传感器网络 信任评估模型 安全路由 推荐信任 industrial wireless sensor networks trust assessment model secure routing recommendation trust
  • 相关文献

参考文献5

二级参考文献61

  • 1程伟明,周新运.一个用于Ad Hoc网络的分簇方法[J].计算机学报,2005,28(5):864-869. 被引量:18
  • 2王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 3LIU DONGGANG. Secur/ty mechanisms for wireless sensor networks [D]. Raleigh, NC: North Carolina State University, 2005.
  • 4ZENG YINGPEI, CAO JIANNONG, HONG JUE, et al. Secure localization and location verification in wireless sensor networks [ C]// IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems. Washington, DC: IEEE Computer Society, 2009: 864- 869.
  • 5GANERIWAL S, BALZANO L K, SRIVASTAVA M B. Reputation-based framework for high integrity sensor networks [J]. ACM Transactions on Sensor Networks, 2007, 4(3): 1 -36.
  • 6Badal C.Saha.; Hemicellulose bioconversion[J]. J Ind Microbiol Biotechnol,2003,30:279-291.
  • 7Eda S,Ohnishi A,Kato K. Xylan isolated from the stalk of Nicotiana tabacum[J]. Agric Biol Chem, 1976,40:359-364.
  • 8Saulnier L, Marot C, Chanliaud E, Thibault JF. Cell wall polysaccharide interactions in maize bran[J]. Carbohydr Polymers, 1995,26:279-287.
  • 9Thomson JA. Molecular biology of xylan degradation[J]. FEMS Microbiol Rev, 1993,104:65-92.
  • 10Sun Y, Cbeng J. Hydrolysis of lignocellulosic materials for ethanol production[J]. a review. Bioresour Technol, 83:1-11.

共引文献26

同被引文献75

引证文献9

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部