期刊文献+

传感器网络定位中节点攻击类型的分布式识别算法 被引量:3

Distributed Localization Attack Type Recognition Algorithm for Malicious Nodes in Wireless Sensor Networks
下载PDF
导出
摘要 针对无线传感器网络在定位过程中的外部攻击节点的类型识别问题,提出了一种交替方向-Lp范数支持向量机(ADM-PSVM)分布式识别算法。该算法基于线性支持向量机分类模型,首先引入了Lp范数约束形式,通过选择不同的范数值p以增强分类算法对数据集的适应能力;继而根据交替方向乘子方法推导出了算法的分布式形式,实现了节点根据剩余能量将识别的计算任务分布于不同节点之间进行;最后将算法对各类型的恶意节点数据进行了训练及识别仿真,并讨论了范数约束值以及惩罚因子取值的不同对识别精确率的影响。仿真结果表明,该算法对于恶意外部攻击节点数据具有较好的识别精确度及更高的计算效率。 The process of localization in wireless sensor networks is easily attacked by malicious nodes. In order to identify the types of those external attacks, an Alternating Direction Method of Multipliers-p-Norm Support Vector Machines (ADM-PSVM) algorithm is proposed. The proposed algorithm is based on classification model of the linear support vector machine. Firstly, by introducing a norm constraint into the classification algorithm, the adaptability of classifier for various types of dataset can be enhanced via selecting different value p. Then we derive distributed form of the algorithm according to Alternating Direction Method of Multipliers; this makes the classifier have the ability to distribute computing task among different nodes based on the residual energy of each node. Finally, the sample and testing dataset for each of four types of external malicious nodes are implemented in the training and tes- ting processes of the proposed algorithm, and the influence on recognition accuracy performance in various p values and penalty factor η ones are discussed. The experimental results show that the proposed algorithm can achieve higher classification accuracy and better computational efficiency on the hostile external attack dataset.
出处 《西北工业大学学报》 EI CAS CSCD 北大核心 2016年第1期85-91,共7页 Journal of Northwestern Polytechnical University
基金 国家自然科学基金(61401360) 陕西省自然科学基础研究计划(2014JQ2-6033) 中央高校基本科研业务费专项资金(3102014JCQ01055)资助
关键词 分布式 支持向量机 传感器网络 p范数 定位 识别 adaptive systems, classifiers, computational efficiency, eigenvalues and eigenfunctions, iterative meth-ods, Lagrange multipliers, matrix algebra, mesh generation,sampling,support vector machines, vec-tots, wireless sensor networks ADM-PSVM (Alternating Direction Method of Multipliers-p-Norm Sup-port Vector Machines), attack type recognition, classification, distributed, localization, malicious,p-norm
  • 相关文献

参考文献9

  • 1刘华博,崔建明,戴鸿君.基于多元分类的无线传感器网络恶意节点检测算法[J].传感技术学报,2011,24(5):771-777. 被引量:15
  • 2Sun Bo, Shah Xuemei, Wu Kui, Yang Xiao. Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Net- works[J]. IEEE Systems Journal, 2013, 7(1): 13-25.
  • 3Zeng Yingpei, Can Jiannong, Xie Li. Secure Localization and Location Verification in Wireless Sensor Networks: A Survey[ J]. Journal of Supercomputing, 2013, 64 (3) : 685-701.
  • 4汪淑丽.基于支持向量机的无线传感器网络的入侵检测系统[J].传感器与微系统,2012,31(7):73-76. 被引量:9
  • 5刘健,沈海斌.无线传感器网络的三维定位算法研究[J].传感器与微系统,2013,32(9):66-68. 被引量:7
  • 6Chen Jinhu, Takiguchi Tetsuya, Ariki Yasuo. A Robust SVM Classification Framework Using PSM for Multi-Class Recognition [J]. Eurasip Journal on Image and Video Processing, 2015, 1:1-12.
  • 7Boley Daniel. Local Linear Convergence of the Alternating Direction Method of Multipliers on Quadratic or Linear Programs[ J]. SIAM Journal on Optimization, 2013, 23 (4) : 2183-2207.
  • 8XuM H, Wu T. A Class of Linearized Proximal Alternating Direction Methods [ J ]. Optimization Theory and Applications, 2011 : 321-337.
  • 9Lu Xiaopei. MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks [ J ]. International Journal of Distributed Sensor Networks, 2012, 2012:1-9.

二级参考文献25

  • 1Tovar A, Friesen T, Ferens K, et al. A DTN Wireless Sensor Network for Wildlife Habitat Monitoring [ C ]//Proc. of the 2010 23rd Canadian Conference on Electrical and Computer Engineering (CCECE) ,2010 : 1-5.
  • 2IAu Fang, Chertg Xiuzhen, Chert Dechang Insider Attacker Detection in Wireless Sensor Networks[ C ]//Proe. of the 2007 26th IEEE In- ternational Conference on Computer Communications, 2007:1937 -1945.
  • 3Karpand B, Kung H T. GPSR : Greedy Perimeter Stateless Routing for Wireless Networks [ C ]//Proc. of Mobile Computing and Networking,2000:243-254.
  • 4Alpaydin E. Introduction to Machine Learning [ M ] :2nd edition. Cambridge : The MIT Press,2010 : 197-199.
  • 5NRL's Sensor Network Extension to ns-2 [ CP/OL ]. http ://pf. itd. nrl. navy. mil/nrlsensorsim.
  • 6Tilak S, Abu-Ghazaleh N B, Heinzelman W. Taxonomy of Wireless Micro-Sensor Network Models[ J]. Mobile Computing and Commu- nications Review ,2002,1 (2) : 1-8.
  • 7Watro R, Kong D, Cuti S, et al. TinyPK : Securing Sensor Networks with Public Key Technology [ C ]//Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks,2004:59-64.
  • 8Karlof C,Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [ C ]//Proc. of the First IEEE, 2003 IEEE International Workshop on Sensor Network Protocols and Ap- plications,2003 : 113 - 127.
  • 9Tseng Chin-Yang,Poornima Balasubramanyam, Calvin Ko, et al. A Specification-based Detection System for AODV[ C ]//Proc. of the 2003 ACM Workshop on Security of Ad H and Sensor Networks,2003 : 125-134.
  • 10Kaplantzis S, Shilton A, Man. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines [ C ]// Proc. of the 3rd International Conference on Intelligent Sensors,Sensor Networks and Information ,2007 :335-340.

共引文献28

同被引文献32

引证文献3

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部