Mobile trusted data collection method based on trust value utility in sensor network

A technology of data collection and trust value, applied in network topology, wireless communication, signal transmission system, etc., can solve problems such as uselessness, limited sensor network, trust value quantification, etc. The effect of reliable data and good reliability

Active Publication Date: 2019-07-23
HUAQIAO UNIVERSITY
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the specific implementation, the obtained trust value is not specifically quantified, nor is it used in the key algorithm
[0005] The reason why the current solutions are difficult to fundamentally solve the above problems is mainly because the sensor network is limited by the following two factors: energy consumption issues and capacity issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile trusted data collection method based on trust value utility in sensor network
  • Mobile trusted data collection method based on trust value utility in sensor network
  • Mobile trusted data collection method based on trust value utility in sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described below through specific embodiments.

[0043] A mobile trusted data collection method based on trust value utility in sensor networks. In the application of wireless sensor data collection, a node trust evaluation algorithm (such as direct trust and indirect trust) is designed according to the relationship between nodes. There is an algorithm to obtain the quantitative trust value of the node. According to the obtained trust value, a credible cluster head node is generated in the subsequent cluster head node election. Finally, according to the Euclidean distance between each cluster head node and the trust value of the relevant next-hop node, the next node with the largest utility value is calculated, so as to generate a trusted path with the largest trust value and utility. The mobile edge nodes visit the trusted cluster head nodes sequentially within a limited moving distance, collect credible sensing data, send it to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile trusted data collection method based on trust value utility in a sensor network, which comprises the following steps of: designing a node trust evaluation algorithm (such as a direct trust value and an indirect trust value) according to the relationship between nodes in the application of wireless sensor data collection, and obtaining a quantized trust value of anode by an existing algorithm; and according to the obtained trust value, generating a trusted cluster head node in the subsequent cluster head node election; finally, calculating the next cluster head node with the maximum trust utility value according to the Euclidean distance between the cluster head nodes and the trust value of the related next hop cluster head node, thereby generating a trusted path with the maximum trust utility value.

Description

technical field [0001] The invention relates to the field of information security of a large-scale wireless sensor network, in particular to a mobile credible data collection method based on trust value utility in a sensor network. Background technique [0002] In recent years, cloud computing technology has developed rapidly, which can provide users with a variety of cloud computing services, expand the application space of sensor networks, and provide new ideas for solving many limitations of sensor networks. For example, in environmental monitoring applications, a physical sensor node can simultaneously monitor multiple information such as temperature, humidity, and carbon dioxide concentration. The services provided by the cloud platform can be virtualized into multiple sensor nodes, which can be conveniently used by multiple users, which not only reduces the cost, but also improves the utilization rate. Through the cloud platform, users can obtain the data they need wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/02H04W84/18G08C17/02
CPCH04W40/02H04W84/18G08C17/02
Inventor 王田邱磊蒋文贤蔡绍滨高振国
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products