The mechanism of situation data fusion based on trust in wireless sensor network

被引:0
作者
Li, Fang-Wei [1 ]
Nie, Yi-Fang [1 ]
Liu, Fan [1 ]
Zhu, Jiang [1 ]
机构
[1] Chongqing Key Lab. of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing
来源
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications | 2015年 / 38卷 / 05期
关键词
Big data; Fusion mechanism; Situation awareness; Trust;
D O I
10.13190/j.jbupt.2015.05.013
中图分类号
学科分类号
摘要
To cope with the problem captured nodes causing the deviation, the situation data fusion mechanism based on trust was presented. It makes trust awareness rule based on historical trust or data correlation, and guarantees consistency in three stages. Firstly, in event detection, after collecting data, it detects events through most trust majority rule to enhance accuracy. Secondly, during data fusion, it uses data filter rule to improve reliability. Finally, in consistency detection, it utilizes the consistency detection rule to reduce communication traffic, simultaneously judging the consistence of centers. The new mechanism can suppress misrepresentation and enhance the performance when abnormity is more than normal ones. It can also reduce the deviation between real value and fusion data. Simulation verifies the reliability and validity. © 2015, Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:71 / 76
页数:5
相关论文
共 9 条
  • [1] Coronato A., Pietro G., Situation awareness in applications of ambient assisted living for cognitive impaired people, Mobile Networks and Applications, 18, 3, pp. 444-453, (2013)
  • [2] Dong X., Srivastava D., Big data integration, International Conference on Very Large Data Bases, pp. 1245-1248, (2013)
  • [3] Dietzel S., Schoch E., Konings B., Et al., Resilient secure aggregation for vehicular network, IEEE Networks, 24, 1, pp. 26-31, (2010)
  • [4] Wagner D., Resilient aggregation in sensor networks, ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 78-87, (2004)
  • [5] Bohili J., Papadimitratos P., Verardi D., Et al., Resilient data aggregation for unattended WSNs, IEEE International Workshop on Practical Issues in Building Sensor Network Applications, pp. 994-1002, (2011)
  • [6] Liu X., Yu J., Wang M., Network security situation generation and evaluation based on heterogeneous sensor fusion, International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, (2009)
  • [7] Yan Q., Yang J., Zhang W., The sensing of the secure cooperative spectrum in cognitive radio networks, Journal of Beijing University of Posts and Telecommunications, 34, 2, pp. 71-75, (2011)
  • [8] Thomas C., Kewal K., Parameswaran R., Fault tolerance in collaborative sensor networks for target detection, IEEE Transactions on Computers, 53, 3, pp. 320-333, (2004)
  • [9] Cai X., Giannakis G., A two-dimensional channel simulation model for shadowing processes, IEEE Transactions on Vehicular Technology, 52, 6, pp. 1558-1567, (2003)