用户名: 密码: 验证码:
无线传感器网络信任管理关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,作为物联网技术的重要组成之一,无线传感器网络相关研究得到了进一步的发展。然而,随着无线传感器网络应用领域的扩展,其安全性需求也越来越迫切。无线传感器网络具有信道开放、资源受限、分布式处理等特征,这些特征使其极易受到恶意攻击,因而难以保证系统的安全性和可靠性。传统的无线传感器网络安全机制主要基于加密和认证技术,复杂的加密算法和额外的计算开销,并不适用于资源受限的无线传感器网络。此外,该类安全机制主要用于抵御网络外部攻击,无法有效解决由节点妥协或自私性引起的网络内部攻击问题。在此前提之下,由于具有更低的计算复杂度和更高的网络内部攻击抵御能力,无线传感器网络信任管理研究应运而生。
     本文立足于无线传感器网络信任管理关键技术研究,充分考虑无线传感器网络特性,设计了具有高扩展性和灵活性的信任管理系统架构,并据此重点关注了多项存在于现有信任管理系统中的挑战性难题。具体地说,本文的主要工作和贡献包括:
     (1)入侵检测技术是信任管理架构的基础,直接为信任评估提供计算节点信任值的证据信息。传统入侵检测系统并未考虑无线传感器网络具有资源受限、中心基础设施缺乏、网络部署环境复杂等特征。针对上述问题,本文首先提出一种基于时隙分配和调度的检测机制,通过对节点本地监测时隙的管理减少网络开销。其次,该入侵检测系统通过建立节点行为的特征模型,增强对各种攻击行为的检测能力,同时采用统计理论和规则匹配相结合的判决机制提升系统的检测准确率。最后,本文采用基于Q-Learning的自适应学习算法提升系统对复杂环境的适应能力。
     (2)信任评估机制通常包含信任计算和信任数据采集两个部分,是整个信任管理系统的核心。针对传统信任计算方法大多未充分考虑信任度量基本性质和设计原则的问题,本文首先设计了一种灵活、可扩展性强的信任计算架构。随后,本文根据信任计算架构的分析结果,综合考虑无线传感器网络的特征,提出了一种低复杂度、高可靠性、高安全性的信任计算方法。最后,针对现有信任数据采集机制开销过大且未考虑节点自私性的问题,本文提出了一种基于信任请求包跳数限制和推荐信任困境博弈的信任数据采集方法,以减少信任数据采集过程中产生的网络通信开销,提升网络的安全性。
     (3)接入控制系统是无线传感器网络安全防御机制的重要组成之一。传统接入控制机制通常需要依赖复杂的加密算法和中心认证机构完成对节点接入请求的处理过程。为了解决这个问题,本文提出了一种基于信任和风险度量的分布式、细粒度接入控制模型。该方案的主要思想是将信任度量引入到接入控制系统中,根据新入网节点的信任值和角色分配,实现对节点的接入授权及访问控制管理。此外,针对传统接入控制机制在分布式环境下存在较强风险性的问题,本文设计了一种基于中心度属性的风险函数,用以评估授权新节点入网的风险性,本地授权决策必须同时满足信任和风险评估的需求。最后,针对不同域内的无线传感器网络可能存在不同接入控制策略的问题,提出了一种基于映射机制和组接入策略的跨域接入控制方法。
     (4)作为无线传感器网络安全防御机制的另一项重要组成部分,基于信任感知的安全路由协议也受到了越来越多的关注。为了抵御网络中的各种攻击行为,满足路由协议的安全性需求,本文首先分析了无线传感器网络常见路由攻击以及针对信任模型攻击的行为特征,并根据分析结果提出了改进的信任计算方法。此外,针对传统信任感知路由大多未考虑信任度量和QoS度量区别的问题,本文综合考虑两者的不同特征,并利用Semirings数学理论设计了一种优化的路由算法。最后,针对传统信任路由适用性受限以及信任数据采集开销较大的问题,本文提出了一种具有低开销和高可扩展性的新型无线传感器网络信任路由协议。
As one of the most important network technologies for Internet of Things(IoT), the research on Wireless Sensor Networks(WSNs) has been further developed in recent years. However, the security requirements of WSNs also become more and more urgent with the expansion of application fields. WSNs have a number of unique characteristics, such as open channel, constrained resources, distributed processing, etc. Owing to these characteristics, WSNs are susceptible to various attacks and difficult to protect the security and reliability of systems. Conventional security mechanisms mainly rely on cryptography and authentication technologies, but sophisticated cryptographic algorithms and extra computational overhead are not applicable for a resource-constrained WSN. Furthermore, cryptographic mechanisms can resist some types of attacks from external nodes, but they may fail to prevent compro-mised or selfish nodes from launching attacks from inside. Due to the computational process of low complexity and high resistance to internal attacks, trust management is an effective solution to the above issues.
     The dissertation studies the key technology for trust management in WSNs and designs a specific architecture with high scalability and flexibility by considering the characteristics of WSNs. Based on this, it focus on several challenging issues in previous trust management systems. More specifically, the main contributions of this dissertation can be summarized as follows:
     (1) Intrusion detection technology is the foundation of trust management architectures, which provides trust evaluation with the direct evidence to calculate the trust of nodes. Traditional intrusion detection systems do not consider the characteristics of WSNs, such as constrained resources, lack of center infrastructure, complex deployment en-vironments, etc. In order to solve the above problems, this dissertation first proposes a detection mechanism based on slot allocation and scheduling, which can reduce the network overhead by managing the nodes'local monitoring slots. Furthermore, the proposed intrusion detection system establishes the feature model of the node's be-havior to enhance the ability to detect a variety of attacks. It can also improve the accuracy of detection system by utilizing the combination of statistical theory and matching rules. Finally, this dissertation adopts a learning algorithm based on Q-Learning to enhance the adaptability to complex environments.
     (2) Trust evaluation is the core of the trust management system, which normally includes trust computation and trust derivation. Most traditional trust computation methods do not consider the basic nature and design principles of trust metric. To deal with it, this dissertation designs a trust computation architecture with high flexibility and scalabil-ity. By analyzing the trust computation architecture and considering the characteristics of WSNs, this dissertation proposes a trust computation method with low complexity, high reliability, and high security. Finally, the existing trust derivation schemes pro-duce excessive overhead and do not consider the nodes' selfish behavior. To address this issue, the dissertation presents a novel trust derivation scheme by setting hop limit to trust request packets and introducing a recommendation trust dilemma game, which can reduce the communication overhead and improve the network security.
     (3) Access control system is an important component of security defense mechanisms in WSNs. Complex encryption algorithms and central certificate authority on which traditional access control models are based are common approaches for achieving the authorization process. This dissertation proposes a distributed and fine-grained access control model based on trust and risk metric, which aims to address the challenges mentioned above. The main idea of the scheme is that introducing a trust evaluation mechanism into the previous access model. According to the trust value and role assignment of the new arrival node, it can accomplish the access authorization and management. Furthermore, to deal with the high risk in a distributed environment, the dissertation designs a risk function based on the centrality degree to evaluate the risk factor of the node's access. The local authorization decisions must meet the needs of trust and risk assessment. Finally, this dissertation takes multi-domain access control into account and solves this problem by utilizing a mapping mechanism and group access policies.
     (4) As another important part of security defense mechanisms in WSNs, trust-based rout-ing protocols have attracted more and more attention. In order to resist against various attacks on the network and satisfy the security requirements of routing protocols, this dissertation first analyzes the attacks on routing protocols especially the common ones to trust models. According to the analysis results, it proposes an improved trust com-putation method. Furthermore, most previous trust-aware routing protocols do not consider the difference between the trust metric and the QoS metric. Consequently, this dissertation designs an optimized routing algorithm based on the mathematical theory of Semirings, which not only considers the features of trust metric, but also other QoS requirements. Finally, the conventional trust-based routing protocols are normally confined to specific platforms and will produce excessive communication overhead. To deal with the problem, this dissertation proposes a novel trust-aware routing protocol with low overhead and high scalability.
引文
[1]K. Han, J. Luo, Y. Liu and A. Vasilakos. Algorithm design for data communications in duty-cycled wireless sensor networks:A survey. IEEE Communications Magazine,51(7):107-113,2013.
    [2]任丰原,黄海宁,林闯.无线传感器网络.软件学报,14(7):1282-1291,2003.
    [3]J. Yick, B. Mukherjee and D. Ghosal. Wireless sensor network survey. Computer networks, 52(12):2292-2330,2008.
    [4]I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci. A survey on sensor networks. IEEE Communications magazine,40(8):102-114,2002.
    [5]J. Byrne.21 ideas for the 21st century. Business Week,8:78-167,1999.
    [6]R. Wade, W. Mitchell and F. Petter. Ten emerging technologies that will change the world. Tech-nology Review,106(1):22-49,2003.
    [7]IBM.智慧地球,赢在中国.http://www.ibm.com/smarterplanet/cn/zh/.
    [8]工业与信息化部.物联网“十二五”发展规划.http://kjs.miit.gov.cn/n11293472/n11295040/n11478867/14344522.html.
    [9]J. Zheng and A. Jamalipour. Wireless sensor networks:A networking perspective. Wiley,2009, 1-3.
    [10]T. Newman, S. Hasan, D. DePoy, etc. Designing and deploying a building-wide cognitive radio network testbed. IEEE Communications Magazine,48(9):106-112,2010.
    [11]A. Cerpa, J. Elson, D. Estrin, etc. Habitat monitoring:Application driver for wireless communica-tions technology. ACM SIGCOMM Computer Communication Review,31(2):20-41,2001.
    [12]裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述.通信学报,28(8):113-122,2007.
    [13]Marcos A. Simplicio Jr, Bruno T. de Oliveira, Cintia B. Margi, etc. Survey and comparison of message authentication solutions on wireless sensor networks. Ad Hoc Networks,11(3):1221-1236, 2013.
    [14]P. Juang, H. Old, Y. Wang, etc. Energy-efficient computing for wildlife tracking:Design tradeoffs and early experiences with ZebraNet. ACM SIGOPS Operating Systems Review,36(5):96-107, 2002.
    [15]N. Xu, S. Rangwala, K. K. Chintalapudi, etc. A wireless sensor network for structural monitor-ing. In Proc. of the 2nd International Conference on Embedded networked sensor systems(SenSys 2004), Baltimore, MD, USA, November 2004,13-24.
    [16]A. M. Baptista. CORE:The first decade of a coastal-margin collaborative observatory. http://www.ccalmr.ogi.edu/corie.
    [17]E. Oto, F. Lau and H. Aghajan. Color-based multiple agent tracking for wireless image sensor networks. In Proc. of the Advanced Concepts for Intelligent Vision Systems, Antwerp, Belgium, September 2006,299-310.
    [18]T. He, S. Krishnamurthy, J. A. Stankovic, etc. VigilNet:An integrated sensor network system for energy-efficient surveillance. ACM Transactions on Sensor Networks,2(1):1-38,2006.
    [19]U.S. Department of Energy. Artificial Retina project, http://artificialretina.energy.gov.
    [20]J. Solobera. Detecting forest fires using wireless sensor networks with waspmote. http://www.libelium.com/wireless_sensor_networks_to-detec_forest_fires/.
    [21]S. Reddy, K. Shilton, G. Denisov, etc. Biketastic:Sensing and mapping for better biking. In Proc. of the 28th Conference on Human Factors in Computing Systems, Atlanta, GA, USA, April 2010, 1817-1820.
    [22]Y. Zhou, Y. Fang and Y. Zhang. Securing wireless sensor networks:A survey. IEEE Communica-tions Surveys & (?)Tutorials,10(3):6-28,2008.
    [23]Y. Wang, G. Attebury and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys (?) Tutorials,8(2):2-23,2006.
    [24]M. Conti, J. Willemsen and B. Crispo. Providing source location privacy in wireless sensor net-works:A survey. IEEE Communications Surveys & (?) Tutorials,15(3):1238-1280,2013.
    [25]B. Sun, L. Osborne and Y. Xiao. Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks. IEEE Wireless Communications,14(5):56-63,2007.
    [26]D. Djenouri, L. Khelladi, and N. Badache. A survey of security issues in mobile ad hoc networks. IEEE Communications Surveys ()? Tutorials,7(4):2-28,2005.
    [27]Sun. SunSPOT mote specifications, http://www.sunspotworld.com.
    [28]Crossbow. Crossbow technology, http://www.xbow.com.
    [29]W. Diffie and M.E. Hellman. New direction in cryptography. IEEE Transaction on Information Theory,22(6):644-654,1976.
    [30]A. Menezes, P. Oorschot and S. Vanstone. Handbook of Applied Cryptography. CRC Press,1997.
    [31]J. Huang, I. Liao and Y. Chung. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Information Sciences,231:32-44,2013.
    [32]N. A. Alrajeh, S. Khan, and B. Shams. Intrusion detection systems in wireless sensor networks:A review. International Journal of Distributed Sensor Networks,2013,2013(4):1-7,2013.
    [33]M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proc. of the IEEE Sym-posium on Security and Privacy, Oakland, CA, USA, May 1996,164-173.
    [34]L. Eschenauer, V. D. Gligor and J. Baras. On trust establishment in mobile ad-hoc networks. In Proc. of the 10th International Security and Privacy Workshop, Cambridge, U.k., April 2003,47-66.
    [35]T. Jiang. Distributed trust management in autonomic networks[PhD. Thesis]. University of Mary-land,2007.
    [36]荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理.软件学报,19(7):1716-1730,2008.
    [37]B. J. Lagesse. Autonomic trust management in dynamic systems[PhD. Thesis]. University of Texas, 2009.
    [38]A. Srinivasan. Reputation and trust-based security in wireless sensor networks[PhD. Thesis]. Florida Atlantic University,2008.
    [39]C. Seng. Robust trust establishment in decentralized networks[PhD. Thesis]. University of Mary-land,2010.
    [40]L. Huang, L. Li and Q. Tan. Behavior-based trust in wireless sensor network. In Proc. of the 2006 International Advanced Web and Network Technologies, and Applications, Harbin, China, January 2006,214-223.
    [41]W. Cheng, X. Liao, C. Shen, etc. A trust-based routing framework in energy-constrained wireless sensor networks. In Proc. of the 1st International Conference on Wireless Algorithms, Systems, and Applications, Xi' an, China, August 2006,478-489.
    [42]J.Duan, D. Gao, C. H. Foh, and H. Zhang. TC-BAC:A trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Networks,11(8):2675-2692,2013.
    [43]S. Marti, T. J. Giuli, K. Lai, etc. Mitigating routing misbehavior in mobile ad hoc networks. In Proc. of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, USA, August 2000,255-265.
    [44]H. Deng, G. Jin, K. Sun, etc. Trust-aware in-network aggregation for wireless sensor networks. In Proc. of the 2009 IEEE Global Telecommunications Conference(GLOBECOM 2009), Honolulu, HI, USA, November 2009,1-8.
    [45]A. Patwardhan, J. Parker, A. Joshi, etc. Secure routing and intrusion detection in ad hoc networks. In Proc. of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), Kauai Island, HI, USA, March 2005,191-199.
    [46]G. Theodorakopoulos and J. S. Baras. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications,24(2):318-328,2006.
    [47]G. Li, J. He and Y. Fu. Group-based intrusion detection system in wireless sensor networks. Com-puter Communications,31(18):4324-4332,2008.
    [48]A. Murali and M. Rao. A survey on intrusion detection approaches. In Proc. of the 1st International Conference on Information and Communication Technologies (ICICT 2005), Karachi, Pakistan, August 2005,233-240.
    [49]S. Raza, L. Wallgren and T. Voigt. SVELTE:Real-time intrusion detection in the Internet of Things. Ad hoc networks, 11(8):2661-2674,2013.
    [50]H. Sedjelmaci, Sidi M. Senouci and M. Feham. An efficient intrusion detection framework in cluster-based wireless sensor networks. Security and Communication Networks,6(10):1211-1224, 2013.
    [51]Y. Zhang, W. Lee and Y. Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networks,9(5):545-556,2003.
    [52]A. Abduvaliyev, A. K. Pathan and J. Zhou. On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials,15(3):1223-1237,2013.
    [53]M. Xie, S. Han, B. Tian, etc. Anomaly detection in wireless sensor networks:A survey. Journal of Network and Computer Applications,34(4):1302-1325,2011.
    [54]Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In Proc. of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Fairfax, VA, USA, October 2003,135-147.
    [55]W. Su, K. Chang and Y. Kuo. eHIP:An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Computer Networks,51(4):1151-1168,2007.
    [56]F. Bao, R. Chen, M. J. Chang and J. H. Cho. Trust-based intrusion detection in wireless sensor networks. In Proc. of the 2011 IEEE International Conference on Communications (ICC 2011), Kyoto, Japan, June 2011,1-6.
    [57]S. Gupta, R. Zheng and A. M. Cheng. ANDES:An anomaly detection system for wireless sensor networks. In Proc. of the 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS 2007), Pisa, Italy, October 2007,1-9.
    [58]Y. Li, and L. E. Parker. Intruder detection using a wireless sensor network with an intelligent mobile robot response. In Proc. of the 2008 IEEE Southeastcon, Huntsville, AL, USA, April 2008,37-42.
    [59]F. Santoso. A decentralised self-dispatch algorithm for square-grid blanket coverage intrusion de-tection systems in wireless sensor networks. In Proc. of the 2011 IEEE Vehicular Technology Con-ference (VTC2011-Fall), San Francisco, CA, USA, September 2011,1-5.
    [60]Y. Wang, X. Wang, B. Xie, etc. Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing,7(6):698-711,2008.
    [61]N. Nasser and Y. Chen. Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In Proc. of the 2007 IEEE International Conference on Communications (ICC 2007), Glasgow, Scotland, UK, June 2007,1154-1159.
    [62]R. Roman, J. Zhou and J. Lopez. Applying intrusion detection systems to wireless sensor networks. In Proc. of the 3rd IEEE Consumer Communications and Networking Conference (CCNC 2006), Las Vegas, NV, USA, January 2006,640-644.
    [63]J. Li and C. Lee. Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks. Computer Communications,29(8):1121-1132,2006.
    [64]I. Onat and A. Miri. An intrusion detection system for wireless sensor networks. In Proc. of the 2005 IEEE International Conference on Wireless And Mobile Computing, Networking And Com-munications (WiMob 2005), Montreal, Canada, August 2005,253-259.
    [65]D. Dallas, C. Leckie and K. Ramamohanarao. Hop-count monitoring:Detecting sinkhole attacks in wireless sensor networks. In Proc. of the 15th IEEE International Conference on Networks, Networking And Communications (ICON 2007), Adelaide, SA, Australia, November 2007,176-181.
    [66]S. Shin, T. Kwon and G. Jo. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Transactions on Industrial Informatics,6(4):744-757,2010.
    [67]B. Sun, X. Shan and K. Wu. Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Systems Journal,7(l):13-25,2013.
    [68]X. Fan and M. Zuo. Fault diagnosis of machines based on DS evidence theory. Part 1:DS evidence theory and its im-provement. Computer Communications,27(5):366-376,2006.
    [69]V. Krishnamurthy. How to schedule measurements of a noisy markov chain in decision making. IEEE Transactions on Information Theory,59(7):4440-4461,2013.
    [70]A. Hassanzadeh and R. Stoleru. On the optimality of cooperative intrusion detection for resource constrained wireless networks. Computers (?) Security,34:16-35,2013.
    [71]V. Shnayder, M. Hempstead, B. Chen, etc. Simulating the power consumption of large-scale sensor network applications. In Proc. of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, November 2004,188-200.
    [72]B. C. Villaverde, S. Rea and D. Pesch. InRout-A QoS aware route selection algorithm for industrial wireless sensor networks. Ad Hoc Networks,10(3):458-478,2012.
    [73]IETF. RPL:IPv6 Routing Protocol for Low-Power and Lossy Network. http://datatracker.ietf.org/doc/rfc6550/.
    [74]D. Qiao, S. Choi and K. G. Shin. Goodput analysis and link adaptation for IEEE 802.11 a wireless LANs. IEEE Transactions on Mobile Computing, 1(4):278-292,2002.
    [75]J. Kim, S. Kim, S. Choi and D. Qiao. CARA:Collision-aware rate adaptation for IEEE 802.11 WLANs. In Proc. of the 25th International Conference on Computer Communications (INFOCOM 2006), Barcelona, Catalunya, Spain, April 2006,1-11.
    [76]H. Xia, Z. Jia, X. Li, etc. Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7):2096-2114,2013.
    [77]J. Lopez, R. Roman, I. Agudo, and C. Femandez-Gago. Trust management systems for wireless sensor networks:Best practices. Computer Communications,33(9):1086-1093,2010.
    [78]Y. Yu, K. Li, W. Zhou, and P. Li. Trust mechanisms in wireless sensor networks:Attack analysis and countermeasures. Journal of Network and Computer Applications,35(3):867-880,2012.
    [79]M. Denko, T. Sun, I. Woungang, etc. A trust management scheme for enhancing security in pervasive wireless networks. In Proc. of the 2009 IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, November 2009,1-6.
    [80]R. Akbani, T. Korkmaz, and G. Raju. A machine learning based reputation system for defending against malicious node behavior. In Proc. of the 2008 IEEE Global Telecommunications Confer-ence (GLOBECOM 2008), New Orleans, LA, USA, November 2008,1-5.
    [81]R. Feng, X. Xu, X. Zhou, and J. Wan. A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory. Sensors, 11(2):1345-1360,2011.
    [82]Y. Ren and A. Boukerche. Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks. In Proc. of the 2009 IEEE International Conference on Communica-tions (ICC 2009), Dresden, Germany, June 2009,5535-5539.
    [83]蔡绍滨,韩启龙,高振国,杨德森,赵靖.基于云模型的无线传感器网络恶意节点识别技术的研究.电子学报,40(11):2232-2238,2012.
    [84]S. Ganeriwal, L. K. Balzano and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN),4(3):867-880,2008.
    [85]X. Fan and M. Zuo. Fault diagnosis of machines based on D-S evidence theory." Part 1:D-S evi-dence theory and its improvement. Pattern Recognition Letters,27(5):366-376,2006.
    [86]M. Mahmoud and X. Shen. Trust-based and energy-aware incentive routing protocol for multi-hop wireless networks. In Proc. of the 2011 IEEE International Conference on Communications (ICC 2011), Kyoto, Japan, June 2011,1-5.
    [87]Y. Ren and A. Boukerche. Modeling and managing the trust for wireless and mobile ad hoc net-works. In Proc. of the 2008 IEEE International Conference on Communications (ICC 2008), Bei-jing, China, May 2011,2129-2133.
    [88]X. Li, F. Zhou and J. Du. LDTS:A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security,8(6):924-935,2013.
    [89]O. Khalid, Samee U. Khan, Sajjad A. Madani, etc. Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks,6(6):669-688,2013.
    [90]G. Pottie and W. Kaiser. Wireless integrated network sensors. Communications of the ACM, 43(5):51-58,2000.
    [91]F. Oliviero and S. Romano. A reputation-based metric for secure routing in wireless mesh networks. In Proc. of the 2008 IEEE Global Telecommunications Conference (GLOBECOM 2008), New Orleans, LA, USA, November 2008,1-5.
    [92]L. Abusalah, A. Khokhar and M. Guizani. NIS01-4:Trust aware routing in mobile ad hoc net-works. In Proc. of the 2006 IEEE Global Telecommunications Conference (GLOBECOM 2006), San Francisco, CA, USA, November 2006,1-5.
    [93]S. Zakhary and M. Radenkovic. Reputation-based security protocol for manets in highly mobile disconnection-prone environments. In Proc. of the 7th International Conference on Wireless Onde-mand Network Systems and Services, Kranjska Gora, Slovenia, February 2010,161-167.
    [94]K. Komathy and P. Narayanasamy. Trust-based evolutionary game model assisting AODV routing against selfishness. Journal of Network and Computer Applications,31(4):446-471,2008.
    [95]M. Naserian and K. Tepe. Game theoretic approach in routing protocol for wireless ad hoc net-works. Ad Hoc Networks,7(3):569-578,2009.
    [96]R. Zhang, J. Shi, Y. Zhang and J. Sun. Secure cooperative data storage and query processing in unattended tiered sensor networks. IEEE Journal on Selected Areas in Communications,30(2):433-441,2012.
    [97]C. Kamhoua, N. Pissinou and K. Makki. Game theoretic modeling and evolution of trust in au-tonomous multi-hop networks:Application to network security and privacy. In Proc. of the 2011 IEEE International Conference on Communications (ICC 2011), Kyoto, Japan, June 2011,1-6.
    [98]Y. L. Sun, W. Yu, Z. Han and K. J. R. Liu. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications,24(2):305-317,2006.
    [99]J. Cho, A, Swami and R. Chen. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys (?) Tutorials,13(4):562-583,2011.
    [100]W. J. Adams, G. C. Hadjichristofi and N. J. Davis. Calculating a node's reputation in a mobile ad hoc network. In Proc. of the International Performance Computing and Communications Confer-ence, Phoenix, AX, USA, April 2005,303-307.
    [101]L. Capra. Toward a human trust model for mobile ad-hoc networks. In Proc. of the 2nd UK-UbiNet Workshop, Cambridge University, Cambridge, UK, May 2004,1-2.
    [102]J. Duan, Y. Qin, S. Zhang, etc. Issues of trust management for mobile wireless sensor networks. In Proc. of the 7th International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China, September 2011,1-4.
    [103]G. Szab6 and C. TSke. Evolutionary prisoner's dilemma game on a square lattice. Physical Review E,58(1):69-74,1998.
    [104]R. Axelrod. The evolution of strategies in the iterated prisoner's dilemma. In Proc. of the Genetic Algorithms and Simulated Annealing, Los Altos, CA, USA, April 1987,32-41.
    [105]G. Szabo J. Vukov and A. Szolnoki. Phase diagrams for an evolutionary prisoner's dilemma game on two-dimensional lattices. IEEE Transactions on Mobile Computing,72(4):1-4,2005.
    [106]H. Ishibuchi, H. Ohyanagi and Y. Nojima. Evolution of strategies with different representation schemes in a spatial iterated prisoner's dilemma game. IEEE Transactions on Computational Intel-ligence and AI in Games,3(l):67-82,2011.
    [107]K. Fall and K. Varadhan. The ns Manual. The VINT project,1(1),2002.
    [108]X. Yang, D. Wetherall and T. Anderson. TVA:A DoS-limiting network architecture. IEEE/ACM Transactions on Networking,16(6):1267-1280,2008.
    [109]I. D. Chakeres and L. Klein-Berndt. AODVjr, AODV simplified. ACM SIGMOBILE Mobile Com-puting and Communications Review,6(3):100-101,2002.
    [110]Q. Zhang and D. Han. A new bayesian based trust model for ad hoc networks. Energy Procedia, 13(1):5337-5344,2011.
    [111]T. Ryutov and C. Neuman. Trust based approach for improving data reliability in industrial sensor networks. Trust Management,238(l):349-365,2007.
    [112]L. Yeh, Y. Chen and J. Huang. ABACS:An attribute-based access control system for emergency services over vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications, 29(3):630-643,2011.
    [113]P. Samarati and S. de Vimercati. Access control:Policies, models, and mechanisms. Foundations of Security Analysis and Design,137-196,2001.
    [114]W. Xiaopeng, L. Junzhou, S. Aibo and M. Teng. Semantic access control in grid computing. In Proc. of the 11th International Conference on Parallel and Distributed Systems, Fukuoka, Japan, July 2005,661-667.
    [115]H. Tran, M. Hitchens, V. Varadharajan and P. Watters. A trust based access control framework for P2P file-sharing systems. In Proc. of the 38th Annual Hawaii International Conference on System Sciences, Waikoloa, HI, USA, January 2005,302c-302c.
    [116]R. Yang, C. Lin, Y. Jiang and X. Chu. Trust based access control in infrastructure-centric environ-ment.In Proc. of the 2011 IEEE International Conference on Communications (ICC 2011, Kyoto, Japan, June 2011,1-5.
    [117]L. Abusalah, A. Khokhar and M. Guizani. A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & (?) Tutorials,10(4):78-93,2008.
    [118]S. Zhong and F. Wu. A collusion-resistant routing scheme for noncooperative wireless ad hoc networks. IEEE/ACM Transactions on Networking,18(2):582-595,2010.
    [119]B. Patel and D. Jinwala. Exploring homomorphic encryption in wireless sensor networks. Infor-matics Engineering and Information Science,400-408,2011.
    [120]S. yu, K. Ren and W. Lou. FDAC:Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,22(4):673-686,2011.
    [121]S. Misra and A. Vaish. Reputation-based role assignment for role-based access control in wireless sensor networks. Computer Communications,34(3):281-294,2011.
    [122]H. Luo, J. Kong, P. Zerfos, S. Lu, etc. URSA:Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking,12(6):1049-1063,2004.
    [123]Y. Zhou, Y. Zhang and Y. Fang. Access control in wireless sensor networks. Ad Hoc Networks, 5(1):3-13,2007.
    [124]T. Melodia, I. F. Akyildiz. Cross-layer QoS-aware communication for ultra wide band wireless multimedia sensor networks. IEEE Journal on Selected Areas in Communications,28(5):653-663, 2010.
    [125]S. Oh, G. Marfia and M. Gerla. MANET QoS support without reservations. Security and Commu-nication Networks,4(3):316-328,2011.
    [126]R. S. Sandhu. Lattice-based access control models. Computer,26(11):9-19,1993.
    [127]R. S. Sandhu and P. Samarati. Access control:Principle and practice. IEEE Communications Mag-azine,32(9):40-48,1994.
    [128]R. Sandhu, E. Coyne, H. Feinstein and C. Youman. Role-based access control models. Computer, 29(2):38-47,1996.
    [129]D. Ferraiolo and R. Kuhn. Role-based access control. In Proc. of the 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, USA, October 1992,554-563.
    [130]D. Ferraiolo, R. Sandhu, S. Gavrila, etc. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security,4(3):224-274,2001.
    [131]R. Zhang, Y. Zhang and K. Ren. DP2AC:Distributed privacy-preserving access control in sensor networks. In Proc. of the 28th International Conference on Computer Communications (INFOCOM 2009), Toronto, Canada, April 2009,1251-1259.
    [132]M. Li, W. Lou and K. Ren. Data security and privacy in wireless body area networks. Wireless Communications,17(1):51-58,2010.
    [133]D. He, J. Bu, S. Zhu, etc. Distributed privacy-preserving access control in a single-owner multi-user sensor network. In Proc. of the 30th International Conference on Computer Communications (INFOCOM 2011), Shanghai, China, April 2011,331-335.
    [134]B. Panja, S. Madria and B. Bhargava. A role-based access in a hierarchical sensor network archi-tecture to provide multilevel security. Computer Communications,31(4):793-806,2008.
    [135]S. Chakraborty and I. Ray. TrustBAC:Integrating trust relationships into the RBAC model for access control in open systems. In Proc. of the 11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA, June 2006,49-58.
    [136]F. Almenarez, A. Marin, D. Diaz and J. Sanchez. Developing a model for trust management in per-vasive devices. In Proc. of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCOM 2006), Pisa, Italy, March 2006,5-9.
    [137]C. Zhang, X. Zhu, Y. Song and Y. Fang. A formal study of trust-based routing in wireless ad hoc networks. In Proc. of the 29th International Conference on Computer Communications (INFOCOM 2010), San Diego, CA, USA, March 2010,1-9.
    [138]VR S. Dhulipala, N. Karthik and R. Chandrasekaran. A novel heuristic approach based trust wor-thy architecture for wireless sensor networks. Wireless Personal Communications,70(1):189-205, 2013.
    [139]D. He, C. Chen, S. Chan and J. Bu. ReTrust Attack-resistant and lightweight trust manage-ment for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4):623-632,2012.
    [140]A. Boukerche and X. Li. Trust based access control in infrastructure-centric environment. In Proc. of the 2005 IEEE Global Telecommunications Conference 2005 (GLOBECOM 2005), St. Louis, MI, USA, November 2005,1857-1861.
    [141]Y. Asnar, P. Giorgini, F. Massacci and N. Zannone. From trust to dependability through risk analy-sis. In Proc. of the 2nd International Conference on Availability, Reliability and Security, Austria, April 2007,19-26.
    [142]N. Dimmock, A. Belokosztolszki, D. Eyers, etc. Using trust and risk in role-based access control policies. In Proc. of the 9th ACM Symposium on Access Control Models and Technologies, New York, USA, June 2004,156-162.
    [143]V. Karyotis, S. Papavassiliou and M. Grammatikou. On the risk-based operation of mobile attacks in wireless ad hoc networks. In Proc. of the 2007 IEEE International Conference on Communica-tions (ICC 2007), Glasgow, Scotland, June 2007,1130-1135.
    [144]J. Luo, X. Ni and J. Yong. A trust degree based access control in grid environments. Information Sciences,179(15):2618-2628,2009.
    [145]D. A. Tran and H. Raghavendra. Congestion adaptive routing in mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems,17(11):1294-1305,2006.
    [146]H.-X. Tan, M.-C. Chan, W. Xiao, etc. Information quality aware routing in event-driven sensor networks. In Proc. of the 2010 IEEE INFOCOM, San Diego, CA, USA, March 2010,1-9.
    [147]L. Liu, Y. Song, H. Ma and X. Zhang. Physarum optimization:A biology-inspired algorithm for minimal exposure path problem in wireless sensor networks. In Proc. of the 2012 IEEE INFOCOM, Orlando, FL, USA, March 2012,1296-1304.
    [148]S. Paris, C. Nita-Rotaru, F. Martignon and A. Capone. EFW:A cross-layer metric for reliable routing in wireless mesh networks with selfish participants. In Proc. of the 2011 IEEE INFOCOM, Shanghai, China, April 2011,576-580.
    [149]S. Buchegger and J.-Y. Le Boudec. Performance analysis of the CONFIDANT protocol. In Proc. of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, June 2002,226-236.
    [150]J. J. Garcia-Luna-Aceves and M. Spohn. Source-tree routing in wireless networks. In Proc. of the 7th International Conference on Network Protocols, Toronto, Canada, October 1999,273-282.
    [151]G. Zhan, W. Shi and J. Deng. Design and implementation of TARF:A trust-aware routing frame-work for WSNs. IEEE Transactions on Dependable and Secure Computing,9(2):184-197,2012.
    [152]A. A. Pirzada, C. McDonald and A. Datta. Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing,5(6):695-710,2006.
    [153]X. Li, Z. Jia, P. Zhang, etc. Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security,4(4):212-232,2010.
    [154]M. G. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proc. of the 1st ACM workshop on Wireless security, Atlanta, GA, USA, September 2002,1-10.
    [155]D. Cerri and A. Ghioni. Securing AODV:The A-SAODV secure routing prototype. IEEE Commu-nications Magazine,46(2):120-125,2008.
    [156]J. Cordasco and S. Wetzel. Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science,197(2):131-131,2008.
    [157]P. Narula, S. K. Dhurandher, S. Misra and I. Woungang. Security in mobile ad-hoc networks us-ing soft encryption and trust-based multi-path routing. Computer Communications,31(4):760-769, 2008.
    [158]K.-S. Hung, K.-S. Lui and Y.-K. Kwok. A trust-based geographical routing scheme in sensor net-works. In Proc. of the 2007 IEEE Wireless Communications and Networking Conference (WCNC 2007), Hong Kong, China, March 2007,3123-3127.
    [159]M. Almasri, K. Elleithy, A. Bushang and R. Alshinina. TERP:A trusted and energy efficient routing protocol for wireless sensor networks. In Proc. of the 2013 IEEE/ACM 17th International Sympo-sium on Distributed Simulation and Real Time Applications, Delft, Netherlands, October 2013, 207-214.
    [160]M. Mohi, A. Movaghar and P. M. Zadeh. A Bayesian game approach for preventing DoS attacks in wireless sensor networks. In Proc. of the 2009 IEEEInternational Conference on Communications and Mobile Computing, Leipzig, Germany, June 2009,507-511.
    [161]C. Karlof and D. Wagner. Secure routing in wireless sensor networks:Attacks and countermea-sures. Ad hoc networks, 1(2):293-315,2003.
    [162]K. Ren, T. Li, Z. Wan, etc. Highly reliable trust establishment scheme in ad hoc networks. Com-puter Networks,45(6):687-699,2004.
    [163]T. Zahariadis, P. Trakadas, H. C. Leligou, etc. A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications,69(2):805-826,2013.
    [164]Y. Sun, Z. Han, W. Yu and K. Liu. A trust evaluation framework in distributed networks:Vul-nerability analysis and defense against attacks. In Proc. of the 2006 IEEE INFOCOM, Barcelona, Catalunya, Spain, April 2006,1-13.
    [165]B. Karp and H.-T. Kung. GPSR:Greedy perimeter stateless routing for wireless networks. In Proc. of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, August 2000,243-254.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700