Javascript must be enabled to continue!
Data Fusion Based on Node Trust Evaluation in Wireless Sensor Networks
View through CrossRef
Abnormal behavior detection and trust evaluation mode of traditional sensor node have a single function without considering all the factors, and the trust value algorithm is relatively complicated. To avoid these above disadvantages, a trust evaluation model based on the autonomous behavior of sensor node is proposed in this paper. Each sensor node has the monitoring privilege and obligation. Neighboring sensor nodes can monitor each other. Their direct and indirect trust values can be achieved by using a relatively simple calculation method, the synthesis trust value of which could be got according to the composition rule of D-S evidence theory. Firstly, the cluster head assigns different weighted value for the data from each sensor node, then the weight vector is set according to the synthesis trust value, the data fusion processing is executed, and finally the cluster head sensor node transmits the fused result to the base station. Simulation experiment results demonstrate that the trust evaluation model can rapidly, exactly, and effectively recognize malicious sensor node and avoid malicious sensor node becoming cluster head sensor node. The proposed algorithm can greatly increase the safety and accuracy of data fusion, improve communication efficiency, save energy of sensor node, suit different application fields, and deploy environments.
Title: Data Fusion Based on Node Trust Evaluation in Wireless Sensor Networks
Description:
Abnormal behavior detection and trust evaluation mode of traditional sensor node have a single function without considering all the factors, and the trust value algorithm is relatively complicated.
To avoid these above disadvantages, a trust evaluation model based on the autonomous behavior of sensor node is proposed in this paper.
Each sensor node has the monitoring privilege and obligation.
Neighboring sensor nodes can monitor each other.
Their direct and indirect trust values can be achieved by using a relatively simple calculation method, the synthesis trust value of which could be got according to the composition rule of D-S evidence theory.
Firstly, the cluster head assigns different weighted value for the data from each sensor node, then the weight vector is set according to the synthesis trust value, the data fusion processing is executed, and finally the cluster head sensor node transmits the fused result to the base station.
Simulation experiment results demonstrate that the trust evaluation model can rapidly, exactly, and effectively recognize malicious sensor node and avoid malicious sensor node becoming cluster head sensor node.
The proposed algorithm can greatly increase the safety and accuracy of data fusion, improve communication efficiency, save energy of sensor node, suit different application fields, and deploy environments.
Related Results
The Nuclear Fusion Award
The Nuclear Fusion Award
The Nuclear Fusion Award ceremony for 2009 and 2010 award winners was held during the 23rd IAEA Fusion Energy Conference in Daejeon. This time, both 2009 and 2010 award winners w...
Dynamic stochastic modeling for inertial sensors
Dynamic stochastic modeling for inertial sensors
Es ampliamente conocido que los modelos de error para sensores inerciales tienen dos componentes: El primero es un componente determinista que normalmente es calibrado por el fabri...
Design of multi-energy-space-based energy-efficient algorithm in novel software-defined wireless sensor networks
Design of multi-energy-space-based energy-efficient algorithm in novel software-defined wireless sensor networks
Energy efficiency has always been a hot issue in wireless sensor networks. A lot of energy-efficient algorithms have been proposed to reduce energy consumption in traditional wirel...
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash
Abstract
This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
Routing Security in Wireless Sensor Networks
Routing Security in Wireless Sensor Networks
Since routing is a fundamental operation in all types of networks, ensuring routing security is a necessary requirement to guarantee the success of routing operation. Securing rout...
Predictors of False-Negative Axillary FNA Among Breast Cancer Patients: A Cross-Sectional Study
Predictors of False-Negative Axillary FNA Among Breast Cancer Patients: A Cross-Sectional Study
Abstract
Introduction
Fine-needle aspiration (FNA) is commonly used to investigate lymphadenopathy of suspected metastatic origin. The current study aims to find the association be...
Energy-saving clustering routing algorithm for heterogeneous wireless sensor networks based on energy iteration model and bee colony optimization
Energy-saving clustering routing algorithm for heterogeneous wireless sensor networks based on energy iteration model and bee colony optimization
Aiming at the problems of large number of data transmission node deaths and large transmission energy consumption output in energy-saving clustering routing communication of wirele...
Design of agricultural wireless sensor network node optimization method based on improved data fusion algorithm
Design of agricultural wireless sensor network node optimization method based on improved data fusion algorithm
The agricultural WSN (wireless sensor network) has the characteristics of long operation cycle and wide coverage area. In order to cover as much area as possible, farms usually dep...

