首页 | 本学科首页   官方微博 | 高级检索  
     检索      

均衡评估算法对基于区块链的无线传感网节点信任管理优化
引用本文:刘云,宋凯,陈路遥,朱鹏俊.均衡评估算法对基于区块链的无线传感网节点信任管理优化[J].山东大学学报(理学版),2022,57(7):73-84.
作者姓名:刘云  宋凯  陈路遥  朱鹏俊
作者单位:昆明理工大学信息工程与自动化学院, 云南 昆明 650500
基金项目:国家自然科学基金资助项目(61761025);云南省重大科技专项计划资助项目(202002AD080002)
摘    要:提出了一种均衡评估算法,通过在区块链中消除无线传感器网络中的恶意节点来增强信标节点之间的信任关系。首先将传感器节点信息打包生成区块,按照节点编号顺序生成区块链;接着在区块链中对每个信标节点进行基于行为、基于反馈和基于数据的信任值计算,将3个信任值加权得到每个信标节点的均衡信任值,并将均衡信任值广播给基站;最后对均衡信任值排序,把信任值较小的信标节点视为恶意节点,并将其从区块链中剔除。仿真结果显示,均衡评估算法在平均定位误差、检测精度和平均能耗等方面都有了很好的提升,同时保证了信任评估管理过程的安全性和可追溯性。

关 键 词:均衡评估算法  无线传感网  信任关系  信标节点  恶意节点  

Trust management optimization of wireless sensor network nodes based on blockchain using equilibrium evaluation algorithm
LIU Yun,SONG Kai,CHEN Lu-yao,ZHU Peng-jun.Trust management optimization of wireless sensor network nodes based on blockchain using equilibrium evaluation algorithm[J].Journal of Shandong University,2022,57(7):73-84.
Authors:LIU Yun  SONG Kai  CHEN Lu-yao  ZHU Peng-jun
Institution:Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming 650500, Yunnan, China
Abstract:An equilibrium evaluation algorithm to enhance the trust relationship between beacon nodes by eliminating malicious nodes in wireless sensor networks in the blockchain is proposed. The sensor node information is first packaged to generate a block according to the node number order, behavior, feedback and data-based trust value, the three trust values are weighted to obtain the balanced trust value of each beacon node, broadcast to the base station; in the end, the beacon nodes with small trust values are regarded as malicious nodes and removed from the blockchain. Simulation results show that the equilibrium evaluation algorithm has been well improved in terms of average positioning error, detection accuracy and average energy consumption, while ensuring the safety and traceability of the trust evaluation management process.
Keywords:equilibrium evaluation algorithm  wireless sensing network  trust relationship  beacon node  malicious node  
点击此处可从《山东大学学报(理学版)》浏览原始摘要信息
点击此处可从《山东大学学报(理学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号