Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensor network trust evaluation method based on node behaviors and D-S evidence theory

A sensor network and evidence theory technology, applied in the field of sensor network trust assessment based on node behavior and D-S evidence theory, can solve the problems of difficult identification of malicious nodes, "difficulty in trust value, easy to lose", etc.

Inactive Publication Date: 2010-09-15
BEIHANG UNIV
View PDF6 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

1. Purpose: The purpose of the present invention is to provide a sensor network trust evaluation method based on node behavior and D-S evidence theory, which embodies the characteristics of "difficult to obtain and easy to lose" trust value, and solves the problem that malicious nodes in the network are difficult to identify , put an end to the information leakage problem caused by internal nodes being captured, and ensure the security of network data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensor network trust evaluation method based on node behaviors and D-S evidence theory
  • Sensor network trust evaluation method based on node behaviors and D-S evidence theory
  • Sensor network trust evaluation method based on node behaviors and D-S evidence theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensor network trust evaluation method based on node behaviors and a D-S evidence theory, comprising the following five steps: 1) designing various trust factor strategies for nodes in a wireless sensor network; 2) setting trust factor weights according to network application scenes and simultaneously calculating the node behavior coefficient mu to obtain the direct trust value and multiple indirect trust value of an evaluated object; 3) calculating a fuzzy subset membership function for each trust value by utilizing the concepts of membership and linguistic variables of a fuzzy set theory, performing fuzzy classification on the various the trust values to form the basic confidence function of the D-S evidence theory; 4) calculating the evidence difference of thedirect trust value and the indirect trust values of the evaluated node and altering the weights of the indirect trust values; and 5) adopting the Dempster synthesis rule to obtain the comprehensive trust value of the evaluated node and a final basic confidence designated value according to the altered trust weights. The invention solves the problem of difficult identification of malicious nodes in a network and ensures the safety of network data transmission.

Description

(1) Technical field The invention relates to a mutual trust evaluation method between adjacent nodes based on node behavior strategy and D-S evidence theory, in particular to a sensor network trust evaluation method based on node behavior and D-S evidence theory. It belongs to the technical field of security trust evaluation in wireless sensor networks. (2) Background technology Wireless sensor networks (WSNs for short) integrate sensor technology, micro-electromechanical system (MEMS) technology, embedded computing technology, wireless communication technology and distributed information processing technology. Processing, communication and management functions can be applied to industrial control and monitoring, home automation and consumer electronics, security and military, material tracking and supply chain management, smart agriculture, environmental perception and health monitoring, etc. With the increasing complexity of WSNs applications, the security requirements a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W84/18H04W12/122
Inventor 冯仁剑万江文许小丰吴银锋于宁
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products