ISSN 0253-2778

CN 34-1054/N

Open AccessOpen Access JUSTC Original Paper

Data reliable assurance model of Internet of Things based on the trust evaluation of perceived source

Cite this:
https://doi.org/10.3969/j.issn.0253-2778.2017.04.003
  • Received Date: 28 August 2016
  • Rev Recd Date: 08 December 2016
  • Publish Date: 30 April 2017
  • In order to solve the source reliability problem of Big Data in the Internet of Things, a data reliable assurance model of Internet of Things based on the trust evaluation of perceived source was constructed with the evaluation unit, and each evaluation unit includes three categories, including the work node, the companion node and the decision node. The working nodes which are aware of the same kind of index can be used as the basis for calculating the value of each other’s trust. The companion nodes and decision nodes are used to monitor the status of the working nodes. The companion nodes are used to verify the data of the working nodes regularly, so as to determine the status of the working nodes. The decision node is used when the working node is suspected to be abnormal so as to give the final result. Through the data collection and validation of the above three kinds of nodes, a method for calculating and adjusting the reliability of nodes was presented, which was used to obtain the trust value of each working node. Then, according to the given threshold value, the trust list was constructed, and the non-trusted nodes removed, and only the data perceived by the trusted node gets transmited and processed. At the same time, in order to ensure the initial reliability of the sensor node, the access authentication mechanism is introduced. From the results of theoretical analysis and simulation, the model has the characteristics of reliable node sensing data and flexible expansion, and can effectively improve the reliability of the data source of the Internet of Things.
    In order to solve the source reliability problem of Big Data in the Internet of Things, a data reliable assurance model of Internet of Things based on the trust evaluation of perceived source was constructed with the evaluation unit, and each evaluation unit includes three categories, including the work node, the companion node and the decision node. The working nodes which are aware of the same kind of index can be used as the basis for calculating the value of each other’s trust. The companion nodes and decision nodes are used to monitor the status of the working nodes. The companion nodes are used to verify the data of the working nodes regularly, so as to determine the status of the working nodes. The decision node is used when the working node is suspected to be abnormal so as to give the final result. Through the data collection and validation of the above three kinds of nodes, a method for calculating and adjusting the reliability of nodes was presented, which was used to obtain the trust value of each working node. Then, according to the given threshold value, the trust list was constructed, and the non-trusted nodes removed, and only the data perceived by the trusted node gets transmited and processed. At the same time, in order to ensure the initial reliability of the sensor node, the access authentication mechanism is introduced. From the results of theoretical analysis and simulation, the model has the characteristics of reliable node sensing data and flexible expansion, and can effectively improve the reliability of the data source of the Internet of Things.
  • loading
  • [1]
    International Telecommunication Union. Internet reports 2005: The Internet of Things[R]. 7ed, Geneva: ITU, 2005.
    [2]
    范存群,王尚广,孙其博,等.基于能量监测的传感器信任评估方法研究[J]. 电子学报, 2013, 41(4): 646-651.
    FAN Cunqun, WANG Shangguang, SUN Qibo, et al. A trust evaluation method of sensors based on energy monitoring[J]. Acta Electronica Sinica, 2013, 41(4): 646-651.
    [3]
    HE D J, CHEN C, CHAN S, et al. A distributed trust evaluation model and its application scenarios for medical Sensor networks[J]. IEEE Transaction on Information Technology in Biomedicine, 2012, 16(6): 1164-1175.
    [4]
    SICARI S, RIZZARDI A, GRIECO L A, et al. Security, privacy and trust in Internet of Things: The road ahead[J]. Computer Networks, 2015, 76: 146-164.
    [5]
    ZHANG B, HUANG Z H, XIANG Y. A novel multiple-level trust management framework for wireless sensor networks[J]. Computer Networks, 2014, 72: 45-61.
    [6]
    CHENG S Y, LI J Z, CAI Z P. O(ε)-approximation to physical world by sensor networks[C]// Proceedings of IEEE INFOCOM’13.Piscataway, USA: IEEE Press, 2013: 3084-3092.
    [7]
    DONG X L, BERTI-EQUILLE L, SRIVASTAVA D. Truth discovery and copying detection in a dynamic world[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 562-573.
    [8]
    余伟, 李石君, 杨莎, 等. Web大数据环境下的不一致跨源数据发现[J]. 计算机研究与发展, 2015, 52(2): 295-308.
    YU Wei, LI Shijun, YANG Sha, et al. Automatically discovering of inconsistency among cross-source Data based on Web big Data[J]. Journal of Computer Research and Development, 2015, 52(2): 295-308.
    [9]
    张安珍,门雪莹,王宏志,等.大数据上基于Hadoop的不一致数据检测与修复算法[J]. 计算机科学与探索, 2015, 9(9): 1044-1055.
    [10]
    金连,王宏志,黄沈滨,等.基于Map-Reduce的大数据缺失值填充算法[J]. 计算机研究与发展, 2013, 50: 312-321.
    [11]
    罗元剑,姜建国,王思叶,等.基于有限状态机的RFID流数据过滤与清理技术[J].软件学报, 2014, 25(8): 1713-1728.
    LUO Yuanjian, JIANG Jianguo, WANG Siye, et al. Filtering and cleaning for RFID streaming Data technology based on finite state machine[J]. Journal of Software, 2014, 25(8): 1713-1728.
    [12]
    陈振国,田立勤. 信任模型在雾霾感知源评价中的应用[J].计算机应用, 2016, 36(2): 472-477.
    CHEN Zhenguo, TIAN Liqin. Application of trust model in evaluation of haze perception source[J]. Journal of Computer Applications, 2016, 36(2): 472-477.
    [13]
    罗涛,李俊涛,刘瑞娜,等.VANET中安全信息的快速可靠广播路由算法[J].计算机学报, 2015, 38(3): 663-672.
    LUO Tao, LI Juntao, LIU Ruina, et al. A fast and reliable broadcast routing algorithm for safety related information in VANET[J]. Chinese Journal of Computers, 2015, 38(3): 663-672.
    [14]
    田立勤,林闯, 张琪,等.物联网监测拓扑可靠性设计与优化分析[J].软件学报, 2014, 25(8): 1625-1639.
    TIAN Liqin, LIN Chuang, ZHANG Qi, et al. Topology reliability design and optimization analysis of IoT-based monitoring[J]. Journal of Software, 2014, 25(8): 1625-1639.
    [15]
    钟晓睿,马春光.基于动态累加器的异构传感网认证组密钥管理方案[J]. 通信学报, 2014, 35(3): 124-134.
    ZHONG Xiaorui, MA Chunguang. Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network[J]. Journal on Communications, 2014, 35(3): 124-134.
  • 加载中

Catalog

    [1]
    International Telecommunication Union. Internet reports 2005: The Internet of Things[R]. 7ed, Geneva: ITU, 2005.
    [2]
    范存群,王尚广,孙其博,等.基于能量监测的传感器信任评估方法研究[J]. 电子学报, 2013, 41(4): 646-651.
    FAN Cunqun, WANG Shangguang, SUN Qibo, et al. A trust evaluation method of sensors based on energy monitoring[J]. Acta Electronica Sinica, 2013, 41(4): 646-651.
    [3]
    HE D J, CHEN C, CHAN S, et al. A distributed trust evaluation model and its application scenarios for medical Sensor networks[J]. IEEE Transaction on Information Technology in Biomedicine, 2012, 16(6): 1164-1175.
    [4]
    SICARI S, RIZZARDI A, GRIECO L A, et al. Security, privacy and trust in Internet of Things: The road ahead[J]. Computer Networks, 2015, 76: 146-164.
    [5]
    ZHANG B, HUANG Z H, XIANG Y. A novel multiple-level trust management framework for wireless sensor networks[J]. Computer Networks, 2014, 72: 45-61.
    [6]
    CHENG S Y, LI J Z, CAI Z P. O(ε)-approximation to physical world by sensor networks[C]// Proceedings of IEEE INFOCOM’13.Piscataway, USA: IEEE Press, 2013: 3084-3092.
    [7]
    DONG X L, BERTI-EQUILLE L, SRIVASTAVA D. Truth discovery and copying detection in a dynamic world[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 562-573.
    [8]
    余伟, 李石君, 杨莎, 等. Web大数据环境下的不一致跨源数据发现[J]. 计算机研究与发展, 2015, 52(2): 295-308.
    YU Wei, LI Shijun, YANG Sha, et al. Automatically discovering of inconsistency among cross-source Data based on Web big Data[J]. Journal of Computer Research and Development, 2015, 52(2): 295-308.
    [9]
    张安珍,门雪莹,王宏志,等.大数据上基于Hadoop的不一致数据检测与修复算法[J]. 计算机科学与探索, 2015, 9(9): 1044-1055.
    [10]
    金连,王宏志,黄沈滨,等.基于Map-Reduce的大数据缺失值填充算法[J]. 计算机研究与发展, 2013, 50: 312-321.
    [11]
    罗元剑,姜建国,王思叶,等.基于有限状态机的RFID流数据过滤与清理技术[J].软件学报, 2014, 25(8): 1713-1728.
    LUO Yuanjian, JIANG Jianguo, WANG Siye, et al. Filtering and cleaning for RFID streaming Data technology based on finite state machine[J]. Journal of Software, 2014, 25(8): 1713-1728.
    [12]
    陈振国,田立勤. 信任模型在雾霾感知源评价中的应用[J].计算机应用, 2016, 36(2): 472-477.
    CHEN Zhenguo, TIAN Liqin. Application of trust model in evaluation of haze perception source[J]. Journal of Computer Applications, 2016, 36(2): 472-477.
    [13]
    罗涛,李俊涛,刘瑞娜,等.VANET中安全信息的快速可靠广播路由算法[J].计算机学报, 2015, 38(3): 663-672.
    LUO Tao, LI Juntao, LIU Ruina, et al. A fast and reliable broadcast routing algorithm for safety related information in VANET[J]. Chinese Journal of Computers, 2015, 38(3): 663-672.
    [14]
    田立勤,林闯, 张琪,等.物联网监测拓扑可靠性设计与优化分析[J].软件学报, 2014, 25(8): 1625-1639.
    TIAN Liqin, LIN Chuang, ZHANG Qi, et al. Topology reliability design and optimization analysis of IoT-based monitoring[J]. Journal of Software, 2014, 25(8): 1625-1639.
    [15]
    钟晓睿,马春光.基于动态累加器的异构传感网认证组密钥管理方案[J]. 通信学报, 2014, 35(3): 124-134.
    ZHONG Xiaorui, MA Chunguang. Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network[J]. Journal on Communications, 2014, 35(3): 124-134.

    Article Metrics

    Article views (481) PDF downloads(235)
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return