咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Secure Localization Technology... 收藏

Secure Localization Technology Based on Dynamic Trust Management in Wireless Sensor Networks

Secure Localization Technology Based on Dynamic Trust Management in Wireless Sensor Networks

作     者:LI Peng YU Xiaotian XU He WANG Ruchuan LI Peng;YU Xiaotian;XU He;WANG Ruchuan

作者机构:School of Computer Science and Technology Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks 

出 版 物:《Chinese Journal of Electronics》 (电子学报(英文))

年 卷 期:2021年第30卷第4期

页      面:759-768页

核心收录:

学科分类:080202[工学-机械电子工程] 0839[工学-网络空间安全] 08[工学] 0802[工学-机械工程] 

基  金:supported by the National Natural Science Foundation of China (No.61672296, No.61872196, No.61872194, No.61902196) Scientific and Technological Support Project of Jiangsu Province (No.BE2017166, No.BE2019740) Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008) Six Talent Peaks Project of Jiangsu Province (No.RJFW-111) 

主  题:Wireless sensor networks Secured localization Dynamic trust management Finite state machines 

摘      要:Wireless sensor networks have critical applications in various fields, and the algorithm of their secure localization has become a vital technology to support a network. In the light of the self-organization, random deployment and dynamic topology, the localization process is vulnerable to various kinds of malicious attacks. The model of dynamic trust management for a given node is proposed to deal with security concerns in wireless sensor networks. The trust computation is divided into three stages, which are the stage of trust initialization,trust establishment, and trust evolution. The initial value of a global trust relationship is established through a corresponding global trust relation graph in the initial stage of trust. The trust value of each node is calculated by the attribute value in the stage of trust establishment. In the evolution of trust, the iterative process of trust value is accelerated via the finite state machine. Compared with the existing wireless sensor networks, simulation results show that the proposed security localization technology method can resist many kinds of attacks with low communication and time consumption.

读者评论 与其他读者分享你的观点