期刊文献+

基于信任机制的无线传感器网络多协议层入侵检测方法 被引量:12

Multi-Protocol Layer Intrusion Detection Method for Wireless Sensor Networks Based on Trust Mechanism
下载PDF
导出
摘要 无线传感器网络的单层攻击检测方法中仅考虑某一层次的攻击,具有局限性,而在跨层攻击的检测方法中存在较高的误报率和漏报率。针对这些问题,本文提出了一种结合信任机制和噪声检测技术的多协议层入侵检测方法(T-MPNID)。该方法中通过计算物理层、MAC层和网络层中多个关键参数的相对偏差值得到信任值,利用加权法建立各协议层的信任值,融合协议层的评估值得到融合信任值。本文引入数据噪声检测技术,对簇内节点各协议层的关键参数进行检测,然后对存在异常关键参数的节点平均融合信任值进行惩罚得到全局信任值。各协议层的关键参数作为噪声检测数据,平均融合信任值为噪声检测提供了数据的可信的权值和惩罚机制中节点惩罚力度。仿真实验表明,在典型的单层和跨层攻击中,本文提出的入侵检测方法(T-MPNID)有较高的检测率,较低的误报率和漏报率。 The limitation of single-layer attack detection method of wireless sensor network lies in that it only considers the attack of one specific layer of network protocol. On the other hand,the detection method of cross-layer attack has higher false positive and false negative rate. To solve these issues,this paper proposes a multi-protocol layer intrusion detection method(T-MPNID)combining trust system and noise detection technology. In the proposed method,the trust value can be calculated by computing the relative deviation of several key parameters in physical layer,MAC layer and network layer,and the trust value of each protocol layer is established using the weighting method for multiple key parameters of each layer. Every protocol layer ’ s assessment of value is fused to get the overall trust metric of a sensor node. Data noise detection technology is introduced to detect the key parameters of the protocol layer of nodes in the cluster,and the global trust value is obtained by punishing the average fusion trust value of nodes with abnormal key parameters. The key parameters of each protocol layer provides data for noise point detection,and the average fusion trust value provides the credible weights of data and penalties for nodes in the punishing mechanism. Simulation results show that T-MPNID has higher detection rate,lower false positive rate and lower false negative rate in typical single-layer and cross-layer attacks.
作者 许力 李光辉 XU Li;LI Guanghui(School of IoT Engineering,Jiangnan University,Wuxi,Jiangsu214122,China;Research Center of IoT Technology Application Engineering(MOE),Wuxi Jiangsu214122 China)
出处 《传感技术学报》 CAS CSCD 北大核心 2019年第5期739-748,共10页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61472368) 无锡市国际科技研发合作项目(CZE02H1706) 江苏省研究生科研创新计划项目(KYCX_1862)
关键词 网络安全 多协议层 入侵检测 信任值 数据噪声检测 无线传感器网络 network security multi-protocol layer intrusion detection trust value data noise detection wireless sensor network
  • 相关文献

参考文献3

二级参考文献28

  • 1易平,吴越,陈佳霖.无线Mesh网络中基于人工免疫系统的异常检测(英文)[J].China Communications,2011,8(3):107-117. 被引量:3
  • 2KIM J, BENTLEY E AICKELIN U, et al. Immune system approaches to intrusion detection-a review[J]. Natural Computing, 2007, 6(4): 413-466.
  • 3Annual MATZINGER P. Tolerance, danger and the extended family[J]. Review Immunology, 1994, 12: 991-1045.
  • 4WU S X, BANZHAF W. The use of computational intelligence in intrusion detection systems: a review[J]. Applied Soft Computing, 2010, 10(1):1-35.
  • 5AICKELIN U, BENTLEY P, CAYZER S, et al. Danger theory: the link between AIS and IDS[A]. Proceedings of the Second International Conference on Artificial Immune Systems[C]. Edinburgh, UK, 2003. 147-155.
  • 6KIM J, BENTLEY P, WALLENTA C, et al. Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm[A]. Proceedings of the International Conference on Ar- tificial Immune Systems[C]. Cambridge, UK, 2006.390-403.
  • 7DROZDA M, SCHAUST S, SZCZERBICKA H. AIS for misbehavior detection in wireless sensor networks: performance and design princi- ples[A]. Proceedings of the IEEE Congress on Evolutionary Computa- tion, Special Session on Recent Developments in Artificial Immune Systems[C]. Singapore, 2007. 3719-3726.
  • 8DROZDA M, SCHAUST S, SCHILDT S, et al. Priming: making the reaction to intrusion or fault predictable[J]. Natural Computing, 2011, 10(1):243-274.
  • 9DROZDA M, SCHILDT S, SCHAUST S, et al. An immuno-inspired approach to misbehavior detection in ad hoc wireless networks[EB/OL].http://arxiv, org/abs/lO01. 3113, 2010.
  • 10MARTI S, GIULI T, LAI K, et al. Mitigating routing misbehavior in mobile ad hoc networks[A]. Proceedings of the International Confer- ence on Mobile Computing and Networking[C]. Massachusetts, USA, 2000. 255-265.

共引文献49

同被引文献132

引证文献12

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部