期刊文献+

一种基于时序信誉的WSNs恶意节点检测算法 被引量:4

A malicious node detecting algorithm for WSNs based on time sequence credibility
下载PDF
导出
摘要 大多数无线传感器网络(WSNs)部署在户外环境中,恶意节点对WSNs安全存在巨大威胁。信誉阈值模型在识别恶意节点这一领域有着不俗的表现,但随着攻击技术的升级,恶意节点变得更加隐秘而难以被发觉。经分析引入时序和相似度的概念对原有信誉阈值模型加以改进,由欧几里得度量和K-mediods算法可以有效地分辨这一类恶意节点。经仿真实验验证,对识别特征不明显的恶意节点改进后的算法效果十分显著。 Most wireless sensor networks( WSNs) are deployed in outdoor environment,malicious node is a major threat to the safety of WSNs. Credit threshold model has a good performance in the field to identify the malicious node,but with the attack technology upgrade,the malicious node become more conceal and difficult to be found.The credit threshold model is improved by introducing the concept of time sequence and similarity through analysis,using Euclidean metric and K-mediods algorithm can distinguish this kind of malicious node effectively.Through simulation test,verify the improved algorithm effectively identify undistinguishable malicious node.
出处 《传感器与微系统》 CSCD 2015年第7期118-120,124,共4页 Transducer and Microsystem Technologies
基金 2013年陕西省回国留学人员科研资助项目(2013-049) 国家自然科学基金资助项目(61472272)
关键词 无线传感器网络 恶意节点检测 时序信誉 wireless sensor networks(WSNs) malicious node detection time sequence credibility
  • 相关文献

参考文献7

二级参考文献61

  • 1Pietro Michiardi, Refik Molva. Core:a collaborative reputation mechanism to enforce node cooperation in mobile AdHoc networks[A]. Sixth IFIP conference on secirity communications and multimedia(CMS2002) [C] . Portoroz,Slovenia,2002:107-121.
  • 2S. Bansal, M. Baker. Observation-based cooperation enforeement in Adhoc networks. Research Reports. N1/0307012. Stanford Iniversity, 2003.
  • 3Saurabh Ganeriwal,ManiB Srivastava. Reputation-based Frame- work for Highlntegrity Sensor Networks. SASN,2004:66-77.
  • 4Van der Weyden L, Adams D J, Bradley A. Tools for targeted manipulation of the mouse genome. Physiol Genomics, 2002, 11(3): 133 - 164
  • 5Perrig A,Szewczyk R,Wen V,Culler D,Tygar D.SPINS:Security Protocols for Sensor Networks.Wireless Networks Journal,September 2002
  • 6Karlof C,Sastry N,Wagner D.TinySec:Link Layer Encryption for Tiny Devices.To appear in ACM SenSys,2004
  • 7Deng J,Han H,Mishra S.The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks.In:the Proceedings of IPSN,April 2003
  • 8Watro R,Kong D,Cuti S F,Gardiner C,Lynn C,Kruus P.TinyPK:Securing Sensor Networks with Public Key Technology.In:second workshop on Security in Sensor and Ad-hoc Networks,2004
  • 9Eschenauer L,Gligor V D.A key Management Scheme for Distributed Sensor networks.In:Proceedings of ACM CCS,November 2002
  • 10Chan H,Perrig A,Song D.Random Key Predistribution Schemes for Sensor Networks.In:Proceedings of IEEE Symposium on Security and Privacy,2003

共引文献30

同被引文献37

引证文献4

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部