Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for establishing trust model in underwater sensor network

An underwater sensor and trust model technology, applied in network topology, wireless communication, electrical components, etc., can solve the problems of large storage space and high energy consumption of trust models

Active Publication Date: 2016-08-17
HOHAI UNIV CHANGZHOU
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each node needs to keep monitoring all tasks of neighbor nodes at all times, this trust model consumes a lot of energy, and needs to record the trust values ​​of different tasks, which takes up a lot of storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for establishing trust model in underwater sensor network
  • A method for establishing trust model in underwater sensor network
  • A method for establishing trust model in underwater sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0045] Such as figure 1 As shown, the method for establishing a trust model in an underwater sensor network, the steps include:

[0046] Step 1: Calculate the trust value of the sensor node. If a certain sensor node a needs to know the trust value of another sensor node b, define node a as the requesting node and node b as the target node. The requesting node a first queries its neighbors Whether there is the ID information of the target node b in the list, and determine the neighbor relationship,

[0047] Such as figure 2 As shown in (a), 1 indicates direct trust, 2 indicates recommendation request, and 3 indicates recommendation trust. If the requesting node a and the target node b are neighbor nodes, the requesting node a counts the number of historical communications between the two nodes n,

[0048] If the number of communications n b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for establishing a trust model in an underwater sensor network. If the number of historical communication information exchanges between the two is not enough, it is necessary to request recommendation trust from the common neighbors of the two, and further calculate the trust value of the target node; if the requesting node and the target node are not neighbor nodes, the multi-hop neighbor node is selected by selecting a multi-hop neighbor node. Carry out trust calculation; on the basis of the node trust calculation, the trust evaluation of the node's perception data can be realized, and the trust value of the sensor node can be updated. The invention can update the trust value of sensor nodes in real time, and can avoid problems such as trust transfer and trust merging when there are multiple recommended paths; the invention combines the perception data trust calculation, so that the accuracy of the node trust calculation is higher, and has a wide range of application value.

Description

technical field [0001] The invention relates to a method for establishing a trust model in an underwater sensor network, and belongs to the technical field of trust management of the underwater sensor network. Background technique [0002] In recent years, underwater sensor networks have been widely used in coastal defense, underwater exploration, underwater detection and surveillance and other fields. With the increasing complexity of underwater sensor network applications, its security requirements are also diverse. Traditional security mechanisms based on cryptographic systems are mainly used to resist external attacks, and cannot effectively solve internal attacks due to node capture. Moreover, due to the limited capabilities of sensor nodes, security measures based on symmetric cryptographic algorithms are often used in the network. When a node is captured, it is easy to leak secret information. If the captured node cannot be identified in time, the entire network will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W84/18H04W12/37
Inventor 江金芳韩光洁张晨语江旭朱川钱爱华沈家伟
Owner HOHAI UNIV CHANGZHOU