|Table of Contents|

Trust model of data fusion for internet of ships

《交通运输工程学报》[ISSN:1671-1637/CN:61-1369/U]

Issue:
2013年03期
Page:
121-126
Research Field:
交通信息工程及控制
Publishing date:

Info

Title:
Trust model of data fusion for internet of ships
Author(s):
FAN Na ZHAO Xiang-mo WANG Qing-long
School of Information Engineering, Chang’an University, Xi’an 710064, Shaanxi, China
Keywords:
internet of things internet of ships data fusion trust model trust evaluation KL divergence credibility
PACS:
U491
DOI:
-
Abstract:
The concepts of subjective trust elevation and its expected probability were introduced. The credibility value of every node in the internet of ships was evaluated by statistical method, and calculated by using KL divergence. A trust model of data fusion was proposed based on node credibility evaluation. The nodes with high credibilities were included in the model, however, the nodes with low credibilities were abandoned in order to avoid their effects in data fusion. The structure of internet of ships was simulated, four different kinds of attacks were adopted to attack some network nodes, and simulation experiments were done where the iteration numbers were 100, 200 and 300 respectively. Simulation result shows that data fusion accuracy is 78% by using traditional method, and fusion result by using trust model is nearer to true data with an accuracy of 93%. Compared with traditional method, the accuracy and security of data fusion are efficiently improved by trust model. 1 tab, 8 figs, 17 refs.

References:

[1] ATZORI L, IERA A, MORABITO G. The internet of things: a survey[J]. Computer Networks, 2010(54): 2787-2805.
[2] 胡向东.物联网研究与发展综述[J].数字通信,2010,37(2):17-21. HU Xiang-dong. Advance in research and development on the internet of things[J]. Digital Communication, 2010, 37(2): 17-21.(in Chinese)
[3] 宋亚辉,李凤保,李在铭.无线传感器网络能效技术综述[J].仪器仪表学报,2006,27(6):1665-1674. SONG Ya-hui, LI Feng-bao, LI Zai-ming. Survey on energy-efficiency technology for wireless sensor networks[J]. Chinese Journal of Scientific Instrument, 2006, 27(6): 1665-1674.(in Chinese)
[4] 唐 慧,胡向东.无线传感器网络数据融合研究综述[J].信息安全与通信保密,2007(7):62-64,68. TANG Hui, HU Xiang-dong. The research overview of data fusion in WSN[J]. Information Security and Communications Privacy, 2007(7): 62-64, 68.(in Chinese)
[5] KUMAR D, ASERI T C, PATEL R B. Energy efficient clustering and data aggregation protocol for heterogeneous wireless sensor networks[J]. International Journal of Computers, Communications and Control, 2011, 5(1): 113-124.
[6] 周鸣争,楚 宁,周 涛,等.一种基于能量约束的传感器网络动态数据融合算法[J].仪器仪表学报,2007,28(1):172-175. ZHOU Ming-zheng, CHU Ning, ZHOU Tao, et al. Dynamic data fusion algorithm based on energy restraining in sensor network[J]. Chinese Journal of Scientific Instrument, 2007, 28(1): 172-175.(in Chinese)
[7] GUO Jiang-hong, LUO Yu-dong. Probabilistic transmitting-based data aggregation scheme for wireless sensor networks[C]∥IEEE. Proceedings of the 2nd International Conference on Systems Engineering and Modeling. Paris: IEEE, 2013: 976-979.
[8] MARAIYA K, KANT K, GUPTA N. Wireless sensor network: a review on data aggregation[J]. International Journal of Scientific and Engineering Research, 2011, 2(4): 1-6.
[9] 赦文江,武 捷.物联网技术安全问题探析[J].信息网络安全,2010(1):49-50. HAO Wen-jiang, WU Jie. Research on security of the internet of things[J]. Netinfo Security, 2010(1): 49-50.(in Chinese)
[10] 田俊峰,鲁玉臻,李 宁.基于推荐的信任链管理模型[J].通信学报,2011,32(10):1-9. TIAN Jun-feng, LU Yu-zhen, LI Ning. Trust chain management model based on recommendation[J]. Journal on Communications, 2011, 32(10): 1-9.(in Chinese)
[11] 陈 晶,杜瑞颖,王丽娜,等.网络环境下一种基于概率密度的信任博弈模型[J].电子学报,2010,38(2):427-433. CHEN Jing, DU Rui-ying, WANG Li-na, et al. A trust game method basing on probability model in networks[J]. Acta Electronica Sinica, 2010, 38(2): 427-433.(in Chinese)
[12] CHEN Dong, CHANG Gui-ran, SUN Da-wei, et al. TRM-loT: a trust management model based on fuzzy reputation for internet of things[J]. Computer Science and Information Systems, 2011, 8(4): 1207-1228.
[13] CEOLIN D, HAGE W R, FOKKINK W. A trust model to estimate the quality of annotations using the web[C]∥ACM. 2010 Web Science Conference. Raleigh: ACM, 2010: 1-8.
[14] 刘文懋,殷丽华,方滨兴,等.物联网环境下的信任机制研究[J].计算机学报,2012,35(5):847-855. LIU Wen-mao, YIN Li-hua, FANG Bin-xing, et al. A hierarchical trust model for the internet of things[J]. Chinese Journal of Computers, 2012, 35(5): 847-855.(in Chinese)
[15] 袁禄来,曾国荪,姜黎立,等.网格环境下基于信任模型的动态级调度[J].计算机学报,2006,29(7):1217-1224. YUAN Lu-lai, ZENG Guo-sun, JIANG Li-li, et al. Dynamic level scheduling based on trust model in grid computing[J]. Chinese Journal of Computers, 2006, 29(7): 1217-1224.(in Chinese)
[16] FANG Hui, ZHANG Jie, THALMANN N M. A trust model stemmed from the diffusion theory for opinion evaluation[C]∥IEEE. Proceedings of the 12th International Conference on Autonomous Agents and Multi-agent Systems. Saint Paul: IEEE, 2013: 1-8.
[17] KIM H, LEE H, KIM W, et al. A trust evaluation model for QoS guarantee in cloud systems[J]. International Journal of Grid and Distributed Computing, 2010, 3(1): 1-9.

Memo

Memo:
-
Last Update: 2013-07-30