In view of the forwarding microblogging,secondhand smoke,happiness,and many other phenomena in real life,the spread characteristic of the secondary neighbor nodes in this kind of phenomenon and network scheduling is e...In view of the forwarding microblogging,secondhand smoke,happiness,and many other phenomena in real life,the spread characteristic of the secondary neighbor nodes in this kind of phenomenon and network scheduling is extracted,and sequence influence maximization problem based on the influence of neighbor nodes is proposed in this paper.That is,in the time sequential social network,the propagation characteristics of the second-level neighbor nodes are considered emphatically,and k nodes are found to maximize the information propagation.Firstly,the propagation probability between nodes is calculated by the improved degree estimation algorithm.Secondly,the weighted cascade model(WCM) based on static social network is not suitable for temporal social network.Therefore,an improved weighted cascade model(IWCM) is proposed,and a second-level neighbors time sequential maximizing influence algorithm(STIM) is put forward based on node degree.It combines the consideration of neighbor nodes and the problem of overlap of influence scope between nodes,and makes it chronological.Finally,the experiment verifies that STIM algorithm has stronger practicability,superiority in influence range and running time compared with similar algorithms,and is able to solve the problem of maximizing the timing influence based on the influence of neighbor nodes.展开更多
The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important...The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor networks. Malicious nodes are modeled as faulty nodes behaving intelligently to lead to an incorrect decision or energy depletion without being easily detected. Each sensor node makes a decision on the fault status of itself and its neighboring nodes based on the sensor readings. Most erroneous readings due to transient faults are corrected by filtering, while nodes with permanent faults are removed using confidence-level evaluation, to improve malicious node detection rate and event detection accuracy. Each node maintains confidence levels of itself and its neighbors, indicating the track records in reporting past events correctly. Computer simulation shows that most of the malicious nodes reporting against their own readings are correctly detected unless they behave similar to the normal nodes. As a result, high event detection accuracy is also maintained while achieving low false alarm rate.展开更多
针对委托权益证明(delegated proof of stake,DPoS)中节点投票不积极和恶意节点操纵选举结果的问题,提出一种基于共邻节点相似度改进的DPoS(DPoS based on similarity of common neighbor nodes,S-DPoS)共识算法。首先,引入共邻节点相...针对委托权益证明(delegated proof of stake,DPoS)中节点投票不积极和恶意节点操纵选举结果的问题,提出一种基于共邻节点相似度改进的DPoS(DPoS based on similarity of common neighbor nodes,S-DPoS)共识算法。首先,引入共邻节点相似度模型实现社区划分,缩短投票周期,提高共识效率。其次,计算节点的信誉度,各社区选出一个信誉度最高的节点作为见证节点且负责生产区块,通过节点身份转换机制及时更新节点类别。最后,通过奖惩机制对节点进行奖惩,快速剔除错误节点。仿真实验结果表明,S-DPoS共识算法的节点参与度比DPoS算法提高30%~40%,并且能够有效降低恶意节点操纵选举结果的可能性,增强了系统的安全性。展开更多
基金Supported by the National Natural Science Foundation of China(No.62172352,61871465,42002138)the Natural Science Foundation of Hebei Province(No.F2019203157)the Science and Technology Research Project of Hebei(No.ZD2019004)。
文摘In view of the forwarding microblogging,secondhand smoke,happiness,and many other phenomena in real life,the spread characteristic of the secondary neighbor nodes in this kind of phenomenon and network scheduling is extracted,and sequence influence maximization problem based on the influence of neighbor nodes is proposed in this paper.That is,in the time sequential social network,the propagation characteristics of the second-level neighbor nodes are considered emphatically,and k nodes are found to maximize the information propagation.Firstly,the propagation probability between nodes is calculated by the improved degree estimation algorithm.Secondly,the weighted cascade model(WCM) based on static social network is not suitable for temporal social network.Therefore,an improved weighted cascade model(IWCM) is proposed,and a second-level neighbors time sequential maximizing influence algorithm(STIM) is put forward based on node degree.It combines the consideration of neighbor nodes and the problem of overlap of influence scope between nodes,and makes it chronological.Finally,the experiment verifies that STIM algorithm has stronger practicability,superiority in influence range and running time compared with similar algorithms,and is able to solve the problem of maximizing the timing influence based on the influence of neighbor nodes.
文摘The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor networks. Malicious nodes are modeled as faulty nodes behaving intelligently to lead to an incorrect decision or energy depletion without being easily detected. Each sensor node makes a decision on the fault status of itself and its neighboring nodes based on the sensor readings. Most erroneous readings due to transient faults are corrected by filtering, while nodes with permanent faults are removed using confidence-level evaluation, to improve malicious node detection rate and event detection accuracy. Each node maintains confidence levels of itself and its neighbors, indicating the track records in reporting past events correctly. Computer simulation shows that most of the malicious nodes reporting against their own readings are correctly detected unless they behave similar to the normal nodes. As a result, high event detection accuracy is also maintained while achieving low false alarm rate.
文摘针对委托权益证明(delegated proof of stake,DPoS)中节点投票不积极和恶意节点操纵选举结果的问题,提出一种基于共邻节点相似度改进的DPoS(DPoS based on similarity of common neighbor nodes,S-DPoS)共识算法。首先,引入共邻节点相似度模型实现社区划分,缩短投票周期,提高共识效率。其次,计算节点的信誉度,各社区选出一个信誉度最高的节点作为见证节点且负责生产区块,通过节点身份转换机制及时更新节点类别。最后,通过奖惩机制对节点进行奖惩,快速剔除错误节点。仿真实验结果表明,S-DPoS共识算法的节点参与度比DPoS算法提高30%~40%,并且能够有效降低恶意节点操纵选举结果的可能性,增强了系统的安全性。