基于云信任模型和蚁群算法的WSN簇可信路由算法
作者:
基金项目:

国家自然科学基金(41176082);教育部新世纪优秀人才支持计划(NCET-13-0753);教育部博士点基金(20132304110031);黑龙江省自然科学基金(42400621-1-14076);哈尔滨市自然科学基金(2014RFQXJ012)


Cluster Reliability Routing Algorithm Based on Cloud Trust Model and Ant Colony Algorithm for WSN
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [16]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    在无线传感器网络中,信息的传输需要安全的保护.在分簇管理的基础上,GTMS(group-based trust management scheme)算法利用节点的可信度来实现路由的安全.但是,它的可信度表示方法过于简单,无法反映信誉复杂性.因此,在基于区间的云相似度比较算法的基础上,以云理论为基础构建节点可信度,提出了基于云信任模型和蚁群算法的无线传感器网络簇可信路由算法.研究结果表明,在准确判定簇内节点可信度的基础上,CRPCTMAS (cluster reliability protocol based on cloud trust model and the ant scheme)算法建立了安全、有效的路由,保证了路由的高有效发包率,延长了网络的生命周期

    Abstract:

    In WSN (wireless sensor network), the security of message transmission is needed. GTMS (group-based trust management scheme) guarantees the security of routing by node trust. However, its description of trust is too simple to represent the complexity of the entity. Hence, based on the comparison method of cloud similarity, this paper establishes a node trust, and proposes a new routing protocol CRPCTMAS (cluster reliability protocol based on cloud trust model and the ant scheme). The performance analysis show that, based the correct judgment of node trust, CRPCTMAS can find a security route not only to guarantee the high ratio of data packet emission but also to prolong the lifetime of the network.

    参考文献
    [1] Sun LM, Li JZ. Wireless Sensor Network. Beijing: Tsinghua University Press, 2005. 135-155 (in Chinese).
    [2] Li T, Feng Y. Survey on secure routing research in wireless sensor networks. Application Research of Computers, 2012,29(12): 4412-4419 (in Chinese with English abstract).
    [3] Deng J, Han R, Mishra S. INSENS: Intrusion-Tolerant routing in wireless sensor networks. Computer Communications, 2006, 29(2):216-230.
    [4] Perrig A, Szewczyk R, Tygar J, Wen V, Culler DE. SPIN: Security protocols for sensor networks. Wireless Networks Journal, 2002,8(5):521-534.
    [5] Traynor P, Choi H, Cao G, Zhu S, Porta T. Establishing pair-wise keys in distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communication Security. 2003. 22-46.
    [6] Tanaehaiwiwat S, Dave P, Bhindwale R, Helmy A. Location-Centric isolation of misbehavior and trust routing in energy- constrained sensor networks. In: Proc. of the IEEE Workshop on Energy Efficient Wireless Communications and Networks in Conjunction with IEEE IPCCC. 2004. 57-75.
    [7] Zhou Q, Zhou XD. Trusted routing protocol based on cluster head for wireless sensor network. Transducer and Microsystem Technologies, 2008,27(10):42-47 (in Chinese with English abstract).
    [8] Shaikh R, Jameel H, d'Auriol BJ, Lee H, Lee S, Song Y. Group-Based trust management scheme for clustered wireless sensor networks. IEEE Trans. on Parallel and Distributed Systems, 2009,20(11):1698-1712.
    [9] Zeng MM, Jiang H, Wang X, Liu WQ. Reputation evaluating model and security routing protocol of wireless sensor networks based on grey Markov model. Application Research of Computers, 2013,30(12):3758-3766 (in Chinese with English abstract).
    [10] Hou YY, Liang JZ. Cluster-Based wireless sensor networks secure routing protocols. Electronic Component and Device Applications, 2012,14(10):30-32 (in Chinese with English abstract).
    [11] Cai SB, Fang W, Zhao J. Research of interval-based cloud similarity comparison algorithm. Journal of Chinese Computer Systems, 2011,32(12):2457-2460 (in Chinese with English abstract).
    [12] Pathan A, Lee H, Hong C. Security in wireless sensor networks: Issues and challenges. In: Advanced Communication Technology, Proc. of the 8th ICACT 2006. 2006. 149-158.
    [13] Li DY, Liu CY, Gan WY. A new cognitive model: Cloud model. Int'l Journal of Intelligent Systems, 2009,3(24):357-375.
    [14] Heinzelman W, Chandrakasan A, Balakrishnan H. An application specific protocol architecture for wireless microsensor networks. IEEE Trans. on Wireless Communications, 2002,1(4):660-670.
    [15] Hang HC, Guo AH, Shu WJ. Performance analysis of WSN routing scheme based on LEACH and ant algorithm. Chinese Journal of Sensors and Actuators, 2008,21(10):1375-1380 (in Chinese with English abstract).
    [16] Wang C, Jia XY, Lin Q. Trust based secure routing algorithm for wireless sensor network. Journal of Communications, 2008, 29(11):106-115 (in Chinese with English abstract).
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

蔡绍滨,潘虹杞,姚念民,方伟.基于云信任模型和蚁群算法的WSN簇可信路由算法.软件学报,2014,25(s1):122-130

复制
分享
文章指标
  • 点击次数:3304
  • 下载次数: 4743
  • HTML阅读次数: 1233
  • 引用次数: 0
历史
  • 收稿日期:2014-05-10
  • 最后修改日期:2014-08-26
  • 在线发布日期: 2014-11-25
文章二维码
您是第19792042位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号