| Literature DB >> 26907277 |
Lianggui Liu1, Li Chen2, Huiling Jia3.
Abstract
In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation. This challenging social milieu oriented routing with more than one end-to-end Quality of Trust (QoT) constraint has proved to be NP-complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this challenging problem. However, existing solutions cannot guarantee the efficiency of searching; that is, they can hardly avoid obtaining partial optimal solutions during a searching process. Quantum annealing (QA) uses delocalization and tunneling to avoid falling into local minima without sacrificing execution time. This has been proven a promising way to many optimization problems in recently published literatures. In this paper, for the first time, with the help of a novel approach, that is, configuration path-integral Monte Carlo (CPIMC) simulations, a QA-based optimal social trust path (QA_OSTP) selection algorithm is applied to the extraction of the optimal social trust path in large-scale WSNs. Extensive experiments have been conducted, and the experiment results demonstrate that QA_OSTP outperforms its heuristic opponents.Entities:
Keywords: WSNs; quality of trust; quantum annealing; quantum tunneling; social milieu oriented routing
Year: 2016 PMID: 26907277 PMCID: PMC4801623 DOI: 10.3390/s16020247
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 2An example of WSNs (w = 0.6, w = 0.4).
Possible social trust path and corresponding state vector in Figure 2.
|
| Social Trust Path | State Vector | Utility |
|---|---|---|---|
|
| 1—2—4 |
| 0.616 |
|
| 1—3—4 |
| 0.384 |
|
| Invalid path |
| Invalid |
|
| Invalid path |
| Invalid |
Notations used in QA_OSTP.
| Social graph of WSNs with two QoT parameters | |
| Trustor node | |
| Target trustee node | |
|
| Utility of a social trust path configuration |
| The number of replicas | |
| Temperature parameter | |
| Optimal initial temperature | |
| Transverse field | |
| An initial value of the transverse field | |
| Fixed number of nearest neighbors of participant | |
|
| Sequence number of a certain replica |
| Number of nodes in WSNs | |
| The series number of replica | |
|
| Total CPIMC time |
| Maximum number of CPIMC steps | |
| Number of iterations | |
|
| A social trust path configuration |
|
| A series of |
|
| Neighbor of configuration |
|
| Trust constraint of social trust path |
|
| Recommendation degree constraint of social trust path |
Figure 3Comparison of path utilities of networks.
Figure 4Comparison of execution time of algorithms.