CN103812696B - A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm - Google Patents
A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm Download PDFInfo
- Publication number
- CN103812696B CN103812696B CN201410040848.7A CN201410040848A CN103812696B CN 103812696 B CN103812696 B CN 103812696B CN 201410040848 A CN201410040848 A CN 201410040848A CN 103812696 B CN103812696 B CN 103812696B
- Authority
- CN
- China
- Prior art keywords
- node
- nodes
- reputation
- frog
- neighbor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 11
- 238000011156 evaluation Methods 0.000 claims abstract description 39
- 238000012216 screening Methods 0.000 claims abstract description 12
- 241000269350 Anura Species 0.000 claims description 14
- 238000004364 calculation method Methods 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 claims description 4
- 238000001914 filtration Methods 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- IXKSXJFAGXLQOQ-XISFHERQSA-N WHWLQLKPGQPMY Chemical compound C([C@@H](C(=O)N[C@@H](CC=1C2=CC=CC=C2NC=1)C(=O)N[C@@H](CC(C)C)C(=O)N[C@@H](CCC(N)=O)C(=O)N[C@@H](CC(C)C)C(=O)N1CCC[C@H]1C(=O)NCC(=O)N[C@@H](CCC(N)=O)C(=O)N[C@@H](CC(O)=O)C(=O)N1CCC[C@H]1C(=O)N[C@@H](CCSC)C(=O)N[C@@H](CC=1C=CC(O)=CC=1)C(O)=O)NC(=O)[C@@H](N)CC=1C2=CC=CC=C2NC=1)C1=CNC=N1 IXKSXJFAGXLQOQ-XISFHERQSA-N 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012854 evaluation process Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
一种基于混合蛙跳算法的物联网节点信誉评估方法,分析物联网中节点的局域特征,计算物联网自治域中的节点的重要性,将计算后的节点重要性作为节点筛选的依据,利用混合蛙跳算法对节点进行聚类,选取节点重要性较高的一类节点作为信誉评估的邻居节点,根据信誉评估算法,使用邻居节点对需要评估的节点进行信誉评估,根据节点当前信誉和历史信誉计算出更为准确的节点信誉值,设定阈值,将节点信誉值与该阈值进行比较判定节点是否可信;当信誉值低于设定阈值时,则判定节点为不可信节点,否者为可信节点;本发明能够有效避免传统信誉评估系统中出现的不可信节点对评估结果产生干扰的问题。
An IoT node reputation evaluation method based on the hybrid leapfrog algorithm, which analyzes the local characteristics of nodes in the IoT, calculates the importance of nodes in the autonomous domain of the IoT, and uses the calculated node importance as the basis for node screening. The hybrid leapfrog algorithm is used to cluster the nodes, and a class of nodes with high importance is selected as the neighbor nodes for reputation evaluation. According to the reputation evaluation algorithm, the neighbor nodes are used to evaluate the reputation of the nodes that need to be evaluated. According to the current reputation of the node and The historical reputation calculates a more accurate node reputation value, sets a threshold, and compares the node reputation value with the threshold to determine whether the node is credible; when the reputation value is lower than the set threshold, it is determined that the node is an untrustworthy node, otherwise Those are credible nodes; the invention can effectively avoid the problem that untrustworthy nodes interfere with the evaluation results in the traditional reputation evaluation system.
Description
技术领域technical field
本发明涉及通信技术领域,具体的说是涉及一种基于混合蛙跳算法的物联网节点信誉评估方法。The invention relates to the field of communication technology, in particular to a reputation evaluation method for Internet of Things nodes based on a hybrid leapfrog algorithm.
背景技术Background technique
目前,对于分布式系统的可信性研究主要集中在可信管理和可信评估两方面,可信管理的本质是一中基于认证和授权的访问控制模型与方法。信任评估方法则是以实体间的推荐信任关系为基础,结合自身经验对实体可信度做出评价,然后依据可信度进行决策。经典的信誉管理技术有求信誉平均值方案、贝叶斯网络和集群过滤。节点间、域之间建立信任十分重要,一般来说,信任级别可以通过邻居节点的行为和他们对相应事件生成的信息进行评估。然而,节点十分容易受到攻击,进而提供不可靠的或恶意的反馈,影响真实的节点信誉值。At present, research on the credibility of distributed systems mainly focuses on two aspects: trust management and trust evaluation. The essence of trust management is an access control model and method based on authentication and authorization. The trust evaluation method is based on the recommended trust relationship between entities, and evaluates the credibility of entities based on their own experience, and then makes decisions based on the credibility. Classical reputation management techniques include reputation averaging schemes, Bayesian networks, and cluster filtering. It is very important to establish trust between nodes and domains. Generally speaking, the trust level can be evaluated by the behavior of neighbor nodes and the information they generate for corresponding events. However, nodes are very vulnerable to attacks, and then provide unreliable or malicious feedback, affecting the real node reputation value.
现有方法的缺陷有:The disadvantages of existing methods are:
1、信誉级别评估缺乏间接信誉推荐1. Credit rating evaluation lacks indirect reputation recommendation
通常的信誉级别评估需要考虑主客观两方面的因素,如资源对用户可信程度的评价不仅由本地获取的直接信誉度决定,还应当考虑计算代理处获取的间接信誉推荐(声誉);而节点可靠程度的评定也不单由使用该节点的用户决定,同样需要考虑其他自制域的用户对该节点的信誉推荐。综合考虑用户、节点的信誉以及信誉评估过程中的主观客观因素。The usual evaluation of reputation level needs to consider both subjective and objective factors. For example, the evaluation of the credibility of resources to users is not only determined by the direct reputation obtained locally, but also the indirect reputation recommendation (reputation) obtained by the computing agency; and the node The evaluation of the reliability is not only determined by the users who use the node, but also needs to consider the reputation recommendations of the node by users of other self-made domains. Comprehensively consider the reputation of users, nodes, and subjective and objective factors in the reputation evaluation process.
2、不可靠节点对信誉评估的干扰2. Unreliable nodes interfere with reputation evaluation
由于物联网自身所具有的高异构和高混杂特征,自治域内的节点很可能遭受到非法的入侵攻击,从而做出错误的信誉等级评价,对最终的评估结果进行干扰,影响评估结果的准确性。Due to the highly heterogeneous and highly mixed characteristics of the Internet of Things itself, nodes in the autonomous domain are likely to suffer from illegal intrusion attacks, thus making wrong reputation rating evaluations, interfering with the final evaluation results, and affecting the accuracy of the evaluation results.
发明内容Contents of the invention
本发明针对传统信誉评估系统中可能出现的不可信节点对评估结果产生干扰的问题,提出一种基于混合蛙跳算法的物联网节点信誉评估方法。Aiming at the problem that untrustworthy nodes may interfere with evaluation results in traditional reputation evaluation systems, the invention proposes a reputation evaluation method for Internet of Things nodes based on a hybrid leapfrog algorithm.
本发明所采用的技术方案是:一种基于混合蛙跳算法的物联网节点信誉评估方法,所述的方法包括以下步骤:The technical scheme adopted in the present invention is: a method for evaluating the reputation of Internet of Things nodes based on the hybrid leapfrog algorithm, and the method includes the following steps:
步骤1、分析物联网中节点的局域特征,计算物联网自治域中的节点的重要性;Step 1. Analyze the local characteristics of nodes in the Internet of Things, and calculate the importance of nodes in the autonomous domain of the Internet of Things;
步骤2、将计算后的节点重要性作为节点筛选的依据,利用混合蛙跳算法对节点进行聚类;Step 2. Use the calculated node importance as the basis for node screening, and use the hybrid leapfrog algorithm to cluster the nodes;
步骤3、选取步骤2中得到的节点重要性较高的一类节点作为信誉评估的邻居节点;Step 3, selecting a class of nodes with higher node importance obtained in step 2 as neighbor nodes for reputation evaluation;
步骤4、根据信誉评估算法,使用步骤3得到的邻居节点对需要评估的节点进行信誉评估;Step 4, according to the reputation evaluation algorithm, use the neighbor nodes obtained in step 3 to perform reputation evaluation on the node to be evaluated;
步骤5、根据节点当前信誉和历史信誉计算出更为准确的节点信誉值;Step 5. Calculate a more accurate node reputation value based on the node's current reputation and historical reputation;
步骤6、设定阈值,将步骤5中得到的节点信誉值与该阈值进行比较判定节点是否可信;当信誉值低于设定阈值时,则判定节点为不可信节点,否者为可信节点。Step 6. Set a threshold, compare the node reputation value obtained in step 5 with the threshold to determine whether the node is credible; when the reputation value is lower than the set threshold, it is determined that the node is an untrustworthy node, otherwise it is credible node.
所述步骤1中的节点重要性的计算方法包括以下步骤:The calculation method of the node importance in the step 1 comprises the following steps:
步骤201、将网络表示为二元组YK,EY,节点集合表示为,连接节点的边的集合表示为,其中,n和m表示网络的节点数和边数,连接节点的边越重要则节点就越重要;Step 201, represent the network as a binary group YK, EY, and represent the node set as , the set of edges connecting nodes is expressed as , where n and m represent the number of nodes and edges of the network, the more important the edges connecting nodes are, the more important the nodes are;
步骤202、利用公式来计算边的权重,其中表示与节点i连接的边数;Step 202, use the formula to calculate the edge weights, where Indicates the number of edges connected to node i;
步骤203、对节点i所连边的权值进行求和即表示节点i的权重;Step 203, summing the weights of the edges connected to node i That is, the weight of node i;
步骤204、利用公式计算节点i的重要性,其中。Step 204, use the formula Calculate the importance of node i, where .
所述步骤2中的蛙跳混合算法包括以下步骤:The leapfrog hybrid algorithm in the step 2 comprises the following steps:
步骤301、以节点重要性为筛选依据,利用混合蛙跳算法对邻居节点进行筛选,每个青蛙个体可以表示一个节点的重要性并利用公式计算出青蛙的适应度;Step 301, based on the importance of nodes, use the hybrid leapfrog algorithm to screen neighbor nodes, each individual frog can indicate the importance of a node and using the formula Calculate the fitness of the frog;
步骤302、随机初始化P只青蛙组成的青蛙群体 ,i=1,2,……P;Step 302. Randomly initialize a frog group consisting of P frogs , i=1, 2,...P;
步骤303、按照计算出的每只青蛙的适应度进行降序排列,函数值最优的青蛙个体设为;Step 303, arrange in descending order according to the calculated fitness of each frog, and the individual frog with the best function value is set to ;
步骤304、将整个青蛙群体分为F个族群,每个族群包含G只青蛙,因此,第一只青蛙进入第1个族群,第二只青蛙进入第2个族群,第F只青蛙进入第F个族群,之后第F+1只青蛙又进入第1个族群,第F+2只青蛙进入第2个族群,以此类推,直到全部青蛙划分完毕;Step 304, divide the entire frog population into F groups, each group contains G frogs, therefore , the first frog enters the first group, the second frog enters the second group, the Fth frog enters the Fth group, and then the F+1th frog enters the first group, and the F+2th frog Frogs enter the second group, and so on, until all frogs are divided;
步骤305、族群划分完毕后,即对每个族群进行局部深度搜索,各族群中具有最优和最差适应度的个体为和,每一次迭代针对最差适应度进行,更新策略为:青蛙移动距离,更新最差青蛙位置()其中,是之间的随机数,是允许青蛙移动的最大距离,通过以上公式对族群内适应度最差的青蛙个体进行更新,每个族群执行设定的局部搜索次数;Step 305, after the group division is completed, a local deep search is performed on each group, and the individuals with the best and worst fitness in each group are with , each iteration for the worst fitness Go on, the update strategy is: frog moving distance , update the worst frog position ( )in, yes a random number between, is the maximum distance that frogs are allowed to move, update the frog individuals with the worst fitness in the group through the above formula, and perform the set number of local searches for each group;
步骤306、将经过局部深度搜索的族群合并组成一个新的族群,并判断是否满足算法的终止条件,完成筛选可靠邻居节点。Step 306 : Merge the clusters that have undergone local deep search to form a new cluster, and judge whether the termination condition of the algorithm is satisfied, and complete the screening of reliable neighbor nodes.
所述步骤4中的信誉评估具体包括以下步骤:The reputation evaluation in step 4 specifically includes the following steps:
根据筛选后得到的节点,以它们作为邻居节点,在TP周期内,会有多个邻居节点观察被评估节点,每个节点都拥有并维护自身的邻居节点列表,列表中包含邻居节点ID号和信誉值等信息,当节点i向节点n发送数据包时,需要中间节点j进行转发,节点通过现有监测条件计算出节点可靠度,的计算公式如下:,其中表示节点i请求节点j转发数据包的数量;表示j为i转发数据包的数量,在周期内,j转发的数据包越多可靠度越高。According to the nodes obtained after screening, they are used as neighbor nodes. During the TP cycle, there will be multiple neighbor nodes observing the evaluated node. Each node has and maintains its own neighbor node list, which contains the neighbor node ID number. and reputation value and other information, when node i sends a data packet to node n, the intermediate node j needs to forward it, and the node calculates the node reliability through the existing monitoring conditions , The calculation formula is as follows: ,in Indicates the number of data packets that node i requests node j to forward; Indicates that j is the number of data packets forwarded by i, in the cycle Within, the more data packets forwarded by j, the higher the reliability.
为了避免信誉值高的节点提供过高的发言权,造成主观偏差,引入全局信誉R作为参量,用来降低风险,减少主观偏差具体公式如下:In order to prevent nodes with high reputation values from providing too high a right to speak, resulting in subjective bias, the global reputation R is introduced as a parameter to reduce risks and reduce subjective bias. The specific formula is as follows:
其中,i是N的邻居节点,SN是N的邻居节点的集合,是提供监听节点的信誉值,T是可靠度阈值,低于阈值的节点行为会被认为是不良的节点,引入的参量,其中为调节函数,,Miki为节点i的交易总额,是根据节点i相对于其邻居节点的局部信誉期望,且。Among them, i is the neighbor node of N, S N is the set of neighbor nodes of N, is to provide the reputation value of the listening node, T is the reliability threshold, the behavior of the node below the threshold will be considered as a bad node, and the introduced parameter ,in is the adjustment function, , M iki is the total transaction amount of node i, is according to the local reputation expectation of node i relative to its neighbor nodes, and .
本发明的有益效果:本发明在对节点进行信誉评估前对网络中的节点进行过滤,过滤得出节点重要性较高作为邻居,较好的避免了不可靠邻居对信誉评估结果的干扰,提高了信誉评估的准确性;本发明利用混合蛙跳算法,对局部和全局进行搜索,进而对节点进行筛选,具有较快的收敛性和较强的鲁棒性。Beneficial effects of the present invention: the present invention filters the nodes in the network before evaluating the reputation of the nodes, and obtains nodes with higher importance as neighbors, which better avoids the interference of unreliable neighbors on the reputation evaluation results, and improves The accuracy of reputation evaluation is improved; the invention uses the hybrid leapfrog algorithm to search locally and globally, and then screens nodes, which has faster convergence and stronger robustness.
附图说明Description of drawings
图1为本发明的结构框图。Fig. 1 is a structural block diagram of the present invention.
具体实施方式detailed description
如图所示,一种基于混合蛙跳算法的物联网节点信誉评估方法,所述的方法包括以下步骤:As shown in the figure, a method for evaluating the reputation of IoT nodes based on the hybrid leapfrog algorithm, the method includes the following steps:
步骤1、分析物联网中节点的局域特征,计算物联网自治域中的节点的重要性;Step 1. Analyze the local characteristics of nodes in the Internet of Things, and calculate the importance of nodes in the autonomous domain of the Internet of Things;
步骤2、将计算后的节点重要性作为节点筛选的依据,利用混合蛙跳算法对节点进行聚类;Step 2. Use the calculated node importance as the basis for node screening, and use the hybrid leapfrog algorithm to cluster the nodes;
步骤3、选取步骤2中得到的节点重要性较高的一类节点作为信誉评估的邻居节点;Step 3, selecting a class of nodes with higher node importance obtained in step 2 as neighbor nodes for reputation evaluation;
步骤4、根据信誉评估算法,使用步骤3得到的邻居节点对需要评估的节点进行信誉评估;Step 4, according to the reputation evaluation algorithm, use the neighbor nodes obtained in step 3 to perform reputation evaluation on the node to be evaluated;
步骤5、根据节点当前信誉和历史信誉计算出更为准确的节点信誉值;Step 5. Calculate a more accurate node reputation value based on the node's current reputation and historical reputation;
步骤6、设定阈值,将步骤5中得到的节点信誉值与该阈值进行比较判定节点是否可信;当信誉值低于设定阈值时,则判定节点为不可信节点,否者为可信节点。Step 6. Set a threshold, compare the node reputation value obtained in step 5 with the threshold to determine whether the node is credible; when the reputation value is lower than the set threshold, it is determined that the node is an untrustworthy node, otherwise it is credible node.
所述步骤1中的节点重要性的计算方法包括以下步骤:The calculation method of the node importance in the step 1 comprises the following steps:
步骤201、将网络表示为二元组YK,EY,节点集合表示为 ,连接节点的边的集合表示为,其中,n和m表示网络的节点数和边数,连接节点的边越重要则节点就越重要;Step 201, represent the network as a binary group YK, EY, and represent the node set as , the set of edges connecting nodes is expressed as , where n and m represent the number of nodes and edges of the network, the more important the edges connecting nodes are, the more important the nodes are;
步骤202、利用公式来计算边的权重,其中表示与节点i连接的边数;Step 202, use the formula to calculate the edge weights, where Indicates the number of edges connected to node i;
步骤203、对节点i所连边的权值进行求和即表示节点i的权重;Step 203, summing the weights of the edges connected to node i That is, the weight of node i;
步骤204、利用公式计算节点i的重要性,其中。Step 204, use the formula Calculate the importance of node i, where .
所述步骤2中的蛙跳混合算法包括以下步骤:The leapfrog hybrid algorithm in the step 2 comprises the following steps:
步骤301、以节点重要性为筛选依据,利用混合蛙跳算法对邻居节点进行筛选,每个青蛙个体可以表示一个节点的重要性并利用公式计算出青蛙的适应度;Step 301, based on the importance of nodes, use the hybrid leapfrog algorithm to screen neighbor nodes, each individual frog can indicate the importance of a node and using the formula Calculate the fitness of the frog;
步骤302、随机初始化P只青蛙组成的青蛙群体 ,i=1,2,……P;Step 302. Randomly initialize a frog group consisting of P frogs , i=1, 2,...P;
步骤303、按照计算出的每只青蛙的适应度进行降序排列,函数值最优的青蛙个体设为;Step 303, arrange in descending order according to the calculated fitness of each frog, and the individual frog with the best function value is set to ;
步骤304、将整个青蛙群体分为F个族群,每个族群包含G只青蛙,因此,第一只青蛙进入第1个族群,第二只青蛙进入第2个族群,第F只青蛙进入第F个族群,之后第F+1只青蛙又进入第1个族群,第F+2只青蛙进入第2个族群,以此类推,直到全部青蛙划分完毕;Step 304, divide the entire frog population into F groups, each group contains G frogs, therefore , the first frog enters the first group, the second frog enters the second group, the Fth frog enters the Fth group, and then the F+1th frog enters the first group, and the F+2th frog Frogs enter the second group, and so on, until all frogs are divided;
步骤305、族群划分完毕后,即对每个族群进行局部深度搜索,各族群中具有最优和最差适应度的个体为和,每一次迭代针对最差适应度进行,更新策略为:青蛙移动距离,更新最差青蛙位置()其中,是之间的随机数,是允许青蛙移动的最大距离,通过以上公式对族群内适应度最差的青蛙个体进行更新,每个族群执行设定的局部搜索次数;Step 305, after the group division is completed, a local deep search is performed on each group, and the individuals with the best and worst fitness in each group are with , each iteration for the worst fitness Go on, the update strategy is: frog moving distance , update the worst frog position ( )in, yes a random number between, is the maximum distance that frogs are allowed to move, update the frog individuals with the worst fitness in the group through the above formula, and perform the set number of local searches for each group;
步骤306、将经过局部深度搜索的族群合并组成一个新的族群,并判断是否满足算法的终止条件,完成筛选可靠邻居节点。Step 306 : Merge the clusters that have undergone local deep search to form a new cluster, and judge whether the termination condition of the algorithm is satisfied, and complete the screening of reliable neighbor nodes.
所述步骤4中的信誉评估具体包括以下步骤:The reputation evaluation in step 4 specifically includes the following steps:
根据筛选后得到的节点,以它们作为邻居节点,在TP周期内,会有多个邻居节点观察被评估节点,每个节点都拥有并维护自身的邻居节点列表,列表中包含邻居节点ID号和信誉值等信息,当节点i向节点n发送数据包时,需要中间节点j进行转发,节点通过现有监测条件计算出节点可靠度,的计算公式如下:,其中表示节点i请求节点j转发数据包的数量;表示j为i转发数据包的数量,在周期内,j转发的数据包越多可靠度越高。According to the nodes obtained after screening, they are used as neighbor nodes. During the TP cycle, there will be multiple neighbor nodes observing the evaluated node. Each node has and maintains its own neighbor node list, which contains the neighbor node ID number. and reputation value and other information, when node i sends a data packet to node n, the intermediate node j needs to forward it, and the node calculates the node reliability through the existing monitoring conditions , The calculation formula is as follows: ,in Indicates the number of data packets that node i requests node j to forward; Indicates that j is the number of data packets forwarded by i, in the cycle Within, the more data packets forwarded by j, the higher the reliability.
为了避免信誉值高的节点提供过高的发言权,造成主观偏差,引入全局信誉R作为参量,用来降低风险,减少主观偏差具体公式如下:In order to prevent nodes with high reputation values from providing too high a right to speak, resulting in subjective bias, the global reputation R is introduced as a parameter to reduce risks and reduce subjective bias. The specific formula is as follows:
其中,i是N的邻居节点,SN是N的邻居节点的集合,是提供监听节点的信誉值,T是可靠度阈值,低于阈值的节点行为会被认为是不良的节点,引入的参量,其中为调节函数,,Miki为节点i的交易总额,是根据节点i相对于其邻居节点的局部信誉期望,且。Among them, i is the neighbor node of N, S N is the set of neighbor nodes of N, is to provide the reputation value of the listening node, T is the reliability threshold, the behavior of the node below the threshold will be considered as a bad node, and the introduced parameter ,in is the adjustment function, , M iki is the total transaction amount of node i, is according to the local reputation expectation of node i relative to its neighbor nodes, and .
参与信誉评价的邻居节点数目越多且数据传输量越大,全局信誉的期望就越准确。The larger the number of neighbor nodes participating in reputation evaluation and the larger the amount of data transmission, the more accurate the global reputation expectation will be.
物联网中的节点因为具有流动性的特征,且相对廉价。如果因为偶然原因而被认定为消极转发数据包的不可靠节点就显得有失公平。因此我们在计算当前信誉值时也需要将历史信誉值考虑进来,形成新的信誉值。具体公式如下:Nodes in the Internet of Things are relatively cheap because of their mobility. It would be unfair to be identified as an unreliable node passively forwarding packets due to accidental reasons. Therefore, when we calculate the current reputation value, we also need to take the historical reputation value into account to form a new reputation value. The specific formula is as follows:
,因此,根据不同的自治域环境,我们可以通过调节α因子来权衡历史信誉值对当前节点信誉的比重。 , therefore, according to different autonomous domain environments, we can weigh the proportion of historical reputation value to current node reputation by adjusting the α factor.
本发明在对节点进行信誉评估前对网络中的节点进行过滤,过滤得出节点重要性较高作为邻居,较好的避免了不可靠邻居对信誉评估结果的干扰,提高了信誉评估的准确性;本发明利用混合蛙跳算法,对局部和全局进行搜索,进而对节点进行筛选,具有较快的收敛性和较强的鲁棒性。The present invention filters the nodes in the network before evaluating the reputation of the nodes, and obtains nodes with higher importance as neighbors after filtering, which better avoids the interference of unreliable neighbors on the reputation evaluation results, and improves the accuracy of reputation evaluation ; The present invention uses the hybrid leapfrog algorithm to search locally and globally, and then screen nodes, which has faster convergence and stronger robustness.
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410040848.7A CN103812696B (en) | 2014-01-28 | 2014-01-28 | A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410040848.7A CN103812696B (en) | 2014-01-28 | 2014-01-28 | A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103812696A CN103812696A (en) | 2014-05-21 |
CN103812696B true CN103812696B (en) | 2017-07-28 |
Family
ID=50708938
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410040848.7A Active CN103812696B (en) | 2014-01-28 | 2014-01-28 | A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103812696B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10785125B2 (en) | 2018-12-03 | 2020-09-22 | At&T Intellectual Property I, L.P. | Method and procedure for generating reputation scores for IoT devices based on distributed analysis |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104467999B (en) * | 2014-11-18 | 2017-02-22 | 北京邮电大学 | Spectrum sensing algorithm based on quantum leapfrog |
CN112185419A (en) * | 2020-09-30 | 2021-01-05 | 天津大学 | Glass bottle crack detection method based on machine learning |
CN116862021B (en) * | 2023-07-31 | 2024-05-03 | 山东省计算中心(国家超级计算济南中心) | Anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223627A (en) * | 2011-06-17 | 2011-10-19 | 北京工业大学 | Beacon node reputation-based wireless sensor network safety locating method |
CN102378217A (en) * | 2011-11-01 | 2012-03-14 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8010460B2 (en) * | 2004-09-02 | 2011-08-30 | Linkedin Corporation | Method and system for reputation evaluation of online users in a social networking scheme |
-
2014
- 2014-01-28 CN CN201410040848.7A patent/CN103812696B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223627A (en) * | 2011-06-17 | 2011-10-19 | 北京工业大学 | Beacon node reputation-based wireless sensor network safety locating method |
CN102378217A (en) * | 2011-11-01 | 2012-03-14 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
Non-Patent Citations (10)
Title |
---|
WNN-Based Network Security Situation Quantitive Prediction Method and Its Optimization;赖积保,王慧强,刘效武,梁颖,郑瑞娟,赵国生;《Computer Science and Technology》;20080331;全文 * |
一种面向云服务的自主信誉管理机制;吴庆涛,张旭龙,张明川,郑瑞娟,娄颖;《武汉大学学报(理学版)》;20131031;第59卷(第5期);全文 * |
协同多目标攻击的混合蛙跳融合蚁群算法研究;孔凡光,何建华,唐奎;《计算机工程与应用》;20131231;全文 * |
可信网络连接中的可信度仿真评估;吴庆涛,郑瑞娟,华彬,杨馨桐;《计算机应用研究》;20110228;第28卷(第2期);全文 * |
基于信赖域的系统可信性自调节算法;郑瑞娟,张明川,吴庆涛,李冠峰,魏汪洋;《河南科技大学学报:自然科学版》;20100831;第31卷(第4期);全文 * |
基于自律计算的系统可信性自调节模型;吴庆涛,郑瑞娟,张明川,魏汪洋,李冠峰;《计算机工程与应用》;20111231;全文 * |
基于自律计算的系统服务可信性自优化方法;朱丽娜,吴庆涛,娄颖,郑瑞娟;《微电子学与计算机》;20130831;第30卷(第8期);全文 * |
混合蛙跳算法研究综述;崔文华,刘晓冰,王伟,王介生;《控制与决策》;20120430;第27卷(第4期);全文 * |
混合蛙跳算法综述;邹采荣,张潇丹,赵力;《信息化研究》;20121031;第38卷(第5期);全文 * |
自适应混沌变异蛙跳算法;葛宇, 王学平, 梁静;《计算机应用研究》;20110331;第28卷(第3期);全文 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10785125B2 (en) | 2018-12-03 | 2020-09-22 | At&T Intellectual Property I, L.P. | Method and procedure for generating reputation scores for IoT devices based on distributed analysis |
Also Published As
Publication number | Publication date |
---|---|
CN103812696A (en) | 2014-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112348204B (en) | A method for data security sharing of marine Internet of Things under the framework of edge computing based on federated learning and blockchain technology | |
CN114091356B (en) | Method and device for federated learning | |
Theodorakopoulos et al. | Trust evaluation in ad-hoc networks | |
CN113660668A (en) | A seamless trusted cross-domain routing system for heterogeneous converged networks and its control method | |
Abou El Houda et al. | Securing federated learning through blockchain and explainable AI for robust intrusion detection in IoT networks | |
CN103812696B (en) | A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm | |
CN114363043B (en) | Asynchronous federal learning method based on verifiable aggregation and differential privacy in peer-to-peer network | |
CN110602062B (en) | Network active defense method and device based on reinforcement learning | |
CN102333096A (en) | Reputation Control Method and System for Anonymous Communication System | |
JP2014505301A (en) | Credit management method and system in distributed computing system | |
CN115208655B (en) | A device authentication processing method applied to industrial Internet cloud service platform | |
Li et al. | Mitigating routing misbehavior using blockchain-based distributed reputation management system for IoT networks | |
Wang et al. | Toward a trust evaluation framework against malicious behaviors of industrial IoT | |
CN116684123A (en) | Dynamic trust evaluation method and device in micro-isolation cloud environment | |
CN118940865A (en) | Robust and efficient decentralized federated learning method and system based on committee consensus | |
CN105049354A (en) | Trustful routing method based on OSPF | |
Wang et al. | Optimal repair strategy against advanced persistent threats under time-varying networks | |
CN116471072A (en) | A Federated Quality of Service Prediction Method Based on Neighbor Cooperation | |
Zheng et al. | A reliable and decentralized trust management model for fog computing in industrial IoT | |
Malladi et al. | Decentralized aggregation design and study of federated learning | |
Zhang et al. | Securing distributed network digital twin systems against model poisoning attacks | |
CN101969405A (en) | Safe routing method based on credibility in P2P (Peer-to-Peer) environment | |
CN117097563B (en) | A data sharing method and system for privacy protection | |
Cai et al. | Containing sybil attacks on trust management schemes for peer-to-peer networks | |
CN118233317A (en) | Topology confusion defense method based on time-based network inference |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20191104 Address after: 471000 Room 202, building 3-1, science and Technology Park, Luoyang National University, Longyu Road, Jianxi District, Luoyang area, China (Henan) pilot Free Trade Zone, Luoyang City, Henan Province Patentee after: Henan gunz Information Technology Co., Ltd Address before: 471000 Xiyuan Road, Jianxi District, Henan, No. 48, No. Patentee before: Henan University of Science and Technology |