| Literature DB >> 28350347 |
Zhenguo Chen1,2, Liqin Tian3, Chuang Lin4.
Abstract
In order to ensure the reliability and credibility of the data in wireless sensor networks (WSNs), this paper proposes a trust evaluation model and data fusion mechanism based on trust. First of all, it gives the model structure. Then, the calculation rules of trust are given. In the trust evaluation model, comprehensive trust consists of three parts: behavior trust, data trust, and historical trust. Data trust can be calculated by processing the sensor data. Based on the behavior of nodes in sensing and forwarding, the behavior trust is obtained. The initial value of historical trust is set to the maximum and updated with comprehensive trust. Comprehensive trust can be obtained by weighted calculation, and then the model is used to construct the trust list and guide the process of data fusion. Using the trust model, simulation results indicate that energy consumption can be reduced by an average of 15%. The detection rate of abnormal nodes is at least 10% higher than that of the lightweight and dependable trust system (LDTS) model. Therefore, this model has good performance in ensuring the reliability and credibility of the data. Moreover, the energy consumption of transmitting was greatly reduced.Entities:
Keywords: data fusion; sensor data; trust evaluation model; wireless sensor networks
Year: 2017 PMID: 28350347 PMCID: PMC5421663 DOI: 10.3390/s17040703
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The trust evaluation model.
Figure 2Update of the trust list.
Figure 3The process of data fusion.
Parameter values of the simulation environment.
| Parameter | Value | Parameter | Value |
|---|---|---|---|
| Number of Nodes | 20 | Number of Rounds | 3 |
| Nodes Distribution | 200 m × 200 m | Time per Round | 90 time units |
| Number of Cluster Head | 3 | Number of Frames per Round | 5 |
| Initial Energy of Node | 0.2 J | Sim-Time-Limit | 200 s |
Parameter values of trust model.
| Parameter | Value | Parameter | Value |
|---|---|---|---|
| 100 | 5 | ||
| (0.2, 0.5) | (0.4, 0.6) | ||
| (0.2, 0.3, 0.5) | (70, 80) | ||
| (70, 80) | 1.1 | ||
| 1.1 | (0.3, 0.3, 0.4) | ||
| (0.5, 0.5) | (70, 80) | ||
| 0, 1, 2 | - | - |
Figure 4Node distribution and topological graph. (a) The graph of node distribution; (b) Topological graph of round 1; (c) Topological graph of round 2; (d) Topological graph of round 3.
Cluster heads and nodes within a cluster in each round.
| Round | Cluster Heads (Index) | Node in the Cluster (Index) |
|---|---|---|
| 1 | 1 | 7, 9, 13, 16 |
| 2 | 0, 3, 5, 6, 11, 12, 14, 17 | |
| 8 | 4, 10, 15, 18, 19 | |
| 2 | 0 | 3, 5, 6, 9, 11, 12, 17 |
| 1 | 13, 16 | |
| 15 | 7, 8, 10, 18, 19 | |
| 3 | 1 | 8, 9, 10, 11, 13, 16, 18 |
| 6 | 7, 17 | |
| 19 | 15 |
Figure 5Data generation process.
Figure 6Comparison of death nodes. sLeach: Solar low-energy adaptive clustering hierarchy algorithm.
Figure 7Energy comparison of algorithms.
Figure 8Comparison of trust value in different state. (a) Normal node; (b) Node with abnormal data; (c) Node with suspected data and behavior.
Figure 9Comparison of fusion data.
Figure 10Comparison of abnormal detection rate. DRBTS: distributed reputation-based beacon trust system; LDTS: lightweight and dependable trust system; TRM-IoT: trust management model based on fuzzy reputation for the Internet of Things (IoT).