The Study of Trust Evaluation Model Based on Improved AHP and Cloud Model in IoT

Article Preview

Abstract:

Because nodes in the loT(Internet of Things) are widely distributed and most of them are unattended, so single node is vulnerable to be attacked and destroyed. Once one node is destroyed or attacked, the whole loT will be faced with tremendous security problems. This paper proposed a Trust Evaluation Model of loT based on AHP and Backward Cloud Model. In the model, in order to be solve the problem that nodes in loT have limited resources, the paper made use of the improved AHP(Analytic Hierarchy Process) and Reverse Cloud Model method, which can work with simple calculation and few resources. In the last, we simulate the method using omnet++ and simulation result show that the model can evaluate the trust value of the malicious node that executes bad communication behaviours fast and also reduce the possibility of wrong judgment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

258-263

Citation:

Online since:

April 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Zhao Yi, Adve R, Lim T J. Improving Amplify and Forward Relay Networks: Optimal Power Allocation Versus Selection [J]. IEEE Transactions on Wireless Communications, 2007, 6(8): 3114-3123.

DOI: 10.1109/isit.2006.262002

Google Scholar

[2] Zhao Z, Wei B, Dong X. Detecting wormhole attacks in wireless sensor networks with statistical analysis[C]/Proceedings of the International Conference on Information Engineering, 2010: 251-254.

DOI: 10.1109/icie.2010.66

Google Scholar

[3] Liu Chang yu, Feng Mang, Dai Xiaojun, et. al. A New Algorithm of Backward Cloud [J], Journal of System Simulation, 2004, 16(11): 2417-2420.

Google Scholar

[4] Wang Yingming, An Overview of Priority Methods of Comparison Matrix, Journal of Decision Making and Decisions Support Systems, 1995, (3): 101~114.

Google Scholar

[5] Li Meixia, A New Method for Improving the Consistency of the Comparison Matrix in AHP, Systems Engineering – Theory & Practice [J], 2000, 20(2): 122~125.

Google Scholar

[6] Atakli I, Hu H, Chen Y, etal. Malicious node detection in wireless sensor networks using weighted trust evaluation[C]/The ACM/SIGSIM Symposium on Simulation of System Security, 2008: 836-843.

Google Scholar