作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2021, Vol. 47 ›› Issue (3): 174-182. doi: 10.19678/j.issn.1000-3428.0057388

• 移动互联与通信技术 • 上一篇    下一篇

基于双簇头的无线传感器网络反馈信任模型

周远林, 陶洋, 李正阳, 杨柳   

  1. 重庆邮电大学 通信与信息工程学院, 重庆 400065
  • 收稿日期:2020-02-13 修回日期:2020-03-23 发布日期:2021-03-15
  • 作者简介:周远林(1994-),男,硕士研究生,主研方向为传感器网络、安全路由;陶洋,教授、博士;李正阳,硕士研究生;杨柳,讲师、博士。
  • 基金资助:
    国家自然科学基金(61801072);重庆市自然科学基金(cstc2018jcyjAX0344)。

Double Cluster Head-based Feedback Trust Model for Wireless Sensor Network

ZHOU Yuanlin, TAO Yang, LI Zhengyang, YANG Liu   

  1. School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
  • Received:2020-02-13 Revised:2020-03-23 Published:2021-03-15

摘要: 针对无线传感器网络存在恶意或妥协节点导致通信数据被攻击的问题,提出一种基于双簇头的反馈信任模型,以保障数据在传输、感知以及融合等环节的可靠性与完整性。利用节点间直接交互结果评估节点的直接信任,同时考虑通信、数据感知和融合信任,通过贝叶斯公式评估邻居节点的通信信任,使用时间滑动窗将节点历史信任作为直接信任的补充,动态调整直接与间接信任权重使综合信任评价更客观和准确。在此基础上,引入双簇头交互监测和基站信任反馈机制,主簇头和监督簇头根据本地数据空间相关性独立评估成员数据感知信任,基站利用双簇头数据融合结果的时间相关性评估数据融合信任,并将最终信任结果反馈到所有节点。仿真结果表明,该模型能有效检测异常数据和恶意节点,成功抵御选择性转发攻击、伪造本地数据攻击以及伪造融合数据攻击,在网络安全与能耗间实现良好的平衡。

关键词: 传感器网络, 信任模型, 恶意节点, 双簇头, 数据安全

Abstract: To address the attacks on the communication data by malicious or compromised nodes in Wireless Sensor Network(WSN),this paper proposes a feedback trust model based on double cluster head to ensure the reliability and integrity of data in transmission,perception and fusion.The results of direct interactions between nodes are used to evaluate their direct trust,and the communication,data perception and fusion trust are considered at the same time.The communication trust of neighbor nodes is evaluated by using the Bayesian formula.The historical trust of nodes is used as the supplement of direct trust by using time sliding window,and the weights of direct and indirect trust are adjusted dynamically to make the comprehensive trust evaluation more objective and accurate.On this basis,the monitoring mechanism for interactions between double cluster head and the feedback mechanism for base station trust are introduced.The primary cluster head and the supervisory cluster head independently evaluate the data perception trust of the members according to the spatial correlation of the local data.The base station uses the temporal correlation of the data fusion results of the dual cluster head to evaluate the data fusion trust,and feeds back the final trust results to all nodes.Simulation results show that the model can effectively detect abnormal data and malicious nodes,successfully resist selective forwarding attacks,forgery local data attacks and forgery fusion data attacks,achieving a good balance between network security and energy consumption.

Key words: sensor network, trust model, malicious node, double cluster head, data security

中图分类号: