期刊文献+

ACO结合P2P信任模型的无线传感器网络Sinkhole攻击检测 被引量:1

Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN
下载PDF
导出
摘要 针对无线传感器网络中的Sinkhole攻击问题,提出了一种基于蚁群优化(ACO)结合P2P信任模型的Sinkhole攻击检测(P-ACO)算法。首先,使用蚁群优化算法检测路由中是否存在Sinkhole攻击,并生成传感器节点的警报信息;然后,利用布尔表达式进化标记生成算法为群组警报节点分发密钥,并使用密钥标记可疑节点;最后,计算可疑节点列表中各节点的信任值,将信任值低于预设阈值的节点视为攻击节点。分析表明,相比二分查找算法与基于规则匹配的神经网络(RMNN)算法,该算法在匹配过程中需要更少的匹配搜索次数,提高了算法执行效率。实验结果显示,相比RMNN算法,该算法可以更加准确地检测Sinkhole攻击。 For the Sinkhole attack problem of wireless sensor network(WSN), a detection algorithm based on fusion of ant colony optimization(ACO) and P2 P trust model was proposed. Firstly, ant colony optimization algorithm was used to detect the existence of a Sinkhole attack in route and generate the alarm information of sensor nodes. Then,Boolean expression evolve sign generation algorithm was used to distributed keys for group alarm nodes, and it was used to mark suspicious nodes. Finally, P2 P trust model was used to compute trust value of each suspicious node,and the node with trust value was lower than the preset threshold as invasion of node. The analysis shows that the proposed algorithm need less matching search times in matching process than binary search algorithm and the rules matching based neural network(RMNN) algorithm, which indicates that it has improved the efficiency of the algorithm.Experimental results show that the proposed algorithm has higher detection accuracy on Sinkhole attack than RMNN algorithm.
出处 《电信科学》 北大核心 2016年第4期52-58,共7页 Telecommunications Science
关键词 无线传感器网络 Sinkhole攻击 二分查找算法 蚁群优化 P2P信任模型 wireless sensor network Sinkhole attack binary search algorithm ant colony optimization P2P trust model
  • 相关文献

参考文献6

二级参考文献66

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 3王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 4唐勇,周明天,张欣.无线传感器网络路由协议研究进展[J].软件学报,2006,17(3):410-421. 被引量:201
  • 5肖德琴,冯健昭,杨波,张焕国.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87. 被引量:11
  • 6AKYILDIZ I F, SU W L, SANKARASUBRAMANIAM Y, et al. A survey on sensor networks[J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
  • 7ARAMPATZIS T, LYGEROS J, MANESIS S. A survey of applica- tions of wireless sensors and wireless sensor networks[A]. Proceedings of the 13th Mediterranean Conference on Control and Automation[C]. Limassol, Cyprus, 2005.719-724.
  • 8GARC/A-HERNANDEZ C F, IBARGUENGOYTIA-GONZALEZ p H, GARCIA-HERNANDEZ J, et al. Wireless sensor networks and ap- plications: a survey[J]. International Journal of Computer Science and Network Security (IJCSNS), 2007, 7(3): 264-273,.
  • 9ZHOU Y, FANG Y G, ZHANG Y C. Securing wireless sensor net- works: a survey[J]. IEEE Communications Surveys & Tutorials, 2008, 10(3): 6-28.
  • 10CHEN X Q, MAKKI K, YEN K, PISSINOU N. Sensor network secu- rity: a survey[J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73.

共引文献57

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部