期刊文献+

面向IPv6移动WSNs的选择性转发攻击检测算法 被引量:1

A detection algorithm for selective forwarding attack in IPv6-based mobile wireless sensor networks
下载PDF
导出
摘要 选择性转发攻击是对无线传感网络(wireless sensor networks,WSNs)最危险的攻击,特别是在移动环境的WSNs下。为此,针对基于IPv6的移动WSNs,对选择性转发攻击进行研究,并提出基于序贯概率比测试(sequential probability ratio test,SPRT)的检测算法(SPRT-DA),该算法通过计算接受与丢失的数据包数识别恶意节点,并采用自适应的阈值机制排除恶意节点。实验数据表明,提出的SPRT-DA算法的检测率逼近100%。 Selective forwarding attack is considered as the most dangerous attack in wireless sensor networks(WSNs),especially in mobile environment.To this end,the research on the selective forwarding attacks in IPv6-based mobile wireless sensor network is carried out and the sequential probability ratio test based detection algorithm(SPRT-DA)is proposed.This algorithm recognizes malicious nodes by calculating the number of received and lost packets and eliminates the malicious nodes combined with the self-adapting threshold mechanism.According to the experimental data,the detection rate of the SPRT-DA algorithm approaches 100%.
作者 王继营 WANG Jiying(College of Information Engineering,Huanghuai University,Zhumadian 463000,China)
出处 《中国测试》 CAS 北大核心 2018年第8期120-124,共5页 China Measurement & Test
基金 河南省科技厅发展计划项目(152102110039)
关键词 移动无线传感网络 入侵检测 选择性转发攻击 低功耗网络路由 序贯概率比测试 mobile wireless sensor networks intrusion detection selective forwarding attack low power and lossy networks sequential probability ratio test
  • 相关文献

参考文献4

二级参考文献24

  • 1王建新,张亚男,王伟平,卢锡城.移动自组网中基于声誉机制的安全路由协议设计与分析[J].电子学报,2005,33(4):596-601. 被引量:19
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1236
  • 3冯健昭,肖德琴,杨波.基于β分布的无线传感器网络信誉系统[J].计算机应用,2007,27(1):111-113. 被引量:13
  • 4Naif Alsharabi, Li Ren Fa, Fan Zing. Wireless sensor networks of battlefields hotspot challenges and solutions [ J 3. IF, EF, Transaction on Mobile Computering, 2007,6(1) : 554 - 562.
  • 5Blaze M, Feigenbaum J. Decentralized trust management[ A ]. Dale J. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy [ C ]. IEEE, NJ, United States, 1996. 164 - 173,.
  • 6Saurabh Ganeriwal, Mani B. Srivastava. Reputation-based framework for high integrity sensor network [ A]. Sanjeev Se- fla. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Network[ C] .NY:ACM,2004.66-77.
  • 7Sapon T, Pinalkam D, Rohan B. Location-centdc isolation of misbehavior and trust routing in energy-constrained sensor net- works [ A ]. Mohamed Eltoweissy. Proceedings of the IEEE Workshop on Energy-Efficient Wireless Communications and Networks [ C]. Arizona: IEEE, 2004.463 - 469.
  • 8Rebahi Y, Mujica-V V E, Sisalem D A. Republican-based trust mechanism for Ad hoc network [ A ]. R Ammar Reda Ammar Proceedings of the 10th 1EEE Symposium on Computers and Communications [ C]. San Francisco: IEEla., 2005.37 - 42.
  • 9Dai Hongjun, Jia Zlaiping, Dong Xiaona. An ena'opy-based trust modeling and evaluation for wireless sensor networks [ A ]. Xingshe Zhou. The 2008 International Conference on Embedded Software and Systems[ C ]. San Francisco: IEEE, 2008. 134 - 146.
  • 10Li D Y, Cheng D W, Shi X M. Uncertainty reasoning based on cloud models in conlrollers [ J]. Computers and Mathemat- ics with Applications, 1998,35(3) :99 - 123.

共引文献24

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部