期刊文献+

WSNs基于信誉机制的恶意节点识别模型 被引量:9

A reputation-based model for malicious node detection in WSNs
下载PDF
导出
摘要 为了抵御无线传感器网络内部节点的拜占庭行为以及自私行为,针对现有恶意节点识别系统检测功能单一、不可抵御高信誉节点的恶意诽谤行为等问题.提出了一种无线传感器网络下的恶意节点识别模型,该模型采用Beta分布描述信誉分布,引入了第三方节点的间接可信度,并将多种攻击类型相对应的节点信任值进行整合.仿真实验表明,该模型能够更快更准确地识别出发起多种攻击的恶意节点,并在一定程度上抵御了高信誉节点的恶意诽谤行为. To resist Byzantine behaviors and selfish behaviors of internal nodes, aimed at the problem that the existing malicious node detection systems can not resist the malicious deceit behaviors of high credit-grade nodes due to their single detection function, a reputation-based model for malicious node detection in WSNs is proposed. In this model, the beta distribution is used to describe the reputation distribution, the indirect reliability of the third-party nodes is introduced, and the trust values of nodes belonging to different types of attacks are integrated together. Simulation results show that the proposed model has better performance in terms of resisting the malicious deceit behaviors of high credit-grade nodes and identifying the malicious nodes which launch various types of attacks.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2009年第10期158-162,共5页 Journal of Harbin Institute of Technology
基金 国家自然科学基金资助项目(60803144) 国家242信息安全计划资助项目(2007B17)
关键词 无线传感器网络 安全 信誉机制 BETA分布 wireless sensor networks (WSNs) security reputation system beta distribution
  • 相关文献

参考文献14

  • 1DA SILVA A P R, MARTINS M H T, ROCHA B P S, et al. Decentralized intrusion detection in wireless sensor networks [ C]//Proceedings of the 1^st ACM international workshop on Quality of service & security in wireless and mobile networks( Q2SWinet'05), Canada: ACM, 2005 : 16 - 22.
  • 2KHALI I, BAGCHI S, NINA-ROTARI C. DICAS: detection, diagnosis and isolation of control attacks in sensor networks [ C]//Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Greece: IEEE, 2005 : 89 - 100.
  • 3TSENG C Y, BALASUBRAMANYAM P, KO C, et al. A specification-based intrusion detection system for AODV [C]//Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks ( SASN03), USA : ACM, 2003 : 125 - 134.
  • 4SUN B, WU K, POOCH U W. Zone-based intrusion detection for mobile Ad Hoc networks [J]. Ad hoc & Sensor.Networks, 2006 : 15 - 28.
  • 5TIAN D, GEORGANAS N D. Energy efficient routing with guaranteed delivery in wireless sensor networks [ C ]// Proceedings of the IEEE Wireless Communication and Networking ( WCNC 2003 ), New Orleans : IEEE, 2003 : 1923 - 1929.
  • 6俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 7BUCHEGGER S, BOUDEC J L. The selfish node: increasing roiting secirity in mobile ad hoc networks [ R].Research Report RR 3354, IBM, 2001.
  • 8BUCHEGGER S, BOUDEC J L. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks[ C]//Proceedings of the Tenth Euromicro Workshop on Parallel, Distribited and Network - based Processing, Spain: IEEE, 2002 : 403 - 410.
  • 9BUCHEGGER S, BOUDEC J L. Performance analysis of the confidant protocol: cooperation of nodes-fairness in dynamic Ad-Hoc networks [ C ]//proceedings of IEEE/ ACM Symposiim on Mobile Ad Hoc Networking and Computing ( MobiHOC ), Lausanne : IEEE/ACM, 2006 : 226 -236.
  • 10YAU P W, MITCHELL C J. Reputation methods for routing security for mobile ad hoc network [ C ]//proceedings of Joint IST Workshop on Mobile Fitire and Symposiim on Trends in Comminications ( SympoTIC ' 03), Slovakia: IEEE, 2003: 130- 137.

二级参考文献20

  • 1Karlof C. , Wagner D.Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003, 113-127
  • 2Intanagonwiwat C. , Govindan R. , Estrin D.. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proceedings of the ACM MobiCom 2000, Boston, USA, 2000, 56-67
  • 3Karp B. , Kung H. T.. GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the ACM Mobi-Com 2000, Boston, USA, 2000, 243-254
  • 4Yu B. , Xiao B: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the 2nd International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), Greece, 2006
  • 5Yang H. , Ye F. , Yuan Y. , Lu S. , Arbaugh W.. Toward resilient security in wireless sensor networks. In: Proceedings of the ACM MobiHoc 2005, Cologne, Germany, 2005, 34-45
  • 6Wan C. Y. , Campbell A. T. , Krishnamurthy L.. PSFQ: A reliable transport protocol for wireless sensor networks. In:Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, USA, 2002,1-11
  • 7Zhu S. , Setia S. , Jajodia S. , Peng N.. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, USA, 2004,259-271
  • 8Lamport L.. Constructing digital signatures from one-way function. SRI International: Technical Report SRI-CSL-98,SRI International, 1979
  • 9Adrian P. , Robert S. , Victor W. , David C. , Doug T..SPINS: Security protocols for sensor networks. In: Proceedings of the ACM Mobicom 2001, Rame, Italy, 2001, 189-199
  • 10Perrig A,Szewczyk R,Wen V,Culler D,Tygar D.SPINS:Security Protocols for Sensor Networks.Wireless Networks Journal,September 2002

共引文献31

同被引文献49

  • 1崔慧,潘巨龙,闫丹丹.无线传感器网络中基于信誉-投票机制的恶意节点检测[J].中国计量学院学报,2013,24(4):353-359. 被引量:7
  • 2崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 3陶砚蕴,徐萃华,林家骏.无线传感器网络的安全性研究[J].计算机安全,2007(4):8-13. 被引量:3
  • 4肖德琴,冯健昭,杨波,张焕国.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87. 被引量:11
  • 5Pietro Michiardi, Refik Molva. Core:a collaborative reputation mechanism to enforce node cooperation in mobile AdHoc networks[A]. Sixth IFIP conference on secirity communications and multimedia(CMS2002) [C] . Portoroz,Slovenia,2002:107-121.
  • 6S. Bansal, M. Baker. Observation-based cooperation enforeement in Adhoc networks. Research Reports. N1/0307012. Stanford Iniversity, 2003.
  • 7Saurabh Ganeriwal,ManiB Srivastava. Reputation-based Frame- work for Highlntegrity Sensor Networks. SASN,2004:66-77.
  • 8Tian D, Georganas N D. Energy efficient routing with guaranteed delivery in wireless sensor networks / / Proceedings of the IEEE wireless communication and networking (WCNC 2003) New Orleans: IEEE, 2003:1923-1929.
  • 9Ganeriwal S, Srivastava M B. Reputation based ramework for high integrity sensor networks//proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks ( SASN' 04 ), New York: ACM, 2004:66 - 77.
  • 10Sun B , Wu K, Pooch U W. Zone--based intrusion detection for mobile ad hoc networks.Ad hoc & sensor wireless networks.2006,2(3): 1542-1552.

引证文献9

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部