Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.3837/tiis.2020.04.020
Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays.They have many military and civil applications.Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems.In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed.First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth.Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list.Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm.Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head.The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3837/tiis.2020.04.020
- http://itiis.org/digital-library/manuscript/file/23440/TIIS Vol 14, No 4-20.pdf
- OA Status
- diamond
- Cited By
- 2
- References
- 41
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3034548066
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3034548066Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3837/tiis.2020.04.020Digital Object Identifier
- Title
-
Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles NetworkWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-04-30Full publication date if available
- Authors
-
Jingxian Zhou, Zengqi WangList of authors in order
- Landing page
-
https://doi.org/10.3837/tiis.2020.04.020Publisher landing page
- PDF URL
-
https://itiis.org/digital-library/manuscript/file/23440/TIIS Vol 14, No 4-20.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://itiis.org/digital-library/manuscript/file/23440/TIIS Vol 14, No 4-20.pdfDirect OA link when available
- Concepts
-
Computer science, Cluster analysis, Artificial intelligence, Algorithm, Data miningTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 1, 2022: 1Per-year citation counts (last 5 years)
- References (count)
-
41Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3034548066 |
|---|---|
| doi | https://doi.org/10.3837/tiis.2020.04.020 |
| ids.doi | https://doi.org/10.3837/tiis.2020.04.020 |
| ids.mag | 3034548066 |
| ids.openalex | https://openalex.org/W3034548066 |
| fwci | 0.59732124 |
| type | article |
| title | Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network |
| biblio.issue | 4 |
| biblio.volume | 14 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11133 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2202 |
| topics[0].subfield.display_name | Aerospace Engineering |
| topics[0].display_name | UAV Applications and Optimization |
| topics[1].id | https://openalex.org/T10246 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9987000226974487 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Mobile Ad Hoc Networks |
| topics[2].id | https://openalex.org/T10761 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9983000159263611 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2208 |
| topics[2].subfield.display_name | Electrical and Electronic Engineering |
| topics[2].display_name | Vehicular Ad Hoc Networks (VANETs) |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.9055726528167725 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C73555534 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6790471076965332 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q622825 |
| concepts[1].display_name | Cluster analysis |
| concepts[2].id | https://openalex.org/C154945302 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3684072494506836 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[2].display_name | Artificial intelligence |
| concepts[3].id | https://openalex.org/C11413529 |
| concepts[3].level | 1 |
| concepts[3].score | 0.34151923656463623 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[3].display_name | Algorithm |
| concepts[4].id | https://openalex.org/C124101348 |
| concepts[4].level | 1 |
| concepts[4].score | 0.33296841382980347 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[4].display_name | Data mining |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.9055726528167725 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/cluster-analysis |
| keywords[1].score | 0.6790471076965332 |
| keywords[1].display_name | Cluster analysis |
| keywords[2].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[2].score | 0.3684072494506836 |
| keywords[2].display_name | Artificial intelligence |
| keywords[3].id | https://openalex.org/keywords/algorithm |
| keywords[3].score | 0.34151923656463623 |
| keywords[3].display_name | Algorithm |
| keywords[4].id | https://openalex.org/keywords/data-mining |
| keywords[4].score | 0.33296841382980347 |
| keywords[4].display_name | Data mining |
| language | en |
| locations[0].id | doi:10.3837/tiis.2020.04.020 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S204131793 |
| locations[0].source.issn | 1976-7277, 2288-1468 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1976-7277 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | KSII Transactions on Internet and Information Systems |
| locations[0].source.host_organization | https://openalex.org/P4323966148 |
| locations[0].source.host_organization_name | Korea Society of Internet Information |
| locations[0].source.host_organization_lineage | https://openalex.org/P4323966148 |
| locations[0].source.host_organization_lineage_names | Korea Society of Internet Information |
| locations[0].license | |
| locations[0].pdf_url | http://itiis.org/digital-library/manuscript/file/23440/TIIS Vol 14, No 4-20.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | KSII Transactions on Internet and Information Systems |
| locations[0].landing_page_url | https://doi.org/10.3837/tiis.2020.04.020 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5084291496 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-0773-7529 |
| authorships[0].author.display_name | Jingxian Zhou |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I28813325 |
| authorships[0].affiliations[0].raw_affiliation_string | Information Security Evaluation Center, Civil Aviation University of China, Tianjin 300300, China |
| authorships[0].institutions[0].id | https://openalex.org/I28813325 |
| authorships[0].institutions[0].ror | https://ror.org/03je71k37 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I28813325 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Civil Aviation University of China |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Jingxian Zhou |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Information Security Evaluation Center, Civil Aviation University of China, Tianjin 300300, China |
| authorships[1].author.id | https://openalex.org/A5004315285 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-6087-4023 |
| authorships[1].author.display_name | Zengqi Wang |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I28813325 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China |
| authorships[1].affiliations[1].institution_ids | https://openalex.org/I28813325 |
| authorships[1].affiliations[1].raw_affiliation_string | Information Security Evaluation Center, Civil Aviation University of China, Tianjin 300300, China |
| authorships[1].institutions[0].id | https://openalex.org/I28813325 |
| authorships[1].institutions[0].ror | https://ror.org/03je71k37 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I28813325 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Civil Aviation University of China |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Zengqi Wang |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | Information Security Evaluation Center, Civil Aviation University of China, Tianjin 300300, China, School of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://itiis.org/digital-library/manuscript/file/23440/TIIS Vol 14, No 4-20.pdf |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2020-06-19T00:00:00 |
| display_name | Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11133 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2202 |
| primary_topic.subfield.display_name | Aerospace Engineering |
| primary_topic.display_name | UAV Applications and Optimization |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W2051487156, https://openalex.org/W2073681303, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W2317200988, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W2382290278, https://openalex.org/W2350741829 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2022 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.3837/tiis.2020.04.020 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S204131793 |
| best_oa_location.source.issn | 1976-7277, 2288-1468 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1976-7277 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | KSII Transactions on Internet and Information Systems |
| best_oa_location.source.host_organization | https://openalex.org/P4323966148 |
| best_oa_location.source.host_organization_name | Korea Society of Internet Information |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4323966148 |
| best_oa_location.source.host_organization_lineage_names | Korea Society of Internet Information |
| best_oa_location.license | |
| best_oa_location.pdf_url | http://itiis.org/digital-library/manuscript/file/23440/TIIS Vol 14, No 4-20.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | KSII Transactions on Internet and Information Systems |
| best_oa_location.landing_page_url | https://doi.org/10.3837/tiis.2020.04.020 |
| primary_location.id | doi:10.3837/tiis.2020.04.020 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S204131793 |
| primary_location.source.issn | 1976-7277, 2288-1468 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1976-7277 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | KSII Transactions on Internet and Information Systems |
| primary_location.source.host_organization | https://openalex.org/P4323966148 |
| primary_location.source.host_organization_name | Korea Society of Internet Information |
| primary_location.source.host_organization_lineage | https://openalex.org/P4323966148 |
| primary_location.source.host_organization_lineage_names | Korea Society of Internet Information |
| primary_location.license | |
| primary_location.pdf_url | http://itiis.org/digital-library/manuscript/file/23440/TIIS Vol 14, No 4-20.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | KSII Transactions on Internet and Information Systems |
| primary_location.landing_page_url | https://doi.org/10.3837/tiis.2020.04.020 |
| publication_date | 2020-04-30 |
| publication_year | 2020 |
| referenced_works | https://openalex.org/W2905868361, https://openalex.org/W2905668437, https://openalex.org/W2741178546, https://openalex.org/W2413631189, https://openalex.org/W2522153945, https://openalex.org/W2801955092, https://openalex.org/W2799134332, https://openalex.org/W6738745395, https://openalex.org/W2558393028, https://openalex.org/W2573790339, https://openalex.org/W2105062250, https://openalex.org/W2436063586, https://openalex.org/W6672116132, https://openalex.org/W3102256802, https://openalex.org/W2080403625, https://openalex.org/W2768798944, https://openalex.org/W2100752149, https://openalex.org/W2314623158, https://openalex.org/W2056915251, https://openalex.org/W2744641727, https://openalex.org/W1793726302, https://openalex.org/W2789423542, https://openalex.org/W6758954770, https://openalex.org/W2801657562, https://openalex.org/W6635537018, https://openalex.org/W1964929377, https://openalex.org/W2800426781, https://openalex.org/W6996041998, https://openalex.org/W6678846962, https://openalex.org/W2048856507, https://openalex.org/W2041380949, https://openalex.org/W2913767944, https://openalex.org/W2621944982, https://openalex.org/W2034419870, https://openalex.org/W1590837670, https://openalex.org/W2101678493, https://openalex.org/W2621151963, https://openalex.org/W4213147678, https://openalex.org/W1509506948, https://openalex.org/W2127931941, https://openalex.org/W2086976228 |
| referenced_works_count | 41 |
| abstract_inverted_index.a | 6, 47, 113, 153, 162 |
| abstract_inverted_index.an | 61 |
| abstract_inverted_index.by | 41, 75 |
| abstract_inverted_index.is | 59, 66 |
| abstract_inverted_index.of | 25, 43, 73, 85, 119, 128, 142, 152 |
| abstract_inverted_index.on | 52 |
| abstract_inverted_index.to | 37, 68, 96, 106, 145 |
| abstract_inverted_index.we | 35, 88 |
| abstract_inverted_index.and | 15, 22, 46, 100, 111, 122, 138, 166 |
| abstract_inverted_index.are | 5 |
| abstract_inverted_index.for | 56 |
| abstract_inverted_index.the | 19, 63, 70, 76, 82, 92, 102, 126, 132, 139, 143, 147, 157 |
| abstract_inverted_index.try | 36 |
| abstract_inverted_index.use | 84 |
| abstract_inverted_index.UAVs | 27, 57 |
| abstract_inverted_index.area | 10 |
| abstract_inverted_index.best | 148 |
| abstract_inverted_index.have | 12 |
| abstract_inverted_index.head | 114, 123 |
| abstract_inverted_index.high | 20, 120 |
| abstract_inverted_index.link | 93 |
| abstract_inverted_index.list | 124 |
| abstract_inverted_index.load | 165 |
| abstract_inverted_index.main | 31 |
| abstract_inverted_index.many | 13 |
| abstract_inverted_index.node | 98 |
| abstract_inverted_index.that | 156 |
| abstract_inverted_index.this | 33 |
| abstract_inverted_index.time | 95 |
| abstract_inverted_index.used | 101 |
| abstract_inverted_index.very | 7 |
| abstract_inverted_index.based | 51 |
| abstract_inverted_index.civil | 16 |
| abstract_inverted_index.means | 42 |
| abstract_inverted_index.micro | 26 |
| abstract_inverted_index.nodes | 110, 144 |
| abstract_inverted_index.their | 29 |
| abstract_inverted_index.these | 39 |
| abstract_inverted_index.three | 30 |
| abstract_inverted_index.trust | 54, 104 |
| abstract_inverted_index.value | 55, 105 |
| abstract_inverted_index.which | 80 |
| abstract_inverted_index.(UAVs) | 3 |
| abstract_inverted_index.aerial | 1 |
| abstract_inverted_index.detect | 108 |
| abstract_inverted_index.energy | 134 |
| abstract_inverted_index.higher | 167 |
| abstract_inverted_index.impact | 118 |
| abstract_inverted_index.number | 72 |
| abstract_inverted_index.paper, | 34 |
| abstract_inverted_index.ratio, | 135 |
| abstract_inverted_index.reduce | 117 |
| abstract_inverted_index.secure | 23, 44 |
| abstract_inverted_index.select | 146 |
| abstract_inverted_index.showed | 155 |
| abstract_inverted_index.address | 38 |
| abstract_inverted_index.cluster | 149 |
| abstract_inverted_index.degrees | 141 |
| abstract_inverted_index.enhance | 125 |
| abstract_inverted_index.ensures | 81 |
| abstract_inverted_index.improve | 97 |
| abstract_inverted_index.network | 4, 58, 77, 86, 168 |
| abstract_inverted_index.optimal | 71, 83 |
| abstract_inverted_index.rapidly | 107 |
| abstract_inverted_index.results | 151 |
| abstract_inverted_index.smaller | 163 |
| abstract_inverted_index.vibrant | 8 |
| abstract_inverted_index.Unmanned | 0 |
| abstract_inverted_index.clusters | 74 |
| abstract_inverted_index.combined | 131 |
| abstract_inverted_index.head.The | 150 |
| abstract_inverted_index.improved | 62 |
| abstract_inverted_index.incurred | 161 |
| abstract_inverted_index.military | 14 |
| abstract_inverted_index.mobility | 21, 121 |
| abstract_inverted_index.problems | 40 |
| abstract_inverted_index.proposed | 158 |
| abstract_inverted_index.relative | 136, 140 |
| abstract_inverted_index.research | 9 |
| abstract_inverted_index.security | 48, 127 |
| abstract_inverted_index.vehicles | 2 |
| abstract_inverted_index.algorithm | 50, 65, 160 |
| abstract_inverted_index.bandwidth | 78 |
| abstract_inverted_index.determine | 69 |
| abstract_inverted_index.establish | 112 |
| abstract_inverted_index.k-means++ | 64 |
| abstract_inverted_index.list.Node | 115 |
| abstract_inverted_index.malicious | 109 |
| abstract_inverted_index.mobility, | 137 |
| abstract_inverted_index.presented | 67 |
| abstract_inverted_index.remaining | 133 |
| abstract_inverted_index.represent | 28 |
| abstract_inverted_index.security. | 169 |
| abstract_inverted_index.variables | 90 |
| abstract_inverted_index.bandwidth, | 18 |
| abstract_inverted_index.clustering | 49, 116, 129, 159 |
| abstract_inverted_index.considered | 89 |
| abstract_inverted_index.expiration | 94 |
| abstract_inverted_index.integrated | 53, 103 |
| abstract_inverted_index.parameter, | 79 |
| abstract_inverted_index.simulation | 154 |
| abstract_inverted_index.clustering, | 45, 99 |
| abstract_inverted_index.problems.In | 32 |
| abstract_inverted_index.representing | 91 |
| abstract_inverted_index.communication | 24 |
| abstract_inverted_index.computational | 164 |
| abstract_inverted_index.nowadays.They | 11 |
| abstract_inverted_index.proposed.First, | 60 |
| abstract_inverted_index.bandwidth.Second, | 87 |
| abstract_inverted_index.algorithm.Finally, | 130 |
| abstract_inverted_index.applications.Limited | 17 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5004315285 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| corresponding_institution_ids | https://openalex.org/I28813325 |
| citation_normalized_percentile.value | 0.78185331 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |