期刊文献+

基于多元分类的无线传感器网络恶意节点检测算法 被引量:15

Multivariate Classification-Based Malicious Node Detection for Wireless Sensor Network
下载PDF
导出
摘要 无线传感器网络是一个暴露在开放环境中的分布式网络,各节点之间相互独立,缺乏中心节点和监控节点,极易受到恶意节点的攻击。为了对无线传感器网络中的大量传感器节点进行恶意节点检测,提出了一种基于多元分类的恶意节点检测方法。提出的检测方法是在已知少量传感器节点类型的前提下,抽取与已知恶意节点类型相关的传感器节点属性,建立关于全部参与网络活动的传感器节点的样本空间,通过多元分类算法对已知类型传感器节点的样本进行学习,生成分类器,然后对未知类型传感器节点进行分类。实验结果表明在传感器节点属性值以及活跃节点个数稳定的情况下,误检率能够稳定在0.5%以下。 Wireless Sensor Network(WSN)is a distributed network exposed to an open environment.In a WSN,there are few central nodes or monitoring nodes and each node is independent.So WSNs are vulnerable to malicious nodes.In order to find out malicious nodes among a wireless sensor network with mass sensor nodes,this paper presents a malicious detection method based on multivariate classification.Given the types of a few sensor nodes,it extracts sensor nodes' preferences related with the known types of malicious node,establishes the sample space of all sensor nodes that participate in network activities.Then,according to the study on the type-known sensor nodes' samples based on the multivariate classification algorithm,a classifier is generated,and all the unknown-type sensor nodes are classified.The experiment results show that as long as the value of sensor nodes preferences and the number of active sensor nodes is stable,the false detection rate is stabilized under 0.5%.
出处 《传感技术学报》 CAS CSCD 北大核心 2011年第5期771-777,共7页 Chinese Journal of Sensors and Actuators
基金 国家科技重大专项项目(2009ZX03001-016-02-04 2009ZX03004-005-01)
关键词 无线传感器网络 恶意节点检测 多元分类 网络层攻击 wireless sensor network malicious node detection multivariate classification network layer attack
  • 相关文献

参考文献12

  • 1Xia Yong-Xiang, Hu Zhi-Hua, Shi Zhi-Cai. A Framework for Distributed Incremental Intrusion Detection Based on SVM [ C ]// Proc. of the Asia-Pacific Conference on Computational Intelligence and Industrial Applications, 2009 : 369- 272.
  • 2IAu Fang, Chertg Xiuzhen, Chert Dechang Insider Attacker Detection in Wireless Sensor Networks[ C ]//Proe. of the 2007 26th IEEE In- ternational Conference on Computer Communications, 2007:1937 -1945.
  • 3Yin Qing-Bo, Shen Li-Ran,Zhang Ru-Bo, et al. Intrusion Detection Based on Hidden Markov Model [ C ]//Proc. of the Second International Conference on Machine Learning and Cybernetics. Xi' an,2003:2-5.
  • 4NRL's Sensor Network Extension to ns-2 [ CP/OL ]. http ://pf. itd. nrl. navy. mil/nrlsensorsim.
  • 5Tilak S, Abu-Ghazaleh N B, Heinzelman W. Taxonomy of Wireless Micro-Sensor Network Models[ J]. Mobile Computing and Commu- nications Review ,2002,1 (2) : 1-8.
  • 6Kaplantzis S, Shilton A, Man. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines [ C ]// Proc. of the 3rd International Conference on Intelligent Sensors,Sensor Networks and Information ,2007 :335-340.
  • 7Tseng Chin-Yang,Poornima Balasubramanyam, Calvin Ko, et al. A Specification-based Detection System for AODV[ C ]//Proc. of the 2003 ACM Workshop on Security of Ad H and Sensor Networks,2003 : 125-134.
  • 8Alpaydin E. Introduction to Machine Learning [ M ] :2nd edition. Cambridge : The MIT Press,2010 : 197-199.
  • 9Karpand B, Kung H T. GPSR : Greedy Perimeter Stateless Routing for Wireless Networks [ C ]//Proc. of Mobile Computing and Networking,2000:243-254.
  • 10Watro R, Kong D, Cuti S, et al. TinyPK : Securing Sensor Networks with Public Key Technology [ C ]//Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks,2004:59-64.

同被引文献124

引证文献15

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部