Netinfo Security ›› 2020, Vol. 20 ›› Issue (4): 12-20.doi: 10.3969/j.issn.1671-1122.2020.04.002
Previous Articles Next Articles
Received:
2019-12-09
Online:
2020-04-10
Published:
2020-05-11
Contact:
Guangjie HAN
E-mail:hanguangjie@gmail.com
CLC Number:
JIANG Jinfang, HAN Guangjie. Survey of Trust Management Mechanism in Wireless Sensor Network[J]. Netinfo Security, 2020, 20(4): 12-20.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2020.04.002
[1] | BLAZE M, FEIGENBAUM J, LACY J.Decentralized Trust Management[C]//IEEE. The 17th Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA. NJ: IEEE, 1996: 164-173. |
[2] | GANERIWAL S, BALZAN L J, SRIVASTAVA M B. Reputation-based Framework for High Integrity Sensor Networks[EB/OL]. , 2019-11-11. |
[3] | HUANG Qiming, NAN Haiyan.Reputation Computing for Wireless Sensor Networks Based on Dirichlet Distribution[J]. Chinese Journal of Sensors and Actuators, 2009, 22(4): 526-530. |
黄旗明,南海燕.基于Dirichlet 分布的无线传感器网络的信誉计算模型研究[J].传感技术学报,2009,22(4):526-530. | |
[4] | FANG Weidong, ZHANG Xiaolong, SHI Zhidong, et al.Binomial-based Trust Management System in Wireless Sensor Networks[J]. Chinese Journal of Sensors and Actuators, 2015(5): 703-708. |
房卫东,张小珑,石志东,等.基于二项分布的无线传感器网络信任管理系统[J]. 传感技术学报, 2015(5):703-708. | |
[5] | JØSANG A, BHUIYAN T. Optimal Trust Network Analysis with Subjective Logic[C]//IEEE. 2008 Second International Conference on Emerging Security Information, Systems and Technologies, August 25-31, 2008, Cap Esterel, France. NJ: IEEE, 2008: 179-184. |
[6] | REN Yi, ZADOROZHNY V I, OLESHCHUK V A, et al.A Novel Approach to Trust Management in Unattended Wireless Sensor Networks[J]. IEEE Transactions on Mobile Computing, 2014, 13(7): 1409-1423. |
[7] | JIANG Jinfang, HAN Guangjie, WANG Feng, et al.An Efficient Distributed Trust Model for Wireless Sensor Networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(5): 1228-1237. |
[8] | FARHAD F, ZADOROZHNY V I, LI F Y.Subjective Logic-based In-network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks[J]. IEEE Sensors Journal, 2018, 18(5): 6446-6460. |
[9] | ZADEH L A.Fuzzy Sets[J]. Information and Control, 1965, 8(3): 338-353. |
[10] | CHEN Chao, WANG Ruchuan, ZHANG Lin.The Research of Subjective Trust Model Based on Fuzzy Theory in Open Networks[J]. Acta Electronica Sinica, 2010, 38(11): 2505-2509. |
陈超,王汝传,张琳,一种基于开放式网络环境的模糊主观信任模型研究[J].电子学报,2010,38(11):2505-2509. | |
[11] | DEMPSTER A P.Upper and Lower Probabilities Induced by a Multi- valued Mapping[J]. Annals of Mathematical Statistics, 1967, 38(2): 325-339. |
[12] | SHAFER G.A Mathematical Theory of Evidence[M]. New Jersey: Princeton University Press, 1976. |
[13] | FENG Renjian, XU Xiaofeng, ZHOU Xiang, et al.Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory[J]. Sensors, 2011, 11(2): 1345-1360. |
[14] | ZHANG Lin, LIU Jingwen, WANG Ruchuan, et al.Trust Evaluation Model Based on Improved D-S Evidence Theory[J]. Journal on Communications, 2013, 34(7): 167-173. |
张琳,刘婧文,王汝传,等.基于改进D-S 证据理论的信任评估模型[J].通信学报,2013,34(7):167-173. | |
[15] | SONG Yafei, WANG Xiaodan, LEI Lei, et al.Evidence Combination Based on the Degree of Credibility and Falsity[J]. Journal on Communications, 2015, 36(5): 98-105. |
宋亚飞,王晓丹,雷蕾,等.基于信任度和虚假度的证据组合方法[J].通信学报,2015,36(5):98-105. | |
[16] | ZHOU Zhiping, ZHAO Xiaoxiao, SHAO Nannan.WSN Trust Evaluation Model Based on Fuzzy Set and D-S Evidence Theory[J]. Journal of System Simulation, 2018, 30(4): 1229-1236. |
周治平,赵晓晓,邵楠楠.结合模糊集合与D-S证据理论的WSN信任评估模型[J].系统仿真学报, 2018, 30(4):1229-1236. | |
[17] | SUN Y L, YU Wei, HAN Zhu, et al.Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 305-317. |
[18] | DAI Hongjun, JIA Zhiping, DONG Xiaona.An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks[C]//IEEE. 2008 International Conference on Embedded Software and Systems(ICESS2008), July 29-31, 2008, Sichuan, China. NJ: IEEE, 2008: 27-34. |
[19] | LI Xiayong, GUI Xiaolin, MAO Qian, et al.Adaptive Dynamic Trust Measurement and Prediction Model Based on Behavior Monitoring[J]. Chinese Journal of Computers, 2009(4): 76-86. |
李小勇,桂小林,毛倩,等.基于行为监控的自适应动态信任度测模型[J]. 计算机学报,2009(4):76-86. | |
[20] | ZHANG Lin, XING Huan, WANG Ruchuan, et al.Dynamic Trust Model Based on Recommendation Chain Classification in Complex Network Environment[J]. Journal on Communications, 2015, 36(9): 55-64. |
张琳,邢欢,王汝传,等.复杂网络环境下基于推荐链分类的动态信任模型[J].通信学报,2015, 36(9):55-64. | |
[21] | LI Deyi, MENG Haijun, SHI Xuemei.Subordinate Cloud and Subordinate Cloud Generator[J]. Journal of Computer Research and Development, 1995, 32(6): 15-20. |
李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. | |
[22] | MA Bin.Cross-layer Trust Model and Algorithm of Node Selection in Wireless Sensor Networks[C]//IEEE. 2009 International Conference on Communication Software and Networks, February 27-28, 2009, Macao, China. NJ: IEEE, 2009: 812-815. |
[23] | ZHANG Shibin, XU Chunxiang.Study on the Trust Evaluation Approach Based on Cloud Model[J]. Chinese Journal of Computers, 2013, 36(2): 422-431. |
张仕斌,许春香.基于云模型的信任评估方法研究[J].计算机学报,2013,36(2):422-431. | |
[24] | XU Xiaobin, ZHANG Guangwei, WANG Shangguang, et al.Uncertainty Trust Representation of WSN Based on Lightweight Cloud Model[J]. Journal on Communications,2014, 35(2): 63-69. |
徐晓斌,张光卫,王尚广,等.基于轻量云模型的WSN不确定性信任表示方法[J]. 通信学报,2014,35(2):63-69. | |
[25] | XIAO Yunpeng, YAO Haohao, LIU Yanbing.A WSNs Node Reputation Security Scheme Based on Cloud Model[J]. Acta Electronica Sinica, 2016, 44(1): 168-175. |
肖云鹏,姚豪豪,刘宴兵.一种基于云模型的WSNs节点信誉安全方案[J].电子学报,2016,44(1):168-175. | |
[26] | SAATY T L.The Analytic Hierarchy Process[M]. New York: McGraw-Hill, 1980. |
[27] | QIN Danyang, JIA Shuang, YANG Songxiang, et al.Research on Trust Sensing-based Secure Routing Mechanism for Wireless Sensor Network[J]. Journal on Communications,2017(10): 60-70. |
秦丹阳,贾爽,杨松祥,等.基于信任感知的无线传感器网络安全路由机制研究[J]. 通信学报,2017(10):60-70. | |
[28] | WANG Tian, ZHANG Guangxue, CAI Shaobin, et al.Research Progress of Trust Evaluation Mechanism in Sensor Cloud[J]. Journal on Communications,2018, 39(6): 41-55. |
王田,张广学,蔡绍滨,等.传感云中的信任评价机制研究进展[J].通信学报,2018,39(6):41-55. | |
[29] | WANG Tian, ZHANG Guangxue, MD Zakirul Alam Bhuiyan, et al. A Novel Trust Mechanism Based on Fog Computing in Sensor-Cloud System[EB/OL]. , 2019-11-11. |
[30] | CORTES C, VAPNIK V.Support-vector Networks[J]. Machine Learning, 1995, 20(3): 273-297. |
[31] | HAN Guangjie, HE Yu, JIANG Jinfang, et al, A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks[J]. IEEE Transactions on Vehicular Technology, 2019, 68(11): 11239-11247. |
[1] | Baoyuan KANG, Jiaqiang WANG, Dongyang SHAO, Chunqing LI. A Secure Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks [J]. Netinfo Security, 2018, 18(1): 23-30. |
[2] | Yanping YANG. The Algorithm of Social Network Users Reliability Based on Bidirectional Weighted Graph [J]. Netinfo Security, 2017, 17(7): 40-44. |
[3] | Hongyan ZHANG, Li XU, Limei LIN. Research on Pairwise Key Establishment Scheme Based on Hypercube in Wireless Sensor Network [J]. Netinfo Security, 2017, 17(12): 1-5. |
[4] | Tianchen SHEN, Xin LI, Haichun SUN. The Measuring of Reliability of Cloud Services Based on MongoDB [J]. Netinfo Security, 2017, 17(11): 80-83. |
[5] | Qiang HUANG, Zhiyin KONG, Le CHANG, Dehua ZHANG. Trust Baseline Concept and Management Architecture [J]. Netinfo Security, 2016, 16(9): 145-148. |
[6] | Dunhao ZHONG, Dongmei ZHANG, Yu ZHANG. A Method of Intrusion Detection in Wireless Sensor Network Based on Similarity Algorithm [J]. Netinfo Security, 2016, 16(2): 22-27. |
[7] | Ziyuan LIAO, Mingzhi CHEN, Hui DENG. Research on the Model of Cloud Computing Trust Management Based on Evaluation Credibility [J]. Netinfo Security, 2016, 16(2): 33-39. |
[8] | Xudong SHAO, Haiping JIANG, Han ZHANG. Research of Data One-way Transfer Reliability Based on Fiber Optic Communication Technology [J]. Netinfo Security, 2016, 16(10): 76-79. |
[9] | Wei LIU, Qing YE, Cheng WANG. Improved LEACH Algorithm Based on Dynamic Key Management [J]. Netinfo Security, 2015, 15(8): 41-46. |
[10] | Ji-zhou FENG, Ming-hui TIAN. Research on the Software Security Testing for Potential Defects [J]. Netinfo Security, 2015, 15(6): 85-90. |
[11] | Bin-ting SU, He FANG, Li XU. Q-Learning-based Routing Protocol for the Balance of WSN Lifetime [J]. Netinfo Security, 2015, 15(4): 74-77. |
[12] | Wan-wan GONG, Shi-xing LIU, Ting-ting FENG. The Platform Design of Smart-house Based on Wireless Sensor Networks [J]. Netinfo Security, 2015, 15(3): 79-83. |
[13] | Gege QIU, Xueming WANG, Yansheng ZHANG. Research on WSN Identity Authentication Protocol Based on HECC [J]. Netinfo Security, 2015, 26(12): 54-58. |
[14] | . Research on Routing Algorithm of Wireless Sensor Network based on Link Quality [J]. , 2014, 14(5): 59-. |
[15] | . Reference-based Recoverable Concealed Data Aggregation in Heterogeneous Wireless Sensor Networks [J]. , 2014, 14(3): 74-. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||