Method for establishing trust model of wireless sensor network

A wireless sensor and trust model technology, applied in wireless communications, services based on specific environments, electrical components, etc., can solve the problems of low detection rate of untrustworthiness and inaccurate measurement of trust, and achieve the effect of reducing the impact

Inactive Publication Date: 2021-01-01
SHANGHAI SECOND POLYTECHNIC UNIVERSITY
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These models consider factors such as packet receiving rate, successful packet sending rate, packet forwarding rate, data consistency, and security level, but they do not consider the relationship between factors, so the measurement of trust is not accurate enough, so that the detection rate of dishonesty is not high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing trust model of wireless sensor network
  • Method for establishing trust model of wireless sensor network
  • Method for establishing trust model of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The method for establishing the wireless sensor network trust model of the present invention comprises the following steps:

[0054] 1. Construct interactive communication factors

[0055] The communication in the interaction factor is defined as: the continuous effective communication rate within Δt time, that is:

[0056]

[0057] Among them, s i,k (Δt) is the number of successful communication between nodes i and j at Δt, f i,j (Δt) is the number of communication failures between nodes i and j at time Δt. When the number of failures is greater than the number of successes, the two nodes i and j are considered untrusted. by dividing by Make the communication factor drop sharply. In particular, if f i,j (Δt) = 0, set DCT i,j (Δt)=100.

[0058] 2. Construct interactive data factors

[0059] The data in the interaction factor is defined as: the similarity rate of continuous data within Δt time, that is in

[0060] c i,j (Δt) is the number of data similar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for establishing a trust model of a wireless sensor network. The method is characterized by comprising the following steps of: (1) abstracting interaction factors; (2)abstracting private factors; and (3) constructing an interactive trust model based on the interactive factors and a private trust model based on the private factors. By applying the trust model, a fault node, an event node and a normal node in the network can be judged. Therefore, the decision is guided, the influence of a fault node on data acquisition is reduced, and a trusted routing referenceis provided for stable, effective and accurate data transmission.

Description

technical field [0001] The invention relates to a method, in particular to a method for establishing a wireless sensor network trust model. Background technique [0002] A wireless sensor network (WSN) typically consists of thousands of tiny embedded computers equipped with specific types of sensors to sense information from the surrounding environment. Using a secure multi-hop routing protocol, the collected information is relayed from one sensor to another until the data reaches the desired destination node. Wireless sensor network technology has been widely used in industry, environment, earthquake, construction, transportation, military, traffic control, agriculture and other fields. However, wireless sensor networks are vulnerable to various types of external and internal attacks, and cryptographic solutions can successfully defend against external attacks but may fail under malicious internal attacks. [0003] In recent years, research on trust in wireless sensor net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/38H04W12/00H04W24/04H04W40/10H04W40/14
CPCH04W4/38H04W12/009H04W24/04H04W40/10H04W40/14
Inventor 王娜
Owner SHANGHAI SECOND POLYTECHNIC UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products