Cluster routing method based on multi-factor trust mechanism

A multi-element and routing technology, applied in wireless communication, advanced technology, electrical components, etc., can solve the problems of evaluating node credibility, lack of instructions, and poor operability

Inactive Publication Date: 2013-08-07
SOUTHEAST UNIV
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, measure the subjective trust value of nodes from two aspects of communication and social network, and establish a probability model to obtain the objective trust value of nodes, and use the objective trust value to verify the risk of subjective trust value. This method chooses intimacy, loyalty, and selflessness. Although sex and energy are used as trust factors, although the trustworthiness of nodes is evaluated comprehensively, it does not explain how to evaluate the trustworthiness of nodes based on these factors, and the operability is not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster routing method based on multi-factor trust mechanism
  • Cluster routing method based on multi-factor trust mechanism
  • Cluster routing method based on multi-factor trust mechanism

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0054] 1. Selection of trust factors

[0055] The trust mechanism selects six trust elements from the perspective of communication, data and energy, namely:

[0056] (1) Data integrity, which can be expressed as:

[0057] T 1 i , j ( t ) = [ 100 × IP i , j ( t - t 0 ) TFP i , j ( t - t 0 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cluster routing method based on a multi-factor trust mechanism developed for a wireless sensor network. The multi-factor trust mechanism is adopted for guaranteeing safety and reliability of nodes. Trust factors are selected by angles of communication, data and energy by the trust mechanism. A 'low-return and high-punishment' mechanism is adopted for preventing malicious nodes from increasing trust values rapidly through short-period lawful actions or surviving in the network in long terms by utilizing low trust values. Meanwhile, when a network topology is established, comprehensive trust values of the nodes are combined with cluster head election values and route communication cost to guarantee trusted cluster head election and trusted route selection. In the process of data transmission, the malicious nodes, selfish nodes and low-competitive nodes are removed according to the comprehensive trust values of the nodes, and thus, a safe and trusted network environment is established.

Description

technical field [0001] The invention relates to the technical field of wireless sensor network security, in particular to a trust mechanism-based clustering routing method. Background technique [0002] Since wireless sensor networks (WSNs) are generally deployed in no-man's land or even enemy-occupied areas, they are vulnerable to physical capture and multiple routing attacks, and traditional security mechanisms based on cryptographic systems can only be used to resist external attacks and cannot effectively solve node Insider attacks triggered by capture. Therefore, as an important supplement to the traditional key security mechanism, it is necessary to introduce the trust management mechanism into the WSNs security routing algorithm. The existing method proposes to use the Watchdog mechanism to monitor node behavior and divide them into cooperative / non-cooperative types, and then express, update and integrate reputations, finally generate node trust values, and make deci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/10H04W40/12H04W84/18
CPCY02D30/70
Inventor 黄杰王恩飞陈磊张莎谢启辉梁莉
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products