留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

船联网数据融合的信任模型

樊娜 赵祥模 王青龙

樊娜, 赵祥模, 王青龙. 船联网数据融合的信任模型[J]. 交通运输工程学报, 2013, 13(3): 121-126. doi: 10.19818/j.cnki.1671-1637.2013.03.017
引用本文: 樊娜, 赵祥模, 王青龙. 船联网数据融合的信任模型[J]. 交通运输工程学报, 2013, 13(3): 121-126. doi: 10.19818/j.cnki.1671-1637.2013.03.017
FAN Na, ZHAO Xiang-mo, WANG Qing-long. Trust model of data fusion for internet of ships[J]. Journal of Traffic and Transportation Engineering, 2013, 13(3): 121-126. doi: 10.19818/j.cnki.1671-1637.2013.03.017
Citation: FAN Na, ZHAO Xiang-mo, WANG Qing-long. Trust model of data fusion for internet of ships[J]. Journal of Traffic and Transportation Engineering, 2013, 13(3): 121-126. doi: 10.19818/j.cnki.1671-1637.2013.03.017

船联网数据融合的信任模型

doi: 10.19818/j.cnki.1671-1637.2013.03.017
基金项目: 

国家自然科学基金项目 51278058

长江学者和创新团队发展计划项目 IRT0951

中央高校基本科研业务费专项资金项目 CHD2011JC056

陕西省自然科学基金项目 2012JM8011

详细信息
    作者简介:

    樊娜(1978-), 女, 陕西渭南人, 长安大学讲师, 工学博士, 从事交通信息控制研究

  • 中图分类号: U491

Trust model of data fusion for internet of ships

More Information
    Author Bio:

    FAN Na(1978-), female, lecturer, PhD, +86-29-82334763, fnsea@163.com

  • 摘要: 引入了主观信任评价及其期望概率的概念, 通过统计方法评估船联网中各个节点的可信程度, 结合KL距离计算节点的信誉度, 从而建立了基于节点信誉度评价的数据融合信任模型。为避免影响融合的结果, 模型在数据融合过程中保留信誉度较好的节点, 摒弃低信誉的节点。模拟船联网网络结构进行仿真试验, 分别采用4种不同的攻击方法对网络中部分节点进行攻击, 试验分别按迭代100、200、300次进行。仿真结果表明: 传统方法的数据融合准确率为78%, 信任模型的数据融合准确率达到93%, 结果更逼近真实数据, 与传统方法相比有效提高了融合的准确性和可靠性。

     

  • 图  1  船联网结构

    Figure  1.  Structure of internet of ships

    图  2  攻击类型1的节点信誉度

    Figure  2.  Node credibilities under attack type 1

    图  3  攻击类型2的节点信誉度

    Figure  3.  Node credibilities under attack type 2

    图  4  攻击类型3的节点信誉度

    Figure  4.  Node credibilities under attack type 3

    图  5  攻击类型4的节点信誉度

    Figure  5.  Node credibilities under attack type 4

    图  6  迭代100次时的融合结果

    Figure  6.  Aggression result after 100 iterations

    图  7  迭代200次时的融合结果

    Figure  7.  Aggression result after 200 iterations

    图  8  迭代300次时的融合结果

    Figure  8.  Aggression result after 300 iterations

    表  1  攻击统计

    Table  1.   Attacking statistics

    攻击类型 被捕获节点发送伪造数据比例/% 伪造数据情况 恶意行为类别
    1 100 易察觉 直接恶意
    2 100 不易察觉 掩饰恶意
    3 65 易察觉 直接恶意
    4 65 不易察觉 掩饰恶意
    下载: 导出CSV
  • [1] ATZORI L, IERA A, MORABITO G. The internet ofthings: a survey[J]. Computer Networks, 2010(54): 2787-2805.
    [2] 胡向东. 物联网研究与发展综述[J]. 数字通信, 2010, 37(2): 17-21. doi: 10.3969/j.issn.1005-3824.2010.02.004

    HU Xiang-dong. Advance in research and development on the internet of things[J]. Digital Communication, 2010, 37(2): 17-21. (in Chinese). doi: 10.3969/j.issn.1005-3824.2010.02.004
    [3] 宋亚辉, 李凤保, 李在铭. 无线传感器网络能效技术综述[J]. 仪器仪表学报, 2006, 27(6): 1665-1674. https://www.cnki.com.cn/Article/CJFDTOTAL-YQXB2006S2268.htm

    SONG Ya-hui, LI Feng-bao, LI Zai-ming. Survey on energy-efficiency technology for wireless sensor networks[J]. Chinese Journal of Scientific Instrument, 2006, 27(6): 1665-1674. (in Chinese). https://www.cnki.com.cn/Article/CJFDTOTAL-YQXB2006S2268.htm
    [4] 唐慧, 胡向东. 无线传感器网络数据融合研究综述[J]. 信息安全与通信保密, 2007(7): 62-64, 68. doi: 10.3969/j.issn.1009-8054.2007.07.034

    TANG Hui, HU Xiang-dong. The research overview of data fusion in WSN[J]. Information Security and Communications Privacy, 2007(7): 62-64, 68. (in Chinese). doi: 10.3969/j.issn.1009-8054.2007.07.034
    [5] KUMAR D, ASERI T C, PATEL R B. Energy efficient clustering and data aggregation protocol for heterogeneous wireless sensor networks[J]. International Journal of Computers, Communications and Control, 2011, 5(1): 113-124.
    [6] 周鸣争, 楚宁, 周涛, 等. 一种基于能量约束的传感器网络动态数据融合算法[J]. 仪器仪表学报, 2007, 28(1): 172-175. doi: 10.3321/j.issn:0254-3087.2007.01.035

    ZHOU Ming-zheng, CHU Ning, ZHOU Tao, et al. Dynamic data fusion algorithm based on energy restraining in sensor network[J]. Chinese Journal of Scientific Instrument, 2007, 28(1): 172-175. (in Chinese). doi: 10.3321/j.issn:0254-3087.2007.01.035
    [7] GUO Jiang-hong, LUO Yu-dong. Probabilistic transmitting-based data aggregation scheme for wireless sensor networks[C]∥IEEE. Proceedings of the 2nd International Conference on Systems Engineering and Modeling. Paris: IEEE, 2013: 976-979.
    [8] MARAIYA K, KANT K, GUPTA N. Wireless sensor net-work: a review on data aggregation[J]. International Journal of Scientific and Engineering Research, 2011, 2(4): 1-6.
    [9] 赦文江, 武捷. 物联网技术安全问题探析[J]. 信息网络安全, 2010(1): 49-50. doi: 10.3969/j.issn.1671-1122.2010.01.013

    HAO Wen-jiang, WU Jie. Research on security of the internet ofthings[J]. Netinfo Security, 2010(1): 49-50. (in Chinese). doi: 10.3969/j.issn.1671-1122.2010.01.013
    [10] 田俊峰, 鲁玉臻, 李宁. 基于推荐的信任链管理模型[J]. 通信学报, 2011, 32(10): 1-9. doi: 10.3969/j.issn.1000-436X.2011.10.001

    TIAN Jun-feng, LU Yu-zhen, LI Ning. Trust chain management model based on recommendation[J]. Journal on Communications, 2011, 32(10): 1-9. (in Chinese). doi: 10.3969/j.issn.1000-436X.2011.10.001
    [11] 陈晶, 杜瑞颖, 王丽娜, 等. 网络环境下一种基于概率密度的信任博弈模型[J]. 电子学报, 2010, 38(2): 427-433. https://www.cnki.com.cn/Article/CJFDTOTAL-DZXU201002028.htm

    CHEN Jing, DU Rui-ying, WANG Li-na, et al. A trust game method basing on probability model in networks[J]. Acta Electronica Sinica, 2010, 38(2): 427-433. (in Chinese). https://www.cnki.com.cn/Article/CJFDTOTAL-DZXU201002028.htm
    [12] CHEN Dong, CHANG Gui-ran, SUN Da-wei, et al. TRMloT: a trust management model based on fuzzy reputation for internet of things[J]. Computer Science and Information Systems, 2011, 8(4): 1207-1228. doi: 10.2298/CSIS110303056C
    [13] CEOLIN D, HAGE W R, FOKKINK W. A trust model to estimate the quality of annotations using the web[C]∥ACM. 2010 Web Science Conference. Raleigh: ACM, 2010: 1-8.
    [14] 刘文懋, 殷丽华, 方滨兴, 等. 物联网环境下的信任机制研究[J]. 计算机学报, 2012, 35(5): 847-855. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201205002.htm

    LIU Wen-mao, YIN Li-hua, FANG Bin-xing, et al. A hierarchical trust model for the internet of things[J]. Chinese Journal of Computers, 2012, 35(5): 847-855. (in Chinese). https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201205002.htm
    [15] 袁禄来, 曾国荪, 姜黎立, 等. 网格环境下基于信任模型的动态级调度[J]. 计算机学报, 2006, 29(7): 1217-1224. doi: 10.3321/j.issn:0254-4164.2006.07.023

    YUAN Lu-lai, ZENG Guo-sun, JIANG Li-li, et al. Dynamic level scheduling based on trust model in grid computing[J]. Chinese Journal of Computers, 2006, 29(7): 1217-1224. (in Chinese). doi: 10.3321/j.issn:0254-4164.2006.07.023
    [16] FANG Hui, ZHANG Jie, THALMANN N M. A trust model stemmed from the diffusion theory for opinion evaluation[C]∥IEEE. Proceedings of the 12th International Conference on Autonomous Agents and Multi-agent Systems. Saint Paul: IEEE, 2013: 1-8.
    [17] KIM H, LEE H, KIM W, et al. A trust evaluation model for QoS guarantee in cloud systems[J]. International Journal of Grid and Distributed Computing, 2010, 3(1): 1-9.
  • 加载中
图(8) / 表(1)
计量
  • 文章访问数:  668
  • HTML全文浏览量:  140
  • PDF下载量:  745
  • 被引次数: 0
出版历程
  • 收稿日期:  2013-01-06
  • 刊出日期:  2013-06-25

目录

    /

    返回文章
    返回