期刊文献+

无线传感网络恶意节点识别算法 被引量:3

Malicious Node Recognition Algorithm in Wireless Sensor Networks
下载PDF
导出
摘要 为了提高无线网络的安全性和可信性,本研究以随机并行簇头选举算法为基础,提出了一种基于节点信任值的无线传感网路由算法.该算法综合考量节点距离与密集度,使用分布式策略,能对簇头节点进行相对均匀的选取、识别和删除.仿真结果表明,改进的算法相比传统算法在预防恶意节点参与数据通信方面更有效,可使无线网络通信更加安全可靠. In order to improve the security and credibility of wireless networks,a novel algorithm based on node trust value is proposed based on the random parallel cluster head selection algorithm.With the distributed strategy,the algorithm can select,identify,and delete cluster head nodes fairly and evenly.Simulation results show that the improved algorithm is more effective than the traditional algorithm in preventing malicious nodes from participating in data communication,and can make wireless network communication more secure and reliable.
作者 周文雄 林穗 ZHOU Wen-Xiong;LIN Sui(School of Computer Science and Technology,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机系统应用》 2020年第2期175-180,共6页 Computer Systems & Applications
基金 广州市科技计划(2017010160012)~~
关键词 簇头选举 节点信任值 恶意节点 安全控制 cluster elections node trust value malicious nodes security control
  • 相关文献

参考文献5

二级参考文献44

  • 1方震,赵湛,郭鹏,张玉国.基于RSSI测距分析[J].传感技术学报,2007,20(11):2526-2530. 被引量:265
  • 2张云璐,刘咏宁,谢铭,沈阳,李石君.基于FOAF演化博弈的网络资源可信度判别[J].计算机研究与发展,2011,48(S3):334-342. 被引量:2
  • 3刘远超,王晓龙,刘秉权.一种改进的k-means文档聚类初值选择算法[J].高技术通讯,2006,16(1):11-15. 被引量:23
  • 4周贤伟,王强,覃伯平.无线传感器网络节点定位算法的研究[J].传感器与微系统,2006,25(3):4-6. 被引量:11
  • 5KARLOF C, WAGNER D. Secure muting in wireless sensor networks: at- tacks and countermeasures[ C]//2003 IEEE International Workshop on Sensor Network Protocols and Applications. [ S. 1. ] : IEEE, 2003:113 - 127.
  • 6NIDAL N, CHEN YUNFENG. SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks [ J]. Computer Communications, 2007, 30(11/12) : 2401 - 2412.
  • 7ESTIRI M, KHADEMAZADEH A. A game-theoretical model for in- trusion detection in wireless sensor networks [ C]//2010 23rd Cana- dian Conference on Electrical and Computer Engineering. Washing- ton, DC: IEEE Computer Society, 2010:1 -5.
  • 8YU BO, XIAO BIN. Detecting selective forwarding attacks in wireless sensor networks [ C]//IPDPS'06: Proceedings of 20th International Parallel and Distributed Processing Symposium. Rhodes Island, Greece: IEEE Press, 2006:25 -29.
  • 9XIAO BIN, YU BO, GAO CHUANSHAN. CHEMAS: Identify suspect nodes in selective forwarding attacks [ J]. Journal of Parallel and Dis- tributed Computing, 2007, 67(11) : 1218 - 1230.
  • 10SUN HUNG-klIN, CHEN C-M, HSIAO Y-C. An efficient counter- measure to the selective forwarding attack in wireless sensor networks [ C]// Proceedings of the IEEE Region 10 Conference. Taipei: IEEE, 2007:1 -4.

共引文献10

同被引文献17

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部