期刊文献+

基于改进贝叶斯和风险评估的无线传感网络信任模型 被引量:3

Research on trust model of wireless sensor networks based on bayes and risk assessment
下载PDF
导出
摘要 针对无线传感器网络加密手段和身份认证技术不能解决网络内部攻击问题,提出一种基于改进的贝叶斯和风险评估的无线传感器网络信任模型。该模型针对基本的贝叶斯信任模型进行改进,采用异常折扣因子防止非入侵因素导致的网络异常行为;为实现信任对时间的敏感性,提出了自适应遗忘因子来削弱过去行为的影响;为防止恶意节点的诋毁,利用偏离度来过滤某些推荐节点;同时提出了基于熵的风险评估机制,用于评价信任的不确定性。实验结果表明,所提出的模型具有较高的检测率与较低的误检率,能有效保障无线传感器网络安全性能,并延长网络的生命周期。 Encryption and authentication technology can not solve the internal attacks problem in wireless sensor networks.A new wireless sensor networks trust model is presented based on Bayesian and a risk assessment.The model is improved mainly based on Bayesian theory and risk evaluation mechanism,with the aim to prevent the abnormal network behavior caused non invasion reasons by introducing abnormal discount factor.To reflect the sensitivity of trust on time,an adaptive forgetting factor is introduced to weaken the past actions.To prevent malicious slander,the deviation is used to filter the recommended node.Since Bayesian theory does not have the function of evaluating the uncertainty of trust,the entropy based risk assessment mechanism is developed,and it can reflect the uncertainty of trust.Finally,through a large number of experiments,the results show that the proposed model has higher detection rate and lower false detection rate,with the advantages of ensuring network security performance and extending the network life cycle.
作者 胡军 管春 胡涛 HU Jun;GUAN Chun;HU Tao(School of Software,Nanchang University,Nanchang 330047,China;School of Information Engineering,Nanehang University,Nanchang 330031,China)
出处 《南昌大学学报(理科版)》 CAS 北大核心 2018年第2期168-173,共6页 Journal of Nanchang University(Natural Science)
基金 江西省普通本科高校中青年教师发展计划访问学者专项资金项目资助(赣教办函[2016]109号)
关键词 无线传感器网络 内部攻击 贝叶斯理论 风险评估 wireless sensor networks internal attacks Bayesian theory risk assessment
  • 相关文献

参考文献4

二级参考文献42

  • 1Shao M, Zhu S. A cross-layer dropping attack in video streaming over Ad Hoc networks//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (Securecomm'08). Istanbul, Turkey, 2008: 1-8(Article No. : 25).
  • 2Marti S, Giuli T, Lai K et al. Mitigating routing misbehavior in mobile Ad Hoe networks//Proceedings of the 6th Interna tional Conference on Mobile Computing and Networking (Mobicom'00). Boston, USA, 2000:255-265.
  • 3Lee S, Choi Y. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks//Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06). Alexandria, USA, 2006: 59-70.
  • 4Khalil I, Bagchi S. Mispar: Mitigating stealthy packet dropping in local-monitored multi hop wireless Ad Hoc networks//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (Se curecomm'08). Istanbul, Turkey, 2008:1 10(ArticleNo. : 28).
  • 5Liu K. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 2007, 6(5): 536-550.
  • 6Kozma W, Lazos L. REAct: Resource efficient accountability for node misbehavior in Ad Hoc networks based on random audits//Proceedings of the 2nd ACM Conference on Wireless network security (Wisec' 09 ). Zurich, Switzerland, 2009 : 103- 110.
  • 7Sun Y, Yang Y. Trust establishment in distributed net works: Analysis and modeling//Proceedings of the IEEE In ternational Conference on Communications (Icc' 07). Glas gow, Scotland, 2007:1266 -1273.
  • 8Liu F, Cheng X, Chen D. Insider attacker detection in wireless sensor networks//Proceedings of the 26th IEEE Interna tional Conference on Computer Communications (Infocom' 07). Anchorage, USA, 2007:1937- 1945.
  • 9Brown J, Du X. Detection of selective forwarding attacks in heterogeneous sensor networks//Proceedings of the IEEE In ternational Conference on Communications (ICC'08). Beijing, China, 2008:1583- 1587.
  • 10Wang C, Feng T, Kim J et al. Catching packet droppers and modifiers in wireless sensor networks//Proceedings of 6th IEEE Conference on Sensor, Mesh & Ad Hoe Communication Networks (Second09). Rome, Italy, 2009:529 -537.

共引文献17

同被引文献42

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部