基于信任管理的无线传感器网络容错技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络(Wireless Sensor Network, WSN)是由部署在监控区域大量微型、低成本的智能传感器节点,利用无线通信信道,通过多跳自组织方式构成的网络系统。
     传感器节点硬件结构简单且能量有限,通常部署环境恶劣且无人值守,加上无线信道本身的不可靠,导致网络经常出现通信链路断开、节点损坏或者能量耗尽等故障,造成传感器采集的数据不能正确反映事件发生区域真实的情况。同时,网络可能会受到恶意节点的攻击,或者传感器节点软件问题,也会造成采集的数据错误。对于以数据为中心的无线传感器网络,网络的容错性和可靠性的研究显得尤为重要。
     本文针对无线传感器网络缺乏信任管理机制,提出一种基于节点信誉度的信任管理机制,该机制的核心思想是:考虑到传感器节点采集的数据不仅与节点本身的历史数据有关,还与领域内其他传感器节点采集的数据有关,根据相似度矩阵得出数据信任度,计算可用的通信带宽和剩余能量分别得出带宽和能量的信誉度。综合无线传感器网络传感器节点的数据、带宽和能量三方面的信誉度建立信任模型,并将该信任模型引入到无线传感器网络管理体系中,此时网络组建和节点各种行为都以可信度为依据。接着将该信任管理机制引入到传感器节点的事件检测中,并提出一种节点信誉度的容错事件检测算法NCFTED(Nodes Credit Fault-Tolerant Event Detection),该算法的主要思想是:当传感器检测到异常数据时,根据故障节点排除算法FNE(Fault Nodes Exclude)对故障节点进行排除;利用事件区域节点的信任等级进行簇头的选择,分析得出多跳的方式比单跳的方式更节省能量,特别对于簇头节点和离簇头较远的节点,簇内和簇间的通信尽可采用多跳的方式,最终将数据发送给基站。
     文章首先叙述了本课题研究的前景和意义,简要的描述无线传感器网络应用前景,并对目前无线传感器网络存在的问题进行了分析。详细地介绍了当前无线传感器网络的信任管理机制和容错技术的国内外研究现状以及无线传感器网络的体系结构和基本特征。通过对节点信誉度的计算得出节点信任度评估模型,并将此模型引入到事件检测的容错技术中;其次,文章利用NS2网络仿真平台,对NCFTED算法进行仿真,该算法只需收集一次邻居节点的传感的数据,就可以检测到非正常的数据,通过简单的计算便可将故障节点进行排除。仿真分析出该算法识别率高,误检率和误报率低,计算复杂度低,拟合度高,由于簇的建立只在检测到有异常数据时进行,所以网络的通信量小,对大规模网络具有很好的可扩展性。
Wireless Sensor Network (WSN) is a network system which is composed by a large number of miniature and low-cost intelligent sensor nodes deployed in monitoring area by using wireless communication channel through multi-hop self-organizing mode.
     The hardware structure of the sensor nodes is simple and has finite energy. Because the sensor nodes are usually deployed in rugged and unattended environments and the wireless channel itself is not reliable, all these lead to the frequent breakdowns of the network such as communication link disconnection, nodes damage or energy exhaustion, which brings that the data collected by the sensor network can not reflect the real situation of the area in which the events have occurred. Meanwhile, the network may be attacked by malicious nodes or the problems of the software of the sensor nodes may lead to collected data errors. To the data-centric wireless sensor networks, it is very necessary to carry on research on fault tolerance and reliability of the network.
     Due to the lack of trust management mechanism of WSN, this thesis proposes a trust management mechanism based on a kind of the credibility of the nodes. The core idea of this mechanism is to take into account the data collected by sensor nodes not only correlated on the node itself but also with other sensor nodes data within the field, by obtaining the data confidence level according to the similarity matrix, to calculate the available correspondence bandwidth and the excess energy and obtain the bandwidth and energy credit. Then the trust model is built by the credibility of the data, bandwidth and energy of the sensor nodes in wireless sensor network and the model is introduced to the management system, all the behaviors of the network building and the nodes are based on the credibility.
     Subsequently, the trust management system is introduced to the event detection of the sensor nodes and an algorithm of NCFTED (Nodes Credit Fault-Tolerant Event Detection) is proposed. The main idea of this algorithm is that when the sensors detect abnormal data, the failed nodes are excluded according to FNE (Fault Nodes Exclude) and the cluster heads established under a trust environment, are selected by taking advantages of the trust rank of the nodes in this field. By analyzing, A multi-hop mode can save more energy than that of single-hop. Specially for the nodes of the cluster head or the ones far from them, The multi-hop mode should be adopted as far as possible to communicate between inside and outside of the clusters and transmit the data to the base stations.
     In this thesis, the prospect and significance of this research was firstly narrated and the promising applications together with the problems of current wireless sensor network were analyzed. It also simply described the application prospect of wireless sensor network in detail and the current research status of trust management mechanism with fault-tolerant technology both at home and abroad, and the structure and basic features of current wireless sensor networks. The trust evaluation model of the nodes was obtained by calculating the credibility of them and it was introduced into the fault-tolerant detection technology.
     Secondly, this thesis emulated the algorithm NCFTED, which can detect abnormal data by collecting the sensor data of the neighboring nodes only for one time and exclude the failed nodes by simple calculation though NS2 network emulation platform. The emulation had figured out that the algorithm had a high rate of identification, low rate of false detection and alarm, low computational complexity and high fitting degree. Because the establishment of the clusters can only be conducted when the abnormal data is detected, the communication traffic of the network is very little and the clusters have the best expansibility in the large-scale networks.
引文
[1]宁新鲜.无线传感器网络的容错拓扑控制算法研究[D].长沙:中南大学.2009
    [2]孙利民,李建中.无线传感器网络[M].北京:清华大学出版社,2005
    [3]任绘锦.无线传感器网络可靠性应用及其关键技术研究[D].杭州:浙江大学.2006.
    [4]R. Laeoss, R. Walton. Strawman design for a DSN to detect and track low flying aircraft. In:Proc. Distributed Sensor Nets Conf, Carnegie-Mellon Univ., Pittsburgh PA,1978,41-52
    [5]Wade R, Mitchell W M,Petter F.Ten Emerging Technologies that Will Change the World, Technol Rev,2003,106(1):22-49.
    [6]李桂丹.无线传感器网络路由协议及容错事件边界检测研究[D].天津:天津大学.2009
    [7]Bao L, Garcia-Luna-Aceves J J, Topology management in ad hoc networks[J]. In:Proc 4th ACM Int'1 SymP on Mobile Ad hoc Networking&Computing(MobiHoc 2003), Annapolis,2003:129-140
    [8]Chessa S, Santi P. Comparison based system level fault diagnosis in Ad hoc networks [C]//Proc of IEEE 20th Symp on Reliable Distributed Systems(SRDS). New Orleans: IEEE Press,2001:257-266.
    [9]李桂丹,孙雨耕等.分布式无线传感器网络容错事件边界检测[J].计算机工程与应用,2009,45(17):28-32
    [10]肖伟,徐明.具有能量效率的容错多事件簇[J].计算机工程与应用,2010,46(2):14-18
    [11]赵强利,蒋艳凰,徐明.无线传感器网络路由协议的分析与比较[J].计算机科学,2009,36(2):35-41
    [12]张学,陆桑璐,陈贵海等.无线传感器网络的拓扑控制[J].软件学报,2007,18(4):943-953
    [13]黄晓,程宏兵,杨庚.无线传感器网络覆盖连通性研究[J].通信学报,2009,30(2):129-135
    [14]廉三成.无线传感器网络容错目标检测算法研究[D].西南交通大学,2005
    [15]陈颖文,徐明,虞万荣.无线传感器网络的容错问题与研究进展[J].计算机工程与科学,2008,30(2):87-91
    [16]李铁山.传感器网络中容错路由算法研究[D].长沙:湖南大学.2009
    [17]王潮,贾翔宇,林强.基于可信度的无线传感器网络安全路由算法[J].通信学报,2008,29(11):105-112.
    [18]Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A. Secure locations:routing on trust and isolating compromised sensors in location-aware sensor networks. In:Proc. of the SenSys 2003. New York:ACM Press,2003.324-325.
    [19]Krasniewski MD, Varadharajan P, Rabeler B, Bagchi S, Hu YC. TIBFIT:Trust index based fault tolerance for ability data faults in sensor. In:Werner B, ed. Proc. of the Int'1 Conf. on Dependable Systems and Networks (DSN). Piscataway: IEEE Computer Society,2005.672-681.
    [20]张留敏,李腊元,李春林.一种基于主观逻辑的无线传感器网络可信路由算法[J].武汉理工大学学报,2009,33(1):75-78.
    [21]朱程,周鸣争,许金生.BTSR:一种基于行为可信的安全数据融合与路由算法[J].计算机应用,2008,28(11):2820-2823.
    [22]闵应骅.容错计算二十五年[J].计算机学报,1995,18(12):930-943.
    [23]陈颖文,徐明,虞万荣.无线传感器网络的容错问题与研究进展[J].计算机工程与科学,2008,30(2).
    [24]Bin Hao, Jian Tang, Guoliang Xue. Fault-Tolerant Relay Node Placement in Wireless Sensor Networks:Formulation and Approximation[C]//Proc of the IEEE Workshop on High Performance Switching and Routing,2004:2462250.
    [25]Chi-Fu Huang, Yu-Chee Tseng. The Coverage Problem in a Wireless Sensor Network[C] //Proc of t he ACM Int'1 Workshop on Wireless Sensor Networks and Applications 2003:115-121.
    [26]江贺,务志坤,张宪超.一种容错的无线传感器网络聚类路由协议[J].小型微型计算机系统,2007,8(8).
    [27]邵清,丁永生,胡志华,魏赞.延迟容忍网络中路径失效问题的容错研究[J].计算机工程与应用,2009,45(10):102-105
    [28]HEINZELMAN W, CHANDRAKASAN A, BALAKRISHNAN H. An application-specific protocol architecture for wireless microsensor networks[J]. IEEE Transactions on Wireless Communications,2002,1(4):660-670.
    [29]冯凯.基于信任管理的无线传感器网络可信模型研究[D].武汉理工大学,2009
    [30]林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758.
    [31]刘敏华,萧德云.基于相似度的多传感器数据融合[J].控制与决策,2004,19(5):534-537.
    [32]RICHARDSON JM, MARSH K A. Fusion of multi-sensor data[J]. The International Journal of Robotics Research,1988,7 (6):78-96.
    [33]Sinha A, Chandrakasan A, Dynamic Power Management in Wireless Sensor Networks, IEEE Design&Test of Computers,2001,18(2):62-74.
    [34]QI X, AURA G. Ad hoc QoS on-demand routing(AQOR) in mobile ad hoc networks[J]. Journal of Parallel and Distributed Computing,2003,63(12):154-165.
    [35]何美红,许成谦,张东良.基于NS2的LEACH协议仿真与分析[J].电子测量技术,2009,32(1):40-43.
    [36]黄静,许力,林力伟.基于可信度LEACH拓扑算法改进[J].福建电脑,2009,9:6-10.
    [37]Li C, Liang C, A Fault-Tolerant Event Boundary Detection Algorithm in Sensor Networks,Lecture Notes in Computer Science(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Estoril, Portugal,2008,406-414.
    [38]徐雷鸣,庞博,赵耀等.NS与网络模拟[M].人民邮电出版社,2003

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700