期刊文献+

无线传感器网络基于节点行为的信誉评测模型 被引量:23

Reputation model based on behaviors of sensor nodes in WSN
下载PDF
导出
摘要 提出了一种无线传感器网络下的节点行为评测模型MA&TP-BRSN。MA&TP-BRSN综合考虑了网内节点的多种内部攻击行为和自私行为,并给出了对应于各类攻击的节点信任值的计算和整合方法。同时,为了消除测评过程中第三方节点恶意推荐和诋毁行为对测评结果的影响,MA&TP-BRSN引入了节点评价行为的概念,将节点评价行为与通信行为区分开来,建立了对第三方节点恶意评价行为的具体测评方法,并在此基础上给出了节点间接信誉参数的更新计算方法。实验结果表明,该模型能够更快更准确地识别出具有多种恶意行为的内部节点,并在一定程度上消除了高信誉节点的恶意诽谤行为对测评结果的影响。 A reputation model MA&TP-BRSN for evaluating behaviors of sensor nodes in WSN was proposed. In MA&TP-BRSN, multiple internal attacks and selfish behaviors of nodes were synthetically considered, and the methods for calculating and integrating the credibility aiming at various types of attacks were given. Moreover, in order to elimi- nate the influence upon the evaluation results affected by malicious recommendation and defamation behaviors of the third party, the conception of evaluation behavior of node was introduced into MA&TP-BRSN so as to distinguish evaluation behavior from communication behavior of node, then the concrete method for evaluating the malicious evaluation behaviors of the third party was established and the methods for updating and calculating the indirect reputa- tion parameters of nodes were given in MA&TP-BRSN. The experimental results show that MA&TP-BRSN has better performance in terms of resisting the malicious defamation behaviors of high credit-grade nodes and identifying the internal malicious nodes which launch multiple attacks.
出处 《通信学报》 EI CSCD 北大核心 2009年第12期18-26,共9页 Journal on Communications
基金 国家242信息安全计划基金资助项目(2007B17) 国家自然科学基金资助项目(60803144)~~
关键词 无线传感器网络 安全 信誉机制 评价行为 BETA分布 wireless sensor networks security reputation system evaluation behavior Beta distribution
  • 相关文献

参考文献16

  • 1TIAN D, GEORGANAS N D. Energy efficient routing with guaranteed delivery in wireless sensor networks[A}. Proceedings of the IEEE Wireless Communication and Networking(WCNC 2003)[C]. New Orleans, LA, USA: IEEE, 2003. 1923-1929.
  • 2TSENG C Y, BALASUBRAMANYAM P, KO C, et al. A specification-based intrusion detection system for AODV[A]. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C]. Fairfax, VA, USA: ACM, 2003. 125-134.
  • 3DA SILVA A P R, MARTINS M H T, ROCHA B P S, et aL Decentralized intrusion detection in wireless sensor networks[A]. Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks (Q2SWinet'05)[C]. Montreal, Quebec, Canada: ACM, 2005. 16-22.
  • 4KHALIL I, BAGCHI S, NINA-ROTARU C. DICAS: detection, diagnosis and isolation of control attacks in sensor networks[A]. Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Wireless Networks[C]. Athens, Greece: IEEE, 2005, 2(3): 89-100.
  • 5SUN B, WU K, POOCH U W. Zone-based intrusion detection for mobile ad hoc networks[J]. Ad Hoc & Sensor Wireless Networks. 2006,2(3): 15-28.
  • 6俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:24
  • 7BUCHEGGER S, BOUDEC J L. The Selfish Node: Increasing Roiting Secirity in Mobile Ad Hoc Networks[R]. Research Report RR 3354, IBM, 2001.
  • 8BUCHEGGER S, BOUDEC J L. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks[A]. Proceedings of the Tenth Euromicro Workshop on Parallel, Distribited and Network-based Processing[C]. Spain:IEEE, 2002. 403-410.
  • 9BUCHEGGER S, BOUDEC J L. Performance analysis of the confidant protocol: cooperation of nodes-fairness in dynamic ad-hoc networks[A]. Proceedings of IEEE/ACM Symposiim on Mobile Ad Hoc Networking and Computing (MobiHOC)[C]. Lausanne, CH: IEEE/ ACM, 2006. 226-236.
  • 10YAU P W, MITCHELL C J. Reputation methods for routing security for mobile ad hoc network[A]. Proceedings of Joint IST Workshop on Mobile Fitire and Symposiim on Trends in Comminications (SympoTIC'03)[C]. Bratislava, Slovakia: IEEE, 2003. 130-137.

二级参考文献20

  • 1Karlof C. , Wagner D.Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003, 113-127
  • 2Intanagonwiwat C. , Govindan R. , Estrin D.. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proceedings of the ACM MobiCom 2000, Boston, USA, 2000, 56-67
  • 3Karp B. , Kung H. T.. GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the ACM Mobi-Com 2000, Boston, USA, 2000, 243-254
  • 4Yu B. , Xiao B: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the 2nd International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), Greece, 2006
  • 5Yang H. , Ye F. , Yuan Y. , Lu S. , Arbaugh W.. Toward resilient security in wireless sensor networks. In: Proceedings of the ACM MobiHoc 2005, Cologne, Germany, 2005, 34-45
  • 6Wan C. Y. , Campbell A. T. , Krishnamurthy L.. PSFQ: A reliable transport protocol for wireless sensor networks. In:Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, USA, 2002,1-11
  • 7Zhu S. , Setia S. , Jajodia S. , Peng N.. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, USA, 2004,259-271
  • 8Lamport L.. Constructing digital signatures from one-way function. SRI International: Technical Report SRI-CSL-98,SRI International, 1979
  • 9Adrian P. , Robert S. , Victor W. , David C. , Doug T..SPINS: Security protocols for sensor networks. In: Proceedings of the ACM Mobicom 2001, Rame, Italy, 2001, 189-199
  • 10Perrig A,Szewczyk R,Wen V,Culler D,Tygar D.SPINS:Security Protocols for Sensor Networks.Wireless Networks Journal,September 2002

共引文献32

同被引文献206

引证文献23

二级引证文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部