期刊文献+

基于人工免疫的无线传感器网络信任检测方法 被引量:3

Artificial immunity-based trust detection method for wireless sensor networks
下载PDF
导出
摘要 针对传统的基于分簇的无线传感器网络(WSNs)信任评价模型中,簇头节点因负担大量的计算工作而降低网络生存时间的问题,提出一种通过人工免疫评估WSNs中节点信任值的方法。该方法运用阴性选择算法产生检测器,由基站根据检测器进行节点的信任检测,不需要簇头节点聚合成员节点的信任值,只要求簇头节点将成员节点的信任属性发送给基站,降低了簇头节点的负担,延长了WSNs的生存时间。仿真实验结果表明,该方法在延长网络生存时间的同时,与已有方法相比具有较高的检测率,在非信任节点数不超过40%时,检测率高于90%。 Aiming at the problem that the network lifetimes of cluster head nodes are reduced because of a large number of computations to do in traditional trust evaluation models of wireless sensor networks(WSNs) based on clustering,an artificial immune method is proposed to evaluate the trust values of nodes in WSNs. Base stations use detectors generated by the negative selection algorithm for trust detection of nodes. Cluster head nodes send the trust properties of member nodes to base stations instead of aggregating the trust values of member nodes. The burdens on the cluster head nodes are cut and the lifetimes of WSNs are extended. The simulation results show that the method proposed here extends network lifetimes and has higher detection rates compared with existing methods. When the percentages of non-confidence nodes are not more than 40% , the detection rates are above 90% .
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2014年第3期318-324,共7页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金(60903027 61272419) 江苏省973项目(BK2011023)
关键词 人工免疫 无线传感器网络 信任检测 分簇 簇头节点 信任值 阴性选择算法 检测器 基站 成员节点 artificial immunity wireless sensor networks trust detection clustering cluster head nodes trust values negative selection algorithm detectors base stations member nodes
  • 相关文献

参考文献10

  • 1Wong E Y C,Yeung H S C,Lau H Y K.Immunitybased hybrid evolutionary algorithm for multiobjective optimization in global container repositioning[J].Engineering Applications of Artificial Intelligence,2009,22(6):842-854.
  • 2Zhou Dexin,Fan Zhicheng,Zhang Wenlin.Research on AMU fault detection algorithm based on immune danger theory[A].Proceedings of the 2011 Chinese Control and Decision Conference[C].Mianyang,China:IEEE,2011:1957-1961.
  • 3Okamoto T,Ishida Y.Evaluations for immunitybased anomaly detection with dynamic updating of profiles[J].Artificial Life and Robotics,2010,15(2):225-228.
  • 4廖俊,刘耀宗,姜海涛,张宏.基于人工免疫的MANET不端行为检测模型[J].南京理工大学学报,2011,35(5):652-658. 被引量:5
  • 5Shaikh R A,Jameel H,d’Auriol B J,et al.Groupbased trust management scheme for clustered wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2009,20(11):1698-1712.
  • 6Zhang Junqi,Shankaran R,Orgun M A,et al.A trust management architecture for hierarchical wireless sensor networks[A].Proceedings of 2010 IEEE 35th Conference on Local Computer Networks[C].Denver,USA:IEEE,2010:264-267.
  • 7Zhou Youcai,Huang Tinglei,Wang Wei.A trust establishment scheme for clusterbased sensor networks[A].Proceedings of the 2009 5th International Conference on Wireless Communications,Networking and Mobile Computing[C].Beijing,China:IEEE,2009:1-4.
  • 8Zhao Zhibin,Dong Xiaomei,Yao Lan,et al.Research on biological immunity principle based security model for wireless sensor network[A].Proceedings of the 2009 Chinese Control and Decision Conference[C].Guilin,China:IEEE,2009:4687-4691.
  • 9Junbeom H,Younho L,Hyunsoo Y,et al.Trust evaluation model for wireless sensor networks[A].The 7th International Conference on Advanced Communication Technology,2005,ICACT 2005[C].Phoenix Park,GangwonDo,Korea:IEEE,2005:491-496.
  • 10Hu Ronghua,Lou Peihuang,Zhao Peng.A novel approach of detector generation for realvalued negative selection algorithm[J].Applied Mechanics and Materials,2012,121-126:3736-3740.

二级参考文献12

  • 1潘志松,倪桂强,谭琳,胡谷雨.异常检测中单类分类算法和免疫框架设计[J].南京理工大学学报,2006,30(1):48-52. 被引量:5
  • 2Marti Sergio, Giuli T J, Lai Kevin, et al. Mitigating routing misbehavior in mobile ad hoc networks [ A ].Proc of the ACM MobiCom[ C]. New York,USA:ACM Press, 2000 : 255- 265.
  • 3Bucbegger Sonja, Le Boudec Jean-Yves. Performance analysis of the CONFIDANT protocol: Cooperation of nodes : Fairness in distributed" ad hoc networks [ A ]. Proc IEEE/ACM Symp Mobile Ad hoc Networking and Computing (MobiHOC) [ C ]. IEEE,2002 : 80-91.
  • 4Michiardi P, Molva R. Core:A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks [ A ]. Proc of the Cotnmunications and Multimedia Security [ C ]. Portoroz : IFIP Press, 2002 : 376-386.
  • 5Forrest S, BeaUchemin C. Computer immunology [ J ]. Immunological Reviews, 2007,216 ( 1 ) : 176-197.
  • 6Dasgupta D, Gonzalez F. CIDS:An agent-based intrusion detection system [ J]. Computers and Security, 2005,24 (5) :387-398.
  • 7Kim Jungwon, Bentley P, Aickelin Uwe, et al. Immune system approaches to detection--a review intrusion [ J]. Natural Computing,2007,6(4) :413-466.
  • 8Sarafijanovic Slavisa,Le Boudec Jean-Yves. An artificial immune system approach with secondary response formisbehavior detection in mobile ad hoc networks [ J ]. IEEE Transaction on Neural Networks, 2005, 16 ( 5 ) : 1076-1087.
  • 9William S H. An artificial immune system for securing mobile ad hoc networks against intrusion attacks [ A ]. Proc of SPIE [ C ]. Bellingham, USA : SPIE Press,2003 : 74-91.
  • 10Hofmery S, Forrest S. Architecture for an artificial immune system [ J ]. Evolutionary Computation, 2000, 7 ( 1 ) :45-68.

共引文献4

同被引文献15

引证文献3

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部