天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

基于信任的物聯(lián)網(wǎng)感知節(jié)點(diǎn)安全成簇機(jī)制研究

發(fā)布時(shí)間:2018-06-17 04:36

  本文選題:物聯(lián)網(wǎng) + 安全成簇 ; 參考:《重慶郵電大學(xué)》2014年碩士論文


【摘要】:近年來,物聯(lián)網(wǎng)已經(jīng)在軍事偵察、智能電網(wǎng)等多個(gè)基礎(chǔ)領(lǐng)域得到廣泛應(yīng)用,而這些應(yīng)用中包含的海量數(shù)據(jù)與群體和個(gè)人的隱私及保密問題有關(guān)。但物聯(lián)網(wǎng)是一個(gè)開放的環(huán)境,定義安全邊界困難。此外,負(fù)責(zé)信息采集的感知節(jié)點(diǎn)能力脆弱,資源有限,并分布在無人監(jiān)管的環(huán)境中,容易遭受惡意攻擊。而傳統(tǒng)數(shù)據(jù)融合技術(shù)把過多關(guān)注數(shù)據(jù)融合的效率,忽略了節(jié)點(diǎn)行為的信任問題。其次,已有的加密認(rèn)證方法計(jì)算過程復(fù)雜,而且不能解決來自感知節(jié)點(diǎn)的內(nèi)部攻擊。因此,思考如何保障物聯(lián)網(wǎng)的感知信息安全,特別是圍繞感知節(jié)點(diǎn)安全高效成簇機(jī)制及算法的研究成為物聯(lián)網(wǎng)進(jìn)一步發(fā)展不可或缺的關(guān)鍵需求。 論文分析典型成簇算法的不足:簇頭節(jié)點(diǎn)的選擇沒有考慮節(jié)點(diǎn)的剩余能量,不能識(shí)別和抵御惡意攻擊。此外,所有感知節(jié)點(diǎn)周期性地執(zhí)行成簇的操作將會(huì)產(chǎn)生大量能耗。因此,論文給出一種基于信任的節(jié)點(diǎn)安全成簇(Trust-based Secure ClusteringProtocol,TBSCP)方案。TBSCP以給出的信任評(píng)估方法為基礎(chǔ),對(duì)冒充或偽裝成正常節(jié)點(diǎn)參與數(shù)據(jù)融合的惡意節(jié)點(diǎn)進(jìn)行識(shí)別與過濾,并在節(jié)點(diǎn)狀態(tài)發(fā)生變化的區(qū)域內(nèi)重新選擇簇頭。主要的工作有:(1)給出基于節(jié)點(diǎn)行為檢測(cè)的信任評(píng)估方法,該方法采用事件觸發(fā)與周期性檢測(cè)相結(jié)合的方式,可以實(shí)現(xiàn)節(jié)點(diǎn)行為的實(shí)時(shí)監(jiān)測(cè),將信任值取整并加入懲罰機(jī)制,減少信任記錄并縮短發(fā)現(xiàn)惡意節(jié)點(diǎn)的時(shí)間;(2)在信任評(píng)估方法的基礎(chǔ)上,給出一種新的推薦信任合并規(guī)則,該規(guī)則根據(jù)證據(jù)距離不斷修正推薦信任值,可在不增加計(jì)算復(fù)雜的前提下,提高推薦信任合并結(jié)果的準(zhǔn)確性,有效地抵御惡意節(jié)點(diǎn)的誹謗攻擊;(3)給出基于信任的節(jié)點(diǎn)安全成簇TBSCP方案,該方案對(duì)數(shù)據(jù)融合過程的非正常節(jié)點(diǎn)進(jìn)行檢測(cè),并在匯聚節(jié)點(diǎn)狀態(tài)發(fā)生變化的區(qū)域內(nèi)重選簇頭。仿真實(shí)驗(yàn)證明,,給出的TBSCP方案較高的安全性,加入的信任評(píng)估方法有較低的能耗性。
[Abstract]:In recent years, the Internet of things has been widely used in military reconnaissance, smart grid and other basic fields, and these applications contain huge amounts of data related to the privacy and privacy of groups and individuals. But the Internet of things is an open environment and it is difficult to define secure borders. In addition, the perceptual nodes in charge of information collection are vulnerable to malicious attacks due to their weak capability, limited resources and distribution in unsupervised environments. The traditional data fusion technology pays too much attention to the efficiency of data fusion and ignores the trust problem of node behavior. Secondly, the existing encryption authentication methods are complex and can not solve the internal attacks from perceptual nodes. Therefore, thinking about how to ensure the security of perceptual information in the Internet of things, especially the research of clustering mechanism and algorithm around the security and efficiency of perceptual nodes, has become an indispensable key demand for the further development of the Internet of things. This paper analyzes the shortcomings of typical clustering algorithms: the selection of cluster head nodes does not take into account the residual energy of the nodes and can not identify and resist malicious attacks. In addition, all perceptual nodes periodically perform clustering operations that result in a large amount of energy consumption. Therefore, this paper presents a Trust-based secure clustering TBSCP scheme based on trust. TBSCP identifies and filters malicious nodes posing as normal nodes to participate in data fusion based on the trust evaluation method given. The cluster head is re-selected in the region where the node state changes. The main work is as follows: (1) A trust evaluation method based on node behavior detection is presented. The method combines event trigger and periodic detection to realize real-time monitoring of node behavior, rounding the trust value and adding punishment mechanism. On the basis of trust evaluation method, a new recommended trust merge rule is proposed, which constantly modifies the recommended trust value according to the distance of evidence. We can improve the accuracy of the recommended trust merge results without increasing the computational complexity, and effectively resist the malicious node defamation attacks. (3) A trusted node security cluster TBSCP scheme is presented. The scheme detects the abnormal nodes in the data fusion process and resets the cluster heads in the regions where the state of the convergent nodes changes. Simulation results show that the proposed TBSCP scheme has high security and low energy consumption.
【學(xué)位授予單位】:重慶郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP391.44;TN915.08

【參考文獻(xiàn)】

相關(guān)期刊論文 前6條

1 林闖;田立勤;王元卓;;可信網(wǎng)絡(luò)中用戶行為可信的研究[J];計(jì)算機(jī)研究與發(fā)展;2008年12期

2 劉準(zhǔn)釓;程詠梅;潘泉;苗壯;;基于證據(jù)距離和矛盾因子的加權(quán)證據(jù)合成法[J];控制理論與應(yīng)用;2009年12期

3 溫蜜;陳克非;鄭燕飛;李暉;;傳感器網(wǎng)絡(luò)中一種可靠的對(duì)密鑰更新方案(英文)[J];軟件學(xué)報(bào);2007年05期

4 胡向東;;物聯(lián)網(wǎng)研究與發(fā)展綜述[J];數(shù)字通信;2010年02期

5 肖德琴;馮健昭;周權(quán);楊波;;基于高斯分布的傳感器網(wǎng)絡(luò)信譽(yù)模型[J];通信學(xué)報(bào);2008年03期

6 胡向東;魏琴芳;唐慧;;物聯(lián)網(wǎng)中數(shù)據(jù)融合的信譽(yù)度模型與仿真[J];儀器儀表學(xué)報(bào);2010年11期

相關(guān)博士學(xué)位論文 前1條

1 王非;自組織網(wǎng)絡(luò)信譽(yù)模型及其應(yīng)用研究[D];華中科技大學(xué);2008年



本文編號(hào):2029725

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2029725.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶6e80d***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com