期刊文献+

基于分布式压缩感知的WSNs异常节点检测 被引量:2

Abnormal node detection algorithms for wireless sensor networks based on distributed compressive sensing
下载PDF
导出
摘要 无线传感网的节点极易被物理捕获而遭受恶意攻击,因此如何评测、识别并及时剔除内部异常节点是WSN亟待解决的问题。提出一种基于分布式压缩感知的无线传感网异常节点检测算法。首先,通过在每个异常节点检测周期中划分多个检测时隙,利用检测时隙的节点电量损耗向量之间的联合稀疏性,建立联合稀疏模型JSM-2;其次,对多个检测时隙的电量损耗向量进行压缩感知,并在检测周期结束时刻通过DCS-SOMP算法进行联合重构并判决,从而识别出无线传感网中的异常节点;最后,通过仿真验证了该算法可以降低数据收集的采样点数,有效延长网络生命周期。 Nodes in wireless sensor networks are vulnerable to malicious attacks due to physical capture. Therefore, how to evaluate, identify and eliminate internal abnormal nodes in time is an urgent problem for WSN. In this paper, an anomaly detection algorithm for wireless sensor networks based on distributed compressed sensing is proposed. First, the joint sparse model JSM-2 is established by dividing multiple detection slots in each detection period of abnormal nodes, utilizing the joint sparsity between the energy loss vectors of detection slots. Second, the energy loss vectors of multiple detection slots are compressed and sensed, and at the end of detection period, they are reconstructed and judged jointly by DCS-SOMP algorithm, so as to identify them. Finally, simulation results show that the algorithm can reduce the number of sampling points in data collection and effectively prolong the network life cycle.
作者 孙璇 康海燕 SUN Xuan;KANG Haiyan(School of Information Management,Beijing Information Science & Technology University,Beijing 100192,China)
出处 《北京信息科技大学学报(自然科学版)》 2019年第2期58-62,74,共6页 Journal of Beijing Information Science and Technology University
基金 北京市教委科研计划项目(KM201811232019)
关键词 分布式压缩感知 无线传感网 异常节点检测 distributed compressive sensing wireless sensor network abnormal node detection
  • 相关文献

参考文献7

二级参考文献65

  • 1俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 2肖德琴,冯健昭,杨波,张焕国.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87. 被引量:11
  • 3DA SILVA A P R, MARTINS M H T, ROCHA B P S, et al. Decentralized intrusion detection in wireless sensor networks [ C]//Proceedings of the 1^st ACM international workshop on Quality of service & security in wireless and mobile networks( Q2SWinet'05), Canada: ACM, 2005 : 16 - 22.
  • 4KHALI I, BAGCHI S, NINA-ROTARI C. DICAS: detection, diagnosis and isolation of control attacks in sensor networks [ C]//Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Greece: IEEE, 2005 : 89 - 100.
  • 5TSENG C Y, BALASUBRAMANYAM P, KO C, et al. A specification-based intrusion detection system for AODV [C]//Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks ( SASN03), USA : ACM, 2003 : 125 - 134.
  • 6SUN B, WU K, POOCH U W. Zone-based intrusion detection for mobile Ad Hoc networks [J]. Ad hoc & Sensor.Networks, 2006 : 15 - 28.
  • 7TIAN D, GEORGANAS N D. Energy efficient routing with guaranteed delivery in wireless sensor networks [ C ]// Proceedings of the IEEE Wireless Communication and Networking ( WCNC 2003 ), New Orleans : IEEE, 2003 : 1923 - 1929.
  • 8BUCHEGGER S, BOUDEC J L. The selfish node: increasing roiting secirity in mobile ad hoc networks [ R].Research Report RR 3354, IBM, 2001.
  • 9BUCHEGGER S, BOUDEC J L. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks[ C]//Proceedings of the Tenth Euromicro Workshop on Parallel, Distribited and Network - based Processing, Spain: IEEE, 2002 : 403 - 410.
  • 10BUCHEGGER S, BOUDEC J L. Performance analysis of the confidant protocol: cooperation of nodes-fairness in dynamic Ad-Hoc networks [ C ]//proceedings of IEEE/ ACM Symposiim on Mobile Ad Hoc Networking and Computing ( MobiHOC ), Lausanne : IEEE/ACM, 2006 : 226 -236.

共引文献59

同被引文献11

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部