期刊文献+

基于包标记的无线传感器网络溯源定位算法

Traceback Localization Algorithm for Wireless Sensor Network Based on Packet Marking
下载PDF
导出
摘要 标记概率计算作为概率包标记技术的关键内容,对算法的收敛性、最弱链、节点负担等方面具有重要影响。为此,分析现有算法的优缺点,结合无线传感器网络(WSN)的分簇结构,提出一种基于包标记的层次式混合概率包标记算法。扩大上下游节点的相对距离差,从而拉大节点标记概率之间的差距,增加上游节点标记的到达概率,在降低节点负担和算法复杂度的同时,提高算法收敛性。分析结果表明,该算法在收敛性、最弱链方面优于基本包标记法,在节点计算与存储负担方面优于自适应包标记法,可实现WSN资源约束条件下的整体优化。 As the sticking point of probabilistic packet marking techniques, marking probability has important influence over the convergence, weakest link, and node burden. Based on the analysis of the existing algorithm's merit and demrit, this paper proposes a Layered Mixed Probabilistic Packet Marking(LMPPM) algorithm combined with the cluster structure of Wireless Sensor Network(WSN). The distance of nodes' marking probability is enlarged and the reaching probability of nodes of advanced position is increased by amplifying the relative distance of nodes. Analysis result shows that LMPPM algorithm is better than Basic Probabilistic Packet Marking(BPPM) algorithm in convergence and weakest link respects, and better than Adapt Probabilistic Packet Marking(APPM) algorithm in node burden respect, which can realize whole optimization in WSN resource constraint conditions.
出处 《计算机工程》 CAS CSCD 2014年第2期106-109,共4页 Computer Engineering
关键词 无线传感器网络 溯源定位 概率包标记 收敛性 最弱链 节点负担 Wireless Sensor Network(WSN) traceback localization probabilistic packet marking convergence the weakest link nodeburden
  • 相关文献

参考文献9

  • 1刘宁,赵建华.应用免疫原理的无线传感器网络入侵检测系统[J].计算机工程与应用,2011,47(15):80-82. 被引量:6
  • 2Alex C. Hash-Based IP Traceback[C]//Proceedings of ACM SIGCOMM'01. San Diego, USA: ACM Press, 2001.
  • 3Bellovin S. ICMP Tracebaek Messages[Z]. 2000.
  • 4Savage S, Wetherall D, Karlin A. Practical Network Support for IP Traceback[C]//Proceedings of ACM SIGCOMM'00. Stockholm, Sweden: ACM Press, 2000.
  • 5费洪晓,李文兴,覃思明,李钦秀.一种动-静态结合的概率包标记IP追踪方案[J].计算机工程与应用,2011,47(9):103-105. 被引量:3
  • 6杨坤,杨庚.关于无线传感器网络中溯源方法的分析[J].计算机技术与发展,2011,21(7):58-62. 被引量:2
  • 7Cheng Bochao, Chen Huan, Liao Guotan. FBT: An Efficient Traceback Scheme in Hierarchical Wireless Sensor Network[J] Security and Communication Networks, 2009, 2(2): 2133-2144.
  • 8Ye Fan, Yang Hao, Liu Zhen. Catching Moles in Sensor Networks[C]//Proceedings of IEEE International Conference on Distributed Comouting Systems. [S. 1.]: IEEE Press. 2007.
  • 9Tao Peng, Leckie C, Ramamohanarao K. Adjusted Probabilistic Packet Marking for IP Traceback[C]//Proceedings of the 2nd International 1FIP-TC6 Networking Conference on Networking Technologies, Services, and Protocol. Pisa, Italy: [s. n.], 2002.

二级参考文献26

  • 1闫巧,吴建平,江勇.网络攻击源追踪技术的分类和展望[J].清华大学学报(自然科学版),2005,45(4):497-500. 被引量:15
  • 2揭摄,孙乐昌.一种新的非重复性包标记IP追踪方案[J].计算机工程,2007,33(10):105-107. 被引量:5
  • 3Perrig A.Security in wireless sensor networks[J].Communications of the ACM,2004,47(6):53-57.
  • 4Hilarie V,Koukam A,Rodrigue S.An adaptive agent architecture for holonic multiagent aystern[J].ACM Trans on Autonomous Adaptive Systems,2008,3(1):1-24.
  • 5Su W T,Chang K M,Kuo Y H.eHIP:An energy efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J].Computer Networks,2007,51 (4):1151-1168.
  • 6Xiao ain,Yu Bo,Gao Chuanshan.CHEMAS:Identify suspect nodes in selective forwarding attacks[J].Journal of Parallel and Distributed Computing,2007,67(11):1218-1230.
  • 7Culler D,Estrin D,Srivastava M.Overview of Sensor Networks[J].IEEE Computer Magazine,2004,37(8):41-49.
  • 8Wood A,Stankovic J.Denial of Service in Sensor Networks[J].IEEE Computer Society Press,2002,35(10):54-62.
  • 9AusCERT.AA-2004.02-Denial of Service Vulnerability in IEEE 802.11 Wireless Devices[EB/OL].2004.http://www.auscert.org.
  • 10Xu Wenyuan,Ma Ke,Wade T.Jamming Sensor Networks:Attack and Defense Strategies[J].IEEE Network,2006,20(3):41-47.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部