CN113746823B - Method for constructing cluster routing comprehensive trust management model of distributed power monitoring network - Google Patents
Method for constructing cluster routing comprehensive trust management model of distributed power monitoring network Download PDFInfo
- Publication number
- CN113746823B CN113746823B CN202110986639.1A CN202110986639A CN113746823B CN 113746823 B CN113746823 B CN 113746823B CN 202110986639 A CN202110986639 A CN 202110986639A CN 113746823 B CN113746823 B CN 113746823B
- Authority
- CN
- China
- Prior art keywords
- node
- cluster
- cluster head
- head node
- trust parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000012544 monitoring process Methods 0.000 title claims abstract description 14
- 238000010276 construction Methods 0.000 claims abstract description 11
- 241000854291 Dianthus carthusianorum Species 0.000 claims description 103
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000011156 evaluation Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/46—Cluster building
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a method for constructing a cluster routing comprehensive trust management model of a distributed power monitoring network, which is provided by aiming at the problems of incomplete factors and unreasonable calculation of trust values of all nodes in the trust management model construction in the prior art.
Description
Technical Field
The invention belongs to the field of network information security, and relates to a method for constructing a cluster routing comprehensive trust management model of a distributed power monitoring network.
Background
The trust management model construction is the premise of network security prevention of the distributed power monitoring system, and has very important significance for safe and stable operation of the network. In a network clustering routing protocol of a distributed power monitoring system, cluster member nodes are responsible for collecting data and sending the data to cluster head nodes, the cluster head nodes are responsible for managing and controlling the cluster member nodes to perform data fusion, inter-cluster forwarding and other work, and whether each node is safe and reliable is judged by adopting a trust management model, which is one of key factors for ensuring the safe operation of the whole network.
At present, in order to adapt to a large-scale distributed power monitoring system network, most trust management models adopt fixed trust values when performing trust evaluation on each node, then a trust value interval is divided, and different operations are performed on nodes in different trust value intervals. This trust management model has the following major problems:
(1) In the process of building the trust management model, the different influences of various routing attacks on the nodes are not considered, so that certain routing attack nodes cannot be identified, and the performance of the whole model is influenced finally;
(2) In the process of building a trust management model, each node is evaluated by adopting direct trust, and the trust judgment of the node is too unilateral, so that the safety of each node is influenced;
in the process of building the trust management model, whether the functions of cluster member nodes and cluster head nodes are different or not is not considered, and whether the trust management model is suitable for the structural characteristics of the clustering routing protocol or not is judged. Literature reports and practical application related to the method for constructing the distributed power monitoring network clustering routing comprehensive trust management model are not found so far.
Disclosure of Invention
The invention aims to provide a scientific and reasonable clustering routing trust management model construction method capable of ensuring safe and reliable operation of a distributed power monitoring network, aiming at the problems of incomplete factors and unreasonable trust value calculation of each node during trust management model construction.
The purpose of the invention is realized by the following technical scheme: a method for constructing a cluster routing comprehensive trust management model of a distributed power monitoring network is characterized by comprising the following steps: the method comprises the following steps of constructing a direct trust parameter management model between nodes in a cluster and cluster head nodes, and constructing a comprehensive trust parameter management model between the cluster head nodes, wherein the specific contents are as follows:
1) Direct trust parameter management model construction between cluster nodes and cluster head nodes
Defining clusters in a network as C i I =1,2,.., m, each cluster head node is Ch i I =1,2,.., m, and the node in each cluster is C ik I =1,2,.. Multidot.m, k =1,2,. Multidot.n, intra-cluster node C ik At cluster head node Ch i The direct trust parameter above is expressed as:
wherein, s (Ch) i ,C ik ) Is node C in the cluster ik To cluster head node Ch i Number of successful data transmissions, f (Ch) i ,C ik ) Is node C in the cluster ik To cluster head node Ch i Number of data transmission failures, R now Running the current number of rounds, R, for the network ini Is a node C ik The cluster head node is responsible for calculating and storing trust parameter information of each cluster node in the cluster, whether the cluster node is trusted is judged by comparing the relation between the direct trust parameter and a set threshold value, and when the cluster node is trusted, the cluster head node is used for calculating and storing the trust parameter information of each cluster node in the clusterWhen the cluster node is in the credible state, when the cluster node is in the credible stateWhen the cluster node is in a suspicious state, the cluster node is classified as a suspicious stateThen, the nodes in the cluster are classified as an untrusted state;
2) Construction of comprehensive trust parameter management model among cluster head nodes
Cluster head node Ch j J =1,2.., m, cluster head node Ch i ,i=1,2,...,m;i≠j,Ch j At cluster head node Ch i The direct trust parameter above is expressed as:
wherein, s (Ch) i ,Ch j ) As cluster head node Ch j To cluster head node Ch i Number of successful data transmissions, f (Ch) i ,Ch j ) As cluster head node Ch j To cluster head node Ch i Number of data transmission failures, R now Running the current number of rounds, R, for the network ini As cluster head node Ch i Initial number of rounds present;
cluster head node Ch j At cluster head node Ch i The indirect trust parameter above is expressed as:
wherein,cluster head node Ch for its common neighbor l L =1,2,., m, i ≠ j ≠ l, at cluster head node Ch j Direct trust parameter of (1), R now Running the current number of rounds, R, for the network ini As cluster head node Ch j The number of initial rounds of occurrence;
thus, cluster head node Ch j At cluster head node Ch i The integrated trust parameter above is expressed as:
wherein eta is 1 Weight, η, for a node directly trusting a parameter 2 The weight of the node indirect trust parameter is the weight of the node direct trust parameter and the weight of the node indirect trust parameter should satisfy eta 1 +η 2 =1, default case, letThe base station is responsible for calculating and storing trust parameter information of each cluster head node, whether the cluster head node is trusted or not is judged by comparing the relation between the comprehensive trust parameter and a set threshold value, and when the cluster head node is trusted, the base station calculates and stores the trust parameter information of each cluster head nodeWhen the cluster head node is in a credible state, when the cluster head node is in a credible stateWhen the cluster head node is in a suspicious stateAnd meanwhile, the cluster head node is classified as an untrusted state.
The invention discloses a method for constructing a cluster routing comprehensive trust management model of a distributed power monitoring network, which is provided by aiming at the problems of incomplete factors and unreasonable calculation of trust values of all nodes in the trust management model construction in the prior art.
Drawings
Fig. 1 shows a flow chart of a method for constructing a cluster routing comprehensive trust management model of a distributed power monitoring network.
Detailed Description
The invention is further illustrated by the following figures and detailed description.
Referring to fig. 1, the method for constructing a cluster routing comprehensive trust management model of a distributed power monitoring network of the present invention includes: the method comprises the following steps of constructing a direct trust parameter management model between nodes in a cluster and cluster head nodes, and constructing a comprehensive trust parameter management model between the cluster head nodes, wherein the specific contents are as follows:
1) Direct trust parameter management model construction between cluster nodes and cluster head nodes
Defining clusters in a network as C i I =1,2,.., m, each cluster head node is Ch i I =1,2,.., m, and the node in each cluster is C ik I =1,2., m, k =1,2., n, intra-cluster node C ik At cluster head node Ch i The direct trust parameter above is expressed as:
wherein, s (Ch) i ,C ik ) Is node C in the cluster ik To cluster head node Ch i Number of successful data transmissions, f (Ch) i ,C ik ) Is node C in the cluster ik To cluster head node Ch i Number of data transmission failures, R now Running the current number of rounds, R, for the network ini Is node C ik The cluster head node is responsible for calculating and storing trust parameter information of each cluster node in the cluster, whether the cluster node is trusted is judged by comparing the relation between the direct trust parameter and a set threshold value, and when the cluster node is trusted, the cluster head node is used for calculating and storing the trust parameter information of each cluster node in the clusterWhen the cluster node is in the credible state, when the cluster node is in the credible stateWhen the cluster node is in a suspicious state, the cluster node is classified as a suspicious stateAnd meanwhile, the nodes in the cluster are classified as an untrusted state.
2) Construction of comprehensive trust parameter management model among cluster head nodes
Cluster head node Ch j J =1,2.., m, cluster head node Ch i ,i=1,2,...,m;i≠j,Ch j At cluster head node Ch i The direct trust parameter above is expressed as:
wherein, s (Ch) i ,Ch j ) As cluster head node Ch j To cluster head node Ch i Number of successful data transmissions, f (Ch) i ,Ch j ) As cluster head node Ch j To cluster head node Ch i Number of data transmission failures, R now Running the current number of rounds, R, for the network ini As cluster head node Ch i Initial number of rounds present;
cluster head node Ch j At cluster head node Ch i The indirect trust parameter above is expressed as:
wherein,cluster head node Ch for its common neighbor l L =1,2,., m, i ≠ j ≠ l, at cluster head node Ch j Of R now Running the current number of rounds, R, for the network ini As cluster head node Ch j Initial number of rounds present;
thus, cluster head node Ch j At cluster head node Ch i Integrated letter ofAny parameter is expressed as:
wherein eta is 1 Weight, η, for a node directly trusting a parameter 2 The weight of the node indirect trust parameter is the weight of the node direct trust parameter and the weight of the node indirect trust parameter should satisfy eta 1 +η 2 =1, default case, letThe base station is responsible for calculating and storing trust parameter information of each cluster head node, whether the cluster head node is trusted or not is judged by comparing the relation between the comprehensive trust parameter and a set threshold value, and when the cluster head node is trusted, the base station calculates and stores the trust parameter information of each cluster head nodeWhen the cluster head node is in a credible state, when the cluster head node is in a credible stateWhen the cluster head node is in a suspicious stateAnd then, the cluster head node is classified as an untrusted state.
The software routines of the present invention are programmed in accordance with automation, network security, and computer processing techniques, as will be familiar to those skilled in the art.
The description of the present invention is not intended to be exhaustive or to limit the scope of the claims, and those skilled in the art will be able to conceive of other substantially equivalent alternatives, without inventive step, based on the teachings of the embodiments of the present invention, within the scope of the present invention.
Claims (1)
1. A method for constructing a cluster routing comprehensive trust management model of a distributed power monitoring network is characterized by comprising the following steps: the method comprises the following specific steps of constructing a direct trust parameter management model between nodes in a cluster and cluster head nodes, and constructing a comprehensive trust parameter management model between the cluster head nodes, wherein the specific contents are as follows:
1) Direct trust parameter management model construction between intra-cluster node and cluster head node
Defining clusters in a network as C i I =1,2,.., m, each cluster head node is Ch i I =1,2,.., m, and the node in each cluster is C ik I =1,2,.. Multidot.m, k =1,2,. Multidot.n, intra-cluster node C ik At cluster head node Ch i The direct trust parameter above is expressed as:
wherein, s (Ch) i ,C ik ) Is node C in the cluster ik To cluster head node Ch i Number of successful data transmissions, f (Ch) i ,C ik ) Is node C in the cluster ik To cluster head node Ch i Number of data transmission failures, R now Running the current number of rounds, R, for the network ini Is node C ik The cluster head node is responsible for calculating and storing trust parameter information of each cluster node in the cluster, whether the cluster node is trusted is judged by comparing the relation between the direct trust parameter and a set threshold value, and when the cluster node is trusted, the cluster head node is used for calculating and storing the trust parameter information of each cluster node in the clusterWhen the cluster node is in the credible state, when the cluster node is in the credible stateWhen the cluster node is in a suspicious state, the cluster node is classified as a suspicious stateThen, the nodes in the cluster are classified as an untrusted state;
2) Construction of comprehensive trust parameter management model among cluster head nodes
Cluster head node Ch j J =1,2.., m, cluster head node Ch i ,i=1,2,...,m;i≠j,Ch j At cluster head node Ch i The direct trust parameter above is expressed as:
wherein, s (Ch) i ,Ch j ) As cluster head node Ch j To cluster head node Ch i Number of successful data transmissions, f (Ch) i ,Ch j ) As cluster head node Ch j To cluster head node Ch i Number of data transmission failures, R now Running the current number of rounds, R, for the network ini As cluster head node Ch i Initial number of rounds present;
cluster head node Ch j At cluster head node Ch i The indirect trust parameter above is expressed as:
wherein,cluster head node Ch for its common neighbor l L =1,2,., m, i ≠ j ≠ l, at cluster head node Ch j Of R now Running the current number of rounds, R, for the network ini As cluster head node Ch j Initial number of rounds present;
thus, cluster head node Ch j At cluster head node Ch i The above integrated trust parameter is expressed as:
wherein eta 1 Weight, η, for a node directly trusting a parameter 2 The weight of the node indirect trust parameter is the weight of the node direct trust parameter and the weight of the node indirect trust parameter should satisfy eta 1 +η 2 =1, default case, letThe base station is responsible for calculating and storing trust parameter information of each cluster head node, whether the cluster head node is trusted or not is judged by comparing the relation between the comprehensive trust parameter and a set threshold value, and when the cluster head node is trusted, the base station calculates and stores the trust parameter information of each cluster head nodeWhen the cluster head node is in the credible state, when the cluster head node is in the credible stateWhen the cluster head node is classified as a suspicious state, when the cluster head node is classified as a suspicious stateAnd meanwhile, the cluster head node is classified as an untrusted state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110986639.1A CN113746823B (en) | 2021-08-26 | 2021-08-26 | Method for constructing cluster routing comprehensive trust management model of distributed power monitoring network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110986639.1A CN113746823B (en) | 2021-08-26 | 2021-08-26 | Method for constructing cluster routing comprehensive trust management model of distributed power monitoring network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113746823A CN113746823A (en) | 2021-12-03 |
CN113746823B true CN113746823B (en) | 2023-01-24 |
Family
ID=78733170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110986639.1A Active CN113746823B (en) | 2021-08-26 | 2021-08-26 | Method for constructing cluster routing comprehensive trust management model of distributed power monitoring network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113746823B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102036229A (en) * | 2010-12-22 | 2011-04-27 | 河海大学常州校区 | Method for establishing trust mechanism of network hierarchical routing protocol of wireless sensor |
CN102196420A (en) * | 2011-06-02 | 2011-09-21 | 河海大学常州校区 | Secure clustering routing management method for wireless sensor network |
CN103237333A (en) * | 2013-04-01 | 2013-08-07 | 东南大学 | Cluster routing method based on multi-factor trust mechanism |
CN107333314A (en) * | 2017-06-30 | 2017-11-07 | 安徽农业大学 | A kind of wireless sense network cluster is built and its cluster head update method |
CN107466046A (en) * | 2017-08-03 | 2017-12-12 | 浙江理工大学 | Based on region division and the security arrangement method for routing of Trust Management Mechanism and application |
CN111510983A (en) * | 2020-03-19 | 2020-08-07 | 东北电力大学 | Wireless sensor network cluster head election method combining trust |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10225708B2 (en) * | 2016-01-06 | 2019-03-05 | King Abdulaziz University | Trust evaluation wireless network for routing data packets |
-
2021
- 2021-08-26 CN CN202110986639.1A patent/CN113746823B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102036229A (en) * | 2010-12-22 | 2011-04-27 | 河海大学常州校区 | Method for establishing trust mechanism of network hierarchical routing protocol of wireless sensor |
CN102196420A (en) * | 2011-06-02 | 2011-09-21 | 河海大学常州校区 | Secure clustering routing management method for wireless sensor network |
CN103237333A (en) * | 2013-04-01 | 2013-08-07 | 东南大学 | Cluster routing method based on multi-factor trust mechanism |
CN107333314A (en) * | 2017-06-30 | 2017-11-07 | 安徽农业大学 | A kind of wireless sense network cluster is built and its cluster head update method |
CN107466046A (en) * | 2017-08-03 | 2017-12-12 | 浙江理工大学 | Based on region division and the security arrangement method for routing of Trust Management Mechanism and application |
CN111510983A (en) * | 2020-03-19 | 2020-08-07 | 东北电力大学 | Wireless sensor network cluster head election method combining trust |
Non-Patent Citations (1)
Title |
---|
基于Beta分布的无线传感器网络分簇;尹月琴等;《无线互联科技》;20200331;第7-9页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113746823A (en) | 2021-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104580222A (en) | DDoS attack distributed detection and response system and method based on information entropy | |
CN111404914A (en) | Ubiquitous power Internet of things terminal safety protection method under specific attack scene | |
CN101286872A (en) | Distributed intrusion detection method in wireless sensor network | |
CA3092260A1 (en) | Attribute-based policies for integrity monitoring and network intrusion detection | |
CN103324165A (en) | Process route optimization method considering production line stability | |
WO2020093904A1 (en) | Wireless sensor network fault-tolerant topology evolution method | |
CN112787861A (en) | Network security monitoring integrated programmable controller based on SDN | |
CN103401878B (en) | Frequency spectrum perception data tampering attack detection method | |
CN113746823B (en) | Method for constructing cluster routing comprehensive trust management model of distributed power monitoring network | |
CN108710724A (en) | A kind of fuzzy double-response face method calculating leaf dish vibration reliability | |
CN101183996A (en) | Cluster information monitoring method | |
Ran et al. | Development of computer intelligent control system based on Modbus and WEB technology | |
CN102497135B (en) | A kind of photovoltaic plant method for supervising of rule-based engine | |
CN108833333B (en) | Honeypot system based on DCS distributed control | |
CN111510983B (en) | Wireless sensor network cluster head election method combining trust | |
CN117596119A (en) | Equipment data acquisition and monitoring method and system based on SNMP (simple network management protocol) | |
CN109634808B (en) | Chain monitoring event root cause analysis method based on correlation analysis | |
CN111030951A (en) | Learning system and method for IED equipment in intelligent substation | |
CN112822211B (en) | Power-controlled portable self-learning industrial firewall system, device and use method | |
CN107229525A (en) | A kind of power system device model keyword generation method based on Zookeeper | |
CN112819310A (en) | Photovoltaic information physical system security risk assessment method based on influence graph | |
Zhang et al. | Maintenance of large scale wireless sensor networks | |
CN113542410A (en) | Building operation and maintenance management system based on block chain technology | |
CN114048942B (en) | IES-CPS system information-physical combination expected fault generation method, device, storage medium and computing equipment | |
CN111209158A (en) | Mining monitoring method and cluster monitoring system for server cluster |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |