期刊文献+

基于光伏电站的无线传感网络恶意节点识别与隔离研究 被引量:1

Study on WSN malicious nodes identification and isolation for PV power plant
下载PDF
导出
摘要 信息型光伏电站中的节点由于暴露在外面,容易被外界俘获成为恶意节点,从而导致信息泄露。如何将恶意节点的有效特征提取出来并加以识别与隔离,是一个需要被重视的问题。根据搭建信息型光伏电站的项目经验及前人的研究基础,提出了一种基于Ada Boosting算法的恶意节点识别与割离的方法。对算法的仿真结果表明,当迭代次数越多时,误测率越低,检测出恶意节点的精度也越高。 The exposed information nodes of PV power plant are easy to be trapped as the malicious nodes by the outside world,which leads to the information disclosure. How to effectively extract the characteristics of malicious nodes for identification and isolation is an important issue. On the basis of the project experience and previous research of the established information PV power plant,a new method based on Ada Boosting algorithm to identify and isolate the malicious nodes is proposed. The simulation results of the algorithm show that the misdetection rate is low and the accuracy of malicious nodes detection is high with the increase of iterations.
机构地区 湖北民族学院
出处 《现代电子技术》 北大核心 2016年第17期82-83,88,共3页 Modern Electronics Technique
基金 国家自然科学基金地区基金资助项目(61261016)
关键词 光伏电站 无线传感器网络 恶意节点 特征提取 ADA BOOSTING算法 PV power plant WSN malicious node feature extraction Ada Boosting algorithm
  • 相关文献

参考文献3

二级参考文献34

  • 1Tovar A, Friesen T, Ferens K, et al. A DTN Wireless Sensor Network for Wildlife Habitat Monitoring [ C ]//Proc. of the 2010 23rd Canadian Conference on Electrical and Computer Engineering (CCECE) ,2010 : 1-5.
  • 2IAu Fang, Chertg Xiuzhen, Chert Dechang Insider Attacker Detection in Wireless Sensor Networks[ C ]//Proe. of the 2007 26th IEEE In- ternational Conference on Computer Communications, 2007:1937 -1945.
  • 3Karpand B, Kung H T. GPSR : Greedy Perimeter Stateless Routing for Wireless Networks [ C ]//Proc. of Mobile Computing and Networking,2000:243-254.
  • 4Alpaydin E. Introduction to Machine Learning [ M ] :2nd edition. Cambridge : The MIT Press,2010 : 197-199.
  • 5NRL's Sensor Network Extension to ns-2 [ CP/OL ]. http ://pf. itd. nrl. navy. mil/nrlsensorsim.
  • 6Tilak S, Abu-Ghazaleh N B, Heinzelman W. Taxonomy of Wireless Micro-Sensor Network Models[ J]. Mobile Computing and Commu- nications Review ,2002,1 (2) : 1-8.
  • 7Watro R, Kong D, Cuti S, et al. TinyPK : Securing Sensor Networks with Public Key Technology [ C ]//Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks,2004:59-64.
  • 8Karlof C,Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [ C ]//Proc. of the First IEEE, 2003 IEEE International Workshop on Sensor Network Protocols and Ap- plications,2003 : 113 - 127.
  • 9Tseng Chin-Yang,Poornima Balasubramanyam, Calvin Ko, et al. A Specification-based Detection System for AODV[ C ]//Proc. of the 2003 ACM Workshop on Security of Ad H and Sensor Networks,2003 : 125-134.
  • 10Kaplantzis S, Shilton A, Man. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines [ C ]// Proc. of the 3rd International Conference on Intelligent Sensors,Sensor Networks and Information ,2007 :335-340.

共引文献23

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部