期刊文献+

基于层次混合的高效概率包标记WSNs节点定位算法 被引量:3

An Efficient Probabilistic Packet Marking Node Localization Algorithm Based on Layers-mixed in WSNs
下载PDF
导出
摘要 在利用概率包标记技术对无线传感器网络(WSN)恶意节点的追踪定位中,标记概率的确定是关键,直接影响到算法的收敛性,最弱链,节点负担等方面。该文分析并指出了基本概率包标记(BPPM)和等概率包标记(EPPM)方法的缺点,提出了一种层次式混合概率包标记(LMPPM)算法,可以克服以上算法的不足。该算法对无线传感器网络进行分簇,将每个簇看成一个大的"簇节点",整个网络由一些大的"簇节点"构成,每个"簇节点"内部又包含一定数量的传感器节点。在"簇节点"之间采用等概率包标记法,在"簇节点"内部采用基本概率包标记法。实验分析表明,该算法在收敛性、最弱链方面优于BPPM算法,在节点计算与存储负担方面优于EPPM算法,是在资源约束条件下的一种整体优化。 When the probabilistic packet marking technique for traceback and localization of malicious nodes in Wireless Sensor Networks (WSNs), the determination of marking probability is the key to influence the convergence, the weakest link, and the node burden of the algorithm. First, the disadvantages of the Basic Probabilistic Packet Marking (BPPM) algorithm and the Equal Probabilistic Packet Marking (EPPM) algorithm is analyzed. Then, a Layered Mixed Probabilistic Packet Marking (LMPPM) algorithm is proposed to overcome the defects of the above algorithms. In the proposed algorithm, WSN is clustered, and each cluster is considered as a big “cluster nodes”, therefore, the whole network consists of some big “cluster nodes”. Correspondingly, each“cluster nodes” internal contains a certain number of sensor nodes. The EPPM algorithm is used between the“cluster nodes”, and the BPPM algorithm is used in the“cluster nodes”. Experiments show that LMPPM is better than BPPM in convergence and the weakest link, and the node storage burden of the proposed algorithm is lower than that of the EPPM algorithm. The experiments confirm that the proposed algorithm is a kind of whole optimization under the conditions of resource constraint.
出处 《电子与信息学报》 EI CSCD 北大核心 2014年第2期384-389,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金青年科学基金(61303209 61302179) 安徽省高等学校省级自然科学研究重点项目(KJ2013A255) 六安市定向委托皖西学院产学研合作项目(2012LWA015)资助课题
关键词 无线传感器网络(WSN) 概率包标记(PPM) 溯源定位 分簇 Wireless Sensor Network (WSN) Probabilistic Packet Marking (PPM) Trace back Clustering
  • 相关文献

参考文献20

  • 1Chen X Q, Makki K, Yen K, et al.. Sensor network security: a survey[J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73.
  • 2刘萍,李鹏飞,谌屹,等.复杂电磁环境下的无线传感器网络战场电磁侦察与干扰应用研究[C].第3届全国电磁环境效应与防护技术学术研讨会,武汉,2012:28-31.
  • 3Xu J, Zhou X H, and Yang F. Traceback in wireless sensor networks with packet marking and logging[J]. Frontiers of Computer Science in China, 2011, 5(3): 308 -315.
  • 4杨坤,杨庚.关于无线传感器网络中溯源方法的分析[J].计算机技术与发展,2011,21(7):58-62. 被引量:2
  • 5Snoeren A C, Partridge C, Sanchez L A, et al.. Hash-based IP traceback[C]. ACM SIGCOMM, New York, 2001: 3-14.
  • 6Snoeren A C, Partridge C, Sanchez L A, et al.. Single- packet IP traceback[J]. IEEE/ A CM Transactions on Networking, 2002, 10(6): 721-734.
  • 7Sung M, Xu J, Li J, et al.. Large-scale IP traceback in highspeed Internet: practical techniques and theoretical foundation[J]. 1EEE/A CM Transactions on Networking, 2008, 16(6): 1253-1266.
  • 8Matsuda S, Baba T, Hayakawa A, et al.. Design and implementation of unauthorized access tracing system[C]. SAINT~02 Proceedings of the 2002 Symposium on Applications and the Internet, Washington, 2002: 74-81.
  • 9Bellovin S M. ICMP Traceback Messages[EB/OL]. http:// tools.let f.org/html/draft-iet f-itrace-04, 2000.
  • 10Tseng Y, Chen H, and Hsieh W. Probabilistic packet marking with non-preemptive compensation[J]. IEEE Communications Letters, 2004, 8(6): 359-361.

二级参考文献25

  • 1A Perrig, J Stankovic, D Wagner. Security in wireless sensor networks[J]. Communications of the ACM, 2004,47 (6) : 53 - 57.
  • 2F Ye,H Luo,S Lu,L Zhang. Statistical en-route filtering of injected false data in sensor networks[ J]. IEEE Journal on Selected Areas in Communication, 2005,23 (4) : 839 - 850.
  • 3S Zhu, S Jajodia, P Ning. An interleaved hop-by-hop authentication scheme for fdtering of injected false data in sensor net- works[A]. In Proc. IEEE Symposium on Security and Privacy' 04 [ C ]. California: Los Alamitos, Calif, 2004.259 - 271.
  • 4L Gather. Denial-of-service attacks rip the intemet[ J]. Computer,2000,33(4) : 12 - 17.
  • 5H Butch, B cheswick. Tracing anonymous packets to their approximate source[ A]. In Proc. USENIX Conference on System administration' 00[ C ]. Berkley, California, USA: USENIX Association, 2000.319 - 327.
  • 6G Sager. Security fun with OCxmon and cflowd[ OL]. http:// www. caida, org/funding/ngi/content/security/1198/mt0000. htm.
  • 7S Savage, D Wethemll, A Karlin, T. Anderson. Practical network support for IP traceback[A]. In Proc. ACM SIGCOMM' 00[C]. New York, USA: ACM NY, USA, 2000: 295 - 306.
  • 8Advanced and authenticated marking schemes for IP traceback [A]. In Proc. IEEE INFOCOM '01 [C]. New Jersey: Piscataway, N. J., 2001.878 - 886.
  • 9Z Yu, Y Guan. A dynamic scheme for en-route filtering false data[ A]. In Proc. of ACM International conference on Embedded Networked Sensor Systems' 05[ C]. New York, USA: ACM N.Y., USA, 2005. 294 - 295.
  • 10F Ye, H Yang, Z Liu. Catching "moles"in sensor networks[ A].In Prec. IEEE ICDCS' 07[C]. Washington, DC, USA: IEEE Computer Society, 2007.69- 77.

共引文献15

同被引文献38

  • 1王晓东,戴华平,孙优贤.无线传感器网络混合任务的系统级低功耗实时调度算法研究[J].传感技术学报,2007,20(11):2487-2493. 被引量:2
  • 2程翔,刘升.云自适应混合细菌觅食优化算法[J].微电子学与计算机,2015,32(5):111-116. 被引量:5
  • 3冉晓旻.IP反向追踪技术综述[J].计算机安全,2005(3):57-59. 被引量:2
  • 4刘善阳,双锴.基于源路径隔离引擎的跨域溯源扩展[EB/OL], [2011-12-28] [2015-02-20]. http://www. paper,edu. cn/html/releasepaper/2011/12/788.
  • 5VUAYALAKSHMI M, SHALINIE S M. Single PacketICMP Traceback Technique using Router Interface [ J ].Journal of information science and engineering, 2014,30(6): 1673-1694.
  • 6ZARGAR S T,JOSHI J, TIPPER D. A survey of defensemechanisms against distributed denial of service ( DDoS )flooding attacks [ J ]. Communications Surveys & Tutori-als, IEEE, 2013, 15(4) : 2046-2069.
  • 7KHAq~FAK S, RAMY N R, KHAN K R, et al. A taxon- omy of botnet behavior, detection, and defense [ J ]. Communications Surveys & Tutorials, IEEE, 2014, 16 (2) : 898-924.
  • 8KUZNETSOV V,SANDSTRoM H,SIMKI A. An Evalu-ation of Different IP Traceback Approaches [ C ]// Pro-ceedings of the 4th International Conference on Informa-tion and Communications Security Springer-Verlag, Ber-lin :Springer Berlin Heidelberg,2002 : 37 -48.
  • 9SHAHBAHRAMI A, BAHRAMPOUR R, ROSTAMI M S’et al. Evaluation of Huffman and arithmetic algorithms formultimedia compression standards[ J]. 2011,1 (4) :34-47.
  • 10JANBEK A B,KHAIRI N A. Performance comparison ofHuffman and Lempel-Ziv welch data compression for wire-less sensor node application [ J ]. American Journal of Ap-plied Sciences, 2014,11(1) : 119-126.

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部