FAN Na, ZHAO Xiang-mo, WANG Qing-long. Trust model of data fusion for internet of ships[J]. Journal of Traffic and Transportation Engineering, 2013, 13(3): 121-126. doi: 10.19818/j.cnki.1671-1637.2013.03.017
Citation: FAN Na, ZHAO Xiang-mo, WANG Qing-long. Trust model of data fusion for internet of ships[J]. Journal of Traffic and Transportation Engineering, 2013, 13(3): 121-126. doi: 10.19818/j.cnki.1671-1637.2013.03.017

Trust model of data fusion for internet of ships

doi: 10.19818/j.cnki.1671-1637.2013.03.017
More Information
  • Author Bio:

    FAN Na(1978-), female, lecturer, PhD, +86-29-82334763, fnsea@163.com

  • Received Date: 2013-01-06
  • Publish Date: 2013-06-25
  • The concepts of subjective trust elevation and its expected probability were introduced. The credibility value of every node in the internet of ships was evaluated by statistical method, and calculated by using KL divergence. A trust model of data fusion was proposed based on node credibility evaluation.The nodes with high credibilities were included in the model, however, the nodes with low credibilities were abandoned in order to avoid their effects in data fusion. The structure of internet of ships was simulated, four different kinds of attacks were adopted to attack some network nodes, and simulation experiments were done where the iteration numbers were 100, 200 and 300 respectively. Simulation result shows that data fusion accuracy is 78% by using traditional method, and fusion result by using trust model is nearer to true data with an accuracy of 93%. Compared with traditional method, the accuracy and security of data fusion are efficiently improved by trust model.

     

  • loading
  • [1]
    ATZORI L, IERA A, MORABITO G. The internet ofthings: a survey[J]. Computer Networks, 2010(54): 2787-2805.
    [2]
    胡向东. 物联网研究与发展综述[J]. 数字通信, 2010, 37(2): 17-21. doi: 10.3969/j.issn.1005-3824.2010.02.004

    HU Xiang-dong. Advance in research and development on the internet of things[J]. Digital Communication, 2010, 37(2): 17-21. (in Chinese). doi: 10.3969/j.issn.1005-3824.2010.02.004
    [3]
    宋亚辉, 李凤保, 李在铭. 无线传感器网络能效技术综述[J]. 仪器仪表学报, 2006, 27(6): 1665-1674. https://www.cnki.com.cn/Article/CJFDTOTAL-YQXB2006S2268.htm

    SONG Ya-hui, LI Feng-bao, LI Zai-ming. Survey on energy-efficiency technology for wireless sensor networks[J]. Chinese Journal of Scientific Instrument, 2006, 27(6): 1665-1674. (in Chinese). https://www.cnki.com.cn/Article/CJFDTOTAL-YQXB2006S2268.htm
    [4]
    唐慧, 胡向东. 无线传感器网络数据融合研究综述[J]. 信息安全与通信保密, 2007(7): 62-64, 68. doi: 10.3969/j.issn.1009-8054.2007.07.034

    TANG Hui, HU Xiang-dong. The research overview of data fusion in WSN[J]. Information Security and Communications Privacy, 2007(7): 62-64, 68. (in Chinese). doi: 10.3969/j.issn.1009-8054.2007.07.034
    [5]
    KUMAR D, ASERI T C, PATEL R B. Energy efficient clustering and data aggregation protocol for heterogeneous wireless sensor networks[J]. International Journal of Computers, Communications and Control, 2011, 5(1): 113-124.
    [6]
    周鸣争, 楚宁, 周涛, 等. 一种基于能量约束的传感器网络动态数据融合算法[J]. 仪器仪表学报, 2007, 28(1): 172-175. doi: 10.3321/j.issn:0254-3087.2007.01.035

    ZHOU Ming-zheng, CHU Ning, ZHOU Tao, et al. Dynamic data fusion algorithm based on energy restraining in sensor network[J]. Chinese Journal of Scientific Instrument, 2007, 28(1): 172-175. (in Chinese). doi: 10.3321/j.issn:0254-3087.2007.01.035
    [7]
    GUO Jiang-hong, LUO Yu-dong. Probabilistic transmitting-based data aggregation scheme for wireless sensor networks[C]∥IEEE. Proceedings of the 2nd International Conference on Systems Engineering and Modeling. Paris: IEEE, 2013: 976-979.
    [8]
    MARAIYA K, KANT K, GUPTA N. Wireless sensor net-work: a review on data aggregation[J]. International Journal of Scientific and Engineering Research, 2011, 2(4): 1-6.
    [9]
    赦文江, 武捷. 物联网技术安全问题探析[J]. 信息网络安全, 2010(1): 49-50. doi: 10.3969/j.issn.1671-1122.2010.01.013

    HAO Wen-jiang, WU Jie. Research on security of the internet ofthings[J]. Netinfo Security, 2010(1): 49-50. (in Chinese). doi: 10.3969/j.issn.1671-1122.2010.01.013
    [10]
    田俊峰, 鲁玉臻, 李宁. 基于推荐的信任链管理模型[J]. 通信学报, 2011, 32(10): 1-9. doi: 10.3969/j.issn.1000-436X.2011.10.001

    TIAN Jun-feng, LU Yu-zhen, LI Ning. Trust chain management model based on recommendation[J]. Journal on Communications, 2011, 32(10): 1-9. (in Chinese). doi: 10.3969/j.issn.1000-436X.2011.10.001
    [11]
    陈晶, 杜瑞颖, 王丽娜, 等. 网络环境下一种基于概率密度的信任博弈模型[J]. 电子学报, 2010, 38(2): 427-433. https://www.cnki.com.cn/Article/CJFDTOTAL-DZXU201002028.htm

    CHEN Jing, DU Rui-ying, WANG Li-na, et al. A trust game method basing on probability model in networks[J]. Acta Electronica Sinica, 2010, 38(2): 427-433. (in Chinese). https://www.cnki.com.cn/Article/CJFDTOTAL-DZXU201002028.htm
    [12]
    CHEN Dong, CHANG Gui-ran, SUN Da-wei, et al. TRMloT: a trust management model based on fuzzy reputation for internet of things[J]. Computer Science and Information Systems, 2011, 8(4): 1207-1228. doi: 10.2298/CSIS110303056C
    [13]
    CEOLIN D, HAGE W R, FOKKINK W. A trust model to estimate the quality of annotations using the web[C]∥ACM. 2010 Web Science Conference. Raleigh: ACM, 2010: 1-8.
    [14]
    刘文懋, 殷丽华, 方滨兴, 等. 物联网环境下的信任机制研究[J]. 计算机学报, 2012, 35(5): 847-855. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201205002.htm

    LIU Wen-mao, YIN Li-hua, FANG Bin-xing, et al. A hierarchical trust model for the internet of things[J]. Chinese Journal of Computers, 2012, 35(5): 847-855. (in Chinese). https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201205002.htm
    [15]
    袁禄来, 曾国荪, 姜黎立, 等. 网格环境下基于信任模型的动态级调度[J]. 计算机学报, 2006, 29(7): 1217-1224. doi: 10.3321/j.issn:0254-4164.2006.07.023

    YUAN Lu-lai, ZENG Guo-sun, JIANG Li-li, et al. Dynamic level scheduling based on trust model in grid computing[J]. Chinese Journal of Computers, 2006, 29(7): 1217-1224. (in Chinese). doi: 10.3321/j.issn:0254-4164.2006.07.023
    [16]
    FANG Hui, ZHANG Jie, THALMANN N M. A trust model stemmed from the diffusion theory for opinion evaluation[C]∥IEEE. Proceedings of the 12th International Conference on Autonomous Agents and Multi-agent Systems. Saint Paul: IEEE, 2013: 1-8.
    [17]
    KIM H, LEE H, KIM W, et al. A trust evaluation model for QoS guarantee in cloud systems[J]. International Journal of Grid and Distributed Computing, 2010, 3(1): 1-9.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (677) PDF downloads(745) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return