期刊文献+

计算机网络内部丢包节点检测仿真研究 被引量:10

Simulation of Packet Loss Detection in Computer Networks
下载PDF
导出
摘要 对计算机网络内部丢包节点的检测,能够实现对计算机监测信息的准确分析和判断。对丢包节点的检测,需要获取计算机网络内部可信节点作为参考,得到邻居节点的状态进行判断,完成对计算机网络内部丢包节点的检测。传统方法过滤保留内部良性特征点,分析节点与事件源的距离计算值与感知值之间的差异,但忽略了获得网络内部邻居节点的准确状态,导致检测精度偏低。提出基于相似度计算的计算机网络内部丢包节点检测方法,首先计算机网络内部节点感测向量,作为计算机网络内部丢包节点判断和检测的基础,利用分布式的方法获取计算机网络内部可信节点作为参考,对计算机网络内部邻居节点的状态进行判断,根据计算机网络内部节点其它邻居节点在时间域上的相似值进行丢包节点检测和修正。通过仿真结果证明,所提方法提高了转发率、节点平均接收功率,且降低了丢包率。 ABSTRACT:A detection method of packet loss node in computer network is proposed based on similarity computa- tion. Firstly, node sensing vector in computer network is used as the basis of the judgment and detection for packet loss node in computer network. Secondly, distribution method is used to obtain credible nodes in computer network as references. The state of neighbor nodes in computer network is judged. According to similarity value of nodes in com- puter network and neighbor nodes in time domain, packet loss nodes are detected and corrected, simulation results show that the proposed method can improve the forwarding rate and average received power of nodes, and reduce the packet loss rate.
作者 傅文博
出处 《计算机仿真》 北大核心 2018年第1期353-356,385,共5页 Computer Simulation
基金 山西大同大学科研项目(2010K1)
关键词 计算机网络 丢包节点 检测方法 computer network Packet loss node Detection method
  • 相关文献

参考文献8

二级参考文献108

  • 1崔慧,潘巨龙,闫丹丹.无线传感器网络中基于信誉-投票机制的恶意节点检测[J].中国计量学院学报,2013,24(4):353-359. 被引量:7
  • 2时锐,杨孝宗.自组网Random Waypoint移动模型节点空间概率分布的研究[J].计算机研究与发展,2005,42(12):2056-2062. 被引量:18
  • 3覃伯平,周贤伟,杨军,宋存义.无线传感器网络的安全路由技术研究[J].传感技术学报,2006,19(1):16-19. 被引量:18
  • 4Dong Hui-hui,Guo Ya-jun,Yu Zhong-qiang,et al.A wireless sensor networks based on multi-angle trust of node[C]∥Proc of 2009International Forum on Information Technology and Applications,2009:28-31.
  • 5Lindsey S,Raghavendra C,Sivalingam K M.Data gathering algorithms in sensor network using energy metrics[J].IEEE Transactions on Parallel and Distributed Systems,2002,13(9):924-935.
  • 6Ganeriwal S,Balzano L K,Srivastava M B.Reputation-based framework for high integrity sensor networks[J].ACM Transactions on Sensor Networks,2008,4(3):1-37.
  • 7Momani M,Agbinya J,Navarrete G P.A new algorithm of trust formation in wireless sensor networks[C]∥Proc of the1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications(AusWireless’06),2006:1-6.
  • 8da Silva A P R,Martins M H T,Rocha B P S,et al.Decentralized intrusion detection in wireless sensor networks[C]∥Proc of the 1st ACM International Workshop on Quality of Service&Security in Wireless and Mobile Networks,2005:16-23.
  • 9Tseng Chin-Yang,Balasubramanyam P,Ko C,et al.A specification-based intrusion detection system for AODV[C]∥Proc of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks,2003:125-134.
  • 10Buchegger S,Boudec Jean-Yves L.The selfish node:Increasing routing security for mobile ad hoc networks[R].RZ 3354(#93400).Switzerland:IBM Zurich Research Laboratory,2001.

共引文献33

同被引文献75

引证文献10

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部