簡易檢索 / 詳目顯示

研究生: 達拉吉
Dheeraj Udayaravi Moorti
論文名稱: An Efficient Distributed Trust Model for Wireless sensor Networks
無線感知網路的分散式信任模式
指導教授: 張適宇
Chang,Shih Yu
口試委員: 汪岱錡
Wang,Tai-Chi
黃啟祐
Huang,Chi-Yo
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 42
中文關鍵詞: 無線傳感器網路
外文關鍵詞: wireless, sensor, network
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在信任展示下,強烈的說明信任模式將被推薦為近年 來WSNs的最有力的安全系統。對於影響深遠的惡意攻 擊評估來說,大多數只考慮通信行為的計算傳感器集 線器的研究工作是不夠的。在本篇論文中,將說明無 線傳感器網絡的高效的分佈式信任模型(EDTM)。首 先,通過傳感器集成了包的數量指示,直接計算信任 和意見信賴。在這一點上,對應的信賴評估為充滿活 力的信賴和信任的信息的直接信任。此外,信任可靠 性和自然的特點,將能提高建議信任的正確性。
    EDTM 可以更加正確的評估傳感器的可靠性,並且使得 安全模式更加成功


    Trust models have been as of late recommended as a powerful security system for Wireless Sensor Networks (WSNs). Significant exploration has been done on demonstrating trust. In any case, most ebb and flow research work just considers correspondence conduct to compute sensor hubs' trust esteem, which is insufficient for trust assessment because of the far-reaching malignant assaults. In my thesis, I propose an Efficient Distributed Trust Model (EDTM) for WSNs. To begin with, as indicated by the quantity of bundles got by sensor hubs, direct trust and suggestion trust are specifically computed. At that point, correspondence trust, vitality trust and information trust are considered amid the estimation of direct trust. Besides, trust dependability and nature are characterized to enhance the exactness of suggestion trust. The proposed EDTM can assess reliability of sensor hubs all the more correctly and keep the security breaks all the more successfully.

    Table of contents List of figures 1.Introduction ------------------------------- 1 1.1 Our Objective --------------------------- 1 1.2 Motivation ------------------------------ 2 1.3 Our Contribution ------------------------ 4 1.4 Organization ---------------------------- 7 2.Related Work ------------------------------8 2.1 Hub Mobility ---------------------------- 8 2.2 Malicious Hubs -------------------------- 9 2.3 Efficient Distributed Trust Model -------- 9 3.System Architecture Design --------------- 11 3.1 Trust Calculation in EDTM -------------- 12 3.1.1 Calculation of Direct Trust ------------- 12 3.1.2 Calculation of Recommendation Trust --15 3.1.3 Calculation of Indirect Trust ------------ 17 3.1.4 Update of Trust Value ------------------ 18 3.2 System Architecture ---------------------19 4.Implementation ----------------------------20 4.1 Design Environment ---------------------- 20 4.2 Trust Based Inputs ---------------------- 21 5. Analysis -----------------------------------25 5.1 Simulation -------------------------------25 5.2 Performance Verification ---------------- 32 6 Conclusion ------------------------------- 41 6.1 Conclusion ------------------------------ 41 6.2 Future Work ----------------------------- 41

    [1] G. Han, J. Jiang, L. Shu, J. Niu and H.C. Chao, “Managements and applications of trust in Wireless Sensor Networks: A Survey”. Journal of Computer and System Sciences, pp. 1-16, 2013.
    [2] T. Zahariadis, P. Trakadas, H. Leligou, P. Karkazis, and S. V oliotis, “Implementing a Trust-Aware Routing Protocol in Wireless Sensor Nodes,” Developments in E-systems Engineering, 2010, pp. 47-52.
    [3] V., G. and Chandrasekaran, K. (2014) A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network. Wireless Sensor Network.
    [4] Qinghua Wang ,Ilangko Balasingham – “Wireless Sensor Networks - An Introduction” Dept. of Electronics and Telecommunications Norwegian University of Science and Technology, The Interventional Centre, Oslo University Institute of Clinical medicine, University of Oslo Norway
    [5] Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” in Proceeding of the 7th Nordic Workshop on Secure IT Systems, 2003.
    [6] H. Safa, H. Artail, and D. Tabet, “A cluster- based trust-aware routing protocol for mobile ad hoc networks,”Wirel. Netw., vol. 16, no. 4, pp. 969–984, 2010.
    [7] G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing
    framework for wireless sensor networks,” in Proceeding of the 7th European Conference on Wireless Sensor Networks (EWSN’12), 2012.
    [8] W. Gong, Z. You, D. Chen, X. Zhao, M. Gu, and K. Lam, “Trust based routing for misbehavior detection in ad hoc networks,” Journal of Networks, vol. 5, no. 5, May 2010.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE