期刊文献+

一种基于G(1,1)改进模型的WSN流量异常检测方法 被引量:1

An Abnormity Detection Method of WSN Data Flow Based on Grey Prediction Theory
下载PDF
导出
摘要 提出了一种基于灰系统预测理论的无线传感器网络数据流异常检测方法,并使用组合优化策略进行了改进,用轮转迭代法求得组合优化参数.实验结果表明:经过3次迭代,该方法即可较标准G(1,1)模型降低59.5%的误差,其能耗低于时间序列分析常用算法ARMA.该方法既可以在传感器节点使用,也可以在sink节点使用,具有所需原始数据少、建模快、实时性和适用性强、扩展性好等特点,弥补了传感器网络节点资源受限的不足. An abnormity detection method of WSN data flow based on Grey System Prediction theory is presented in this paper. This method modified and optimized the basic grey system method G(1,1) with adapting different λ, parameter. Tests and simulation results show that the energy consumption with this method decreases greatly and obviously than ARMA, and only through 3 times iterations the prediction error decreases 59.5. This method can meet with the resource limitation of WSN.
出处 《中南民族大学学报(自然科学版)》 CAS 2008年第4期66-69,共4页 Journal of South-Central University for Nationalities:Natural Science Edition
基金 重庆市科委自然科学基金资助项目(CSTC2006BB2430) 重庆工学院科研启动项目(2008ZD24)
关键词 无线传感器网络 数据流预测 异常检测 WSN flow prediction grey system
  • 相关文献

参考文献7

  • 1Zhang Jinrong, Wang D, Zhuang L. A method of energy estimation for wireless sensors networks [C ]// ASP. Proceedings of the International Symposium on Computer Science and Technology. Ningbo : ASP, 2007 : 928-931.
  • 2Onat, Miri A. An intrusion detection system for wireless sensor networks [C].//IEEE. Proceedings of the Wireless and Mobile Computing, Networking and Communications. Los : IEEE, 2005 : 253-259.
  • 3Loo C E, Ng M Y, Leckie C, et al. Intrusion detection for routing attacks in sensor networks [J]. Distributed Sensor Networks, 2006(3) : 125-131.
  • 4徐帆,马广富.基于ARIMA模型的光纤陀螺随机漂移滤波方法研究[J].传感器与微系统,2007,26(2):31-32. 被引量:11
  • 5Doumit S, Agrawal D P. Self-organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks [ C ]// IEEE. Proceedings of the Military Communications Conference. Boston: IEEE, 2003:609-614.
  • 6Afrand A, Sajal K. A game theory based approach for security in wireless sensor networks[C]//IEEE. Performance Computing and Communications Conference. Detroit :IEEE, 2004 : 259-263.
  • 7黄光球,汪晓海.基于BP-HMM的网络入侵检测方法研究[J].计算机工程,2007,33(10):131-133. 被引量:2

二级参考文献14

共引文献11

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部