期刊文献+

物联网感知源数据可信性评估模型研究 被引量:1

Research on Credibility Evaluation Model of Perception Source Data of Internet of Things
下载PDF
导出
摘要 感知源数据的可信性是决定应用系统安全和可靠与否的重点因素.提出了一种物联网感知源数据可信性评估模型,从直接信任值、能量信任值、同行推荐信任值和综合信任值等多个维度对感知源数据的可信性进行评估,从而可以有效地识别感知设备的状态.仿真实验表明,模型具有算法简单,能耗低,可以进行边缘计算与动态扩展. The credibility of source data is a key factor determining the security and reliability of the application system of internet of things(ioT).This paper proposes an evaluation model for IoT source data,which evaluates the credibility of source data from multiple dimensions such as direct trust,energy trust,peer recommendation trust and comprehensive trust.And the state of the sensing devices can be identified effectively,and algorithms of our model are characterized by their simple implementation,low energy consumption,low calculation and dynamic expansion.
作者 吴戈 黎忠文 黎通 陈二阳 江丹 WU Ge;LI Zhongwen;LI Tong;CHEN Eryang;JIANG Dan(School of Information Science and Engineering,Chengdu University,Chengdu 610106,China;Chengdu Experimental Foreign Languages School West Campus,Chengdu 610213,China)
出处 《成都大学学报(自然科学版)》 2019年第3期291-293,338,共4页 Journal of Chengdu University(Natural Science Edition)
基金 四川省科技厅重点科技计划(2018GZ0247) 成都市科技局技术创新研发(2018-YF05-00731-SN)资助项目
关键词 物联网 可信性 信任值 评测单元 internet of things credibility trust value valuation unit
  • 相关文献

参考文献5

二级参考文献43

  • 1郑丽国,周怡颋,凌志浩,彭瑜.基于ZigBee技术的产品开发流程及其实现方法[J].自动化仪表,2006,27(z1):162-165. 被引量:13
  • 2金连,王宏志,黄沈滨,高宏.基于Map-Reduce的大数据缺失值填充算法[J].计算机研究与发展,2013,50(S1):312-321. 被引量:18
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4ZHAO J, COVINDAN R, ESTRIN D. Residual Energy Scans for Monitoring Wireless Sensor Networks [ C ] .IEEE Wireless Communications and Networking Conference ( WCNC'02 ), 2002 : 17 - 21. 被引量:1
  • 5CHOONGILL Y, HYOUNGSOO L, DONGSEUNG K. RSSI Measurements [ EB/OL ]. [ 2003 - 09 - 10 ]. http ://www. ieee802, org. 被引量:1
  • 6BULUSU N, HEIDEMANN J, ESTRIN D. GPS-less Low Cost Outdoor Localization for Very Small Devices [ J ]. Proceedings of the IEEE Personal Communications Magazine, 2000, 7 (5) : 28 - 34. 被引量:1
  • 7XU Y, HEIDEMANN J, ESTRIN D. Geography-informed energy conservation for ad hoc routing[ C].Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, Rome, Italy, 2001:70 - 84. 被引量:1
  • 8FENG Z, JAEWON S, JAMES R. Information-Driven Dynamic Sensor Collaboration for Target Tracking [ J ]. IEEE Signal Processing Magazine, 2002,19(2). 被引量:1
  • 9Rui Sushmita, Nayak Amiya, Stojmenovic Ivan. Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs[ A]. Proceedings IEEE INFOCOM [ C ]. USA: IF.F.E Press, 2011.326 - 330. 被引量:1
  • 1021aao Xin, Wang Xiaodong, Yu Wanrong, et al. An efficient broadcast authentication protocol in wireless sensor networks [J] .Chinese Journal of Electronics, 2009,18(2) :368 - 372. 被引量:1

共引文献26

同被引文献9

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部