通信学报 ›› 2014, Vol. 35 ›› Issue (2): 63-69.doi: 10.3969/j.issn.1000-436x.2014.02.009

• 学术论文 • 上一篇    下一篇

基于轻量云模型的WSN不确定性信任表示方法

徐晓斌,张光卫,王尚广,孙其博,杨放春   

  1. 北京邮电大学 网络与交换技术国家重点实验室,北京 100876
  • 出版日期:2014-02-25 发布日期:2017-07-25
  • 基金资助:
    教育部新世纪优秀人才支持计划基金资助项目;教育部新世纪优秀人才支持计划基金资助项目;教育部博士点基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;国家自然科学基金资助项目

Representation for uncertainty trust of WSN based on lightweight-cloud

Xiao-bin XU,Guang-wei ZHANG,Shang-guang WANG,Qi-bo SUN,Fang-chun YANG   

  1. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Online:2014-02-25 Published:2017-07-25
  • Supported by:
    The New Century Talent Supporting Project of Education Ministry;The New Century Talent Supporting Project of Education Ministry;PhD Programs Foundation of Ministry of Education;The National High Technology Research and Development Program of China(863 Pro-gram);The National Natural Science Foundation of China

摘要:

参考云模型定性定量不确定性转换特性,设计了适用于WSN的轻量云模型,使用此模型对直接信任、间接信任、推荐行为的信任进行全面的不确定性表示。轻量云模型计算简单,每一个WSN节点均可独立建立轻量云模型,并对邻居节点信任情况进行全面的评估,从而发现WSN应用中的安全问题。实验结果表明,该方法克服了传统信任管理框架中敏感度与容忍度之间的矛盾,既保证了多种异常情况的高容忍度,又具备较敏感的攻击识别能力。

关键词: :WSN安全, 信任管理, 入侵容忍, 入侵识别, 云模型

Abstract:

According to the characteristic of qualitative and quantitative uncertainty conversion ability of cloud model, a lightweight cloud model was designed, and the uncertainty representation of direct trust, indirect trust, and recommenda-tion trust in WSN was proposed. The computation cost of lightweight cloud model is quite low so that a single node can build lightweight cloud model independently and evaluate the trust of other nodes to find out the safety hazards in WSN. Simulations in multiple scenarios verify the effectiveness of the proposed method. Simulation results show that this method overcomes the contradiction between the sensitivity and tolerance of traditional trust management framework, furthermore, it's not only tolerant of abnormal conditions, but also sensitive to multiple attacks.

Key words: WSN security, trust management, intrusion tolerance, intrusion recognition, cloud model

No Suggested Reading articles found!