An Algorithm of Trust-based Secure Data Aggregation for Wireless Sensor Networks

被引:2
|
作者
Ye Z.-W. [1 ,2 ]
Wen T. [1 ,3 ]
Liu Z.-Y. [1 ,3 ]
Fu C.-G. [1 ,3 ]
机构
[1] School of Computer Science & Engineering, Northeastern University, Shenyang
[2] Tonghua Normal University, Tonghua
[3] Dalian Neusoft University of Information, Dalian
关键词
Data aggregation; Malicious nod; Security; Trust model; Wireless sensor network;
D O I
10.12068/j.issn.1005-3026.2019.06.006
中图分类号
学科分类号
摘要
To resist the influence of the malicious attacks and the malfunctions of fault nodes in wireless sensor networks(WSNs)on data aggregation, this paper proposes an algorithm of trust-based secure data aggregation for WSNs. The algorithm is based on multi-layer non-uniform clustering network topology to achieve secure data aggregation, which can effectively balance the network energy consumption. The trust evaluation model is established based on the communication behavior and data correlation among the nodes. The dynamic trust integration mechanism and update mechanism are introduced to realize the trust evaluation intra-cluster and inter-cluster. Based on the trust value, a trusted aggregation node is chosen in the cluster to complete data fusion of trusted nodes. Simulation results show that the algorithm can achieve accurate and effective trust evaluation, identify internal malicious nodes, and obtain the data aggregation results with high accuracy. © 2019, Editorial Department of Journal of Northeastern University. All right reserved.
引用
收藏
页码:789 / 794
页数:5
相关论文
共 15 条
  • [1] Gungor V.C., Hancke G.P., Industrial wireless sensor networks: challenges, design principles, and technical approaches, IEEE Transactions on Industrial Electronics, 56, 10, pp. 4258-4265, (2009)
  • [2] Akkaya K., Demirbas M., Aygun R.S., The impact of data aggregation on the performance of wireless sensor networks, Wireless Communications & Mobile Computing, 8, 2, pp. 171-193, (2008)
  • [3] Rajagopalan R., Varshney P.K., Data-aggregation techniques in sensor networks: a survey, IEEE Communications Surveys & Tutorials, 8, 4, pp. 48-63, (2006)
  • [4] Ozdemir S., Xiao Y., Secure data aggregation in wireless sensor networks: a comprehensive overview, Computer Networks, 53, 12, pp. 2022-2037, (2009)
  • [5] Momani M., Challa S., Survey of trust models in different network domains, International Journal of Ad Hoc, Sensor and Ubiquitous Computing, 1, 3, pp. 1-19, (2010)
  • [6] Zhang S.-B., Fang J., Song J.-Q., Study on an algorithm of trusted data fusion oriented on WSNs, Journal of Chinese Computer Systems, 35, 10, pp. 2347-2352, (2014)
  • [7] Yang L.-B., Mu D.-J., Cai X.-Y., Study on intrusion detection for wireless sensor network, Application Research of Computers, 25, 11, pp. 3204-3208, (2008)
  • [8] Ozdemir S., Functional reputation based reliable data aggregation and transmission for wireless sensor networks, Computer Communications, 31, 17, pp. 3941-3953, (2008)
  • [9] Liu C.X., Liu Y., Zhang Z.J., Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks, International Journal of Distributed Sensor Networks, 9, 5, pp. 1-11, (2013)
  • [10] Liu Y., Liu C.X., Zeng Q.A., Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks, Telecommunication Systems, 62, 2, pp. 319-325, (2016)