期刊文献+

基于概率攻击图的无线传感器网络安全定位方法 被引量:1

A Secure Location Method for Wireless Sensor Networks Based on Probabilistic Attack Diagram
下载PDF
导出
摘要 无线传感器网络一般情况下主要部署在无人看守的敌对环境中,非常容易受到攻击节点的影响,为其实际应用带来巨大挑战。而攻击图可具体描述攻击行为的多项攻击流程之间的关系。因此,提出基于概率攻击图的无线传感器网络安全定位方法,具体步骤包括进行网络部署、安全定位,完成异常节点剔除;通过实验论证,得出基于概率攻击图的无线传感器网络安全定位方法,其定位误差伴随恶意信标比例的波动并不明显,且可一直维持在较低的水平,表明节点对恶意节点进攻的抵抗能力要优于标准定位方法。 In general, wireless sensor networks are mainly deployed in unguarded hostile environments, which are very vulnerable to the impact of attack nodes, and bring great challenges to their practical applications. The attack graph can describe the relationship between the attack process. Based on this, a probabilistic attack graph based security localization method for wireless sensor networks is proposed. The specific steps include network deployment, security location, and abnormal node elimination. The experimental results show that the location error of wireless sensor network based on probabilistic attack graph is not obvious with the fluctuation of malicious beacon ratio, and can be maintained at a low level all the time. It shows that the node's resistance to the malicious node attack is superior to the standard location method.
作者 黄建中 Huang Jianzhong(Modern Education Technology Center, Jiangmen Polytechnic, Jiangmen Guangdong 529030, China)
出处 《信息与电脑》 2019年第4期178-179,共2页 Information & Computer
关键词 概率攻击图 无线传感器 网络安全 定位方法 probabilistic attack graph Wireless sensor Network security location method
  • 相关文献

参考文献3

二级参考文献47

  • 1黄德才,戚华春.PageRank算法研究[J].计算机工程,2006,32(4):145-146. 被引量:69
  • 2张国强,张国清.Internet网络的关联性研究[J].软件学报,2006,17(3):490-497. 被引量:17
  • 3Paramvir Bahl,Venkata N Padmanabhan.RADAR:An in-building RF-based user location and tracking system[C].In:Proceedings of Infocom'2000,Tel Aviv,Israel:IEEE Computer and Communications Societies,2000;2:775~584
  • 4J Beutel.Geolocation in a PicoRadio Environment[Dl.M S Thsis.ETH Zurich Electronics Laboratory.1999-12
  • 5Nirupama Bulusu,John Heidemann,Deborah Estrin.GPS-less Low Cost Outdoor Localization for Very Small Devices[J].IEEE Personal Communications,2000;7 (5):28~34
  • 6Chris Savarese,Jan M Rabaey,Jan Beutel.Locationing in Distributed Ad-Hoc wireless sensor network[C].In:Proceedings of IEEE International Conference on Acoustics,Speech,and Signal(ICASSP '01),Salt Lake,USA:IEEE Computer Society,2001;4:2037~2040
  • 7Srdjan Capkun,Maher Hamdi,Jean-pierre Hubaux.GPS-Free Positioning in Mobile Ad-Hoc Networks[C].In:Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Maui,Hawaii,USA:IEEE Computer Society,2001:3481~3490
  • 8Lance Doherty,Laurent El Ghaoui,Kristofer S J Pister.Convex Position Estimation in Wireless Sensor Networks[C].In:Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2001 ),Anchorage,AK,USA:IEEE Computer and Communications Societies,2001;3:1655~1663
  • 9Lewis Girod,Deborah Estrin.Robust Range Estimation using Acoustic and Multimodal Sensing[C].In:Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems(IROS'01),Maui,Hawaii,USA:IEEE Computer Society,2001;3:1312~1320
  • 10A Harter,A Hopper,P Steggles et al.The anatomy of a context-aware application[C].In:Proceedings of Mobile Computing and Networking(MOBICOM'99),Seattle,Washington,USA:ACM Press,1999:59~68

共引文献117

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部