Supercharge Your Innovation With Domain-Expert AI Agents!

Trusted data collection method based on node trust value virtual force

A data collection and trust value technology, applied in wireless communication, security devices, network traffic/resource management, etc., can solve the problems of fast node energy consumption, limited communication ability and energy, and high delay, so as to achieve reliable guarantee and reduce node energy The effect of consumption

Active Publication Date: 2020-02-25
HUAQIAO UNIVERSITY
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, it is also found that in the existing data acquisition research of the Internet of Things system, the efficient mobile data collectors used are all ordinary nodes at the bottom layer, and their computing power, storage capacity, communication ability and energy are very limited.
In addition, traditional mobile data collectors will visit most of the underlying nodes during the data collection process. Not only the delay is high, the energy consumption of the nodes is fast, but also many of the collected data are invalid data from malicious nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted data collection method based on node trust value virtual force
  • Trusted data collection method based on node trust value virtual force
  • Trusted data collection method based on node trust value virtual force

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The technical solutions in the embodiments of the present invention will be described and discussed in detail below in conjunction with the drawings of the present invention. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0062] In the application of the data collection of the Internet of Things, the present invention first designs a node trust evaluation algorithm (such as direct trust and indirect trust) according to the relationship between nodes, and calculates the quantitative trust value of the node by the existing algorithm. The trust value of the node is mapped to the physical force on the node, and the trusted node is given an attractive force, and the untrusted node is repelled. The initial path of movement is simulated as a soft rope with magnetism, and the initial path moves under the joint force of the nodes, finally generating a credible data collect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a credible data collection method based on node trust value virtual force, and the method comprises the steps: designing a node trust evaluation algorithm (including direct trust and indirect trust) according to the relation between nodes in the application of data collection of the Internet of Things, and calculating a quantitative trust value of each node; mapping the trust value of the node into physical force borne by the node, and giving attraction force to the trusted node and repulsive force to the untrusted node; simulating a moving initial path into a soft rope with magnetism, enabling the initial path to move under the action of node resultant force, and finally generating a credible data collection path with higher credibility; the credible cluster headnodes are accessed in sequence within a limited moving distance through the moving edge nodes, credible sensing data are collected and sent to surrounding base stations or directly applied to upper-layer users, and the purposes of system application and decision credibility are achieved.

Description

technical field [0001] The invention belongs to the field of information security of a large-scale wireless sensor network, and in particular relates to a trusted data collection method based on node trust value virtual force. Background technique [0002] The rapid development of the Internet of Things (IoT) and mobile applications has put forward more stringent requirements on cloud infrastructure and underlying wireless sensor networks, such as system security, ultra-low latency, network energy consumption and reliability, etc. These stringent requirements drive the need for highly localized services at the edge of the network close to the user. Therefore, Mobile Edge Computing (MEC) emerged as the times require. It is a distributed open platform that integrates network, computing, storage, and application core capabilities on the edge of the network close to the source of objects or data, and can provide edge intelligent services nearby. [0003] The data collected by t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04W28/06H04W40/10H04W84/18H04W12/00
CPCH04W28/065H04W40/10H04W84/18H04W12/122
Inventor 王田邱磊梁玉珠罗皓沈雪微蒋文贤
Owner HUAQIAO UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More