期刊文献+

基于自适应巡视算法的工业物联网异常行为检测 被引量:3

Abnormal Behavior Detection of Industrial Internet of Things Based on Adaptive Cruise Algorithm
下载PDF
导出
摘要 针对当前物联网节点易受攻击的问题,提出一种基于自适应巡视算法的工业物联网异常行为检测方法。根据数据包完整性、数据包传输率和传输延迟等异常行为动态更新物联网节点信誉度,结合信誉阈值自适应调整巡视间隔。该方法能够实现低能耗、高效率的工业物联网安全防护,提升异常行为检测的自适应性。实验证明,该方法与传统LEACH-C机制相比,能更好降低网络能耗、延长节点生存时间,因此该方法具有一定的可用性。 Aiming at the security and vulnerability of current Internet of things(IoT)nodes,this paper provides an abnormal behavior detection research based on adaptive cruise algorithm.According to abnormal behaviors such as packet integrity,packet transmission rate and transmission delay,the reputation of IOT nodes is dynamically updated,and the cruise interval is adaptively adjusted in combination with the reputation threshold.The method can achieve the security protection of industrial IoT with low energy consumption and high efficiency,and improve the adaptability and efficiency of abnormal behavior detection.Experiments show that the proposed method has better performance than the traditional LEACH-C mechanism in terms of reducing network energy consumption and prolonging node lifetime.Therefore,the proposed method has certain usability.
作者 赵研 ZHAO Yan(Digital Guangdong Network Construction Co.,Ltd.,Guangzhou 510030,China)
出处 《移动通信》 2021年第2期100-103,共4页 Mobile Communications
关键词 自适应巡视 工业物联网 异常行为检测 adaptive cruise industrial Internet of things abnormal behavior detection
  • 相关文献

参考文献6

二级参考文献36

  • 1汪定伟,王俊伟,汪洪峰,张瑞友,郭哲.智能优化算法[M].北京:高等教育出版社,2007:26-40.
  • 2Heinzelman W R,Chandrakasan A P, Balakrishnan H.An application-specific protocol architecture for wireless microsensor networks [C]. MIT USA: IEEE Transactions on Wireless Communications,2002:660-670.
  • 3Li Qing, Zhu Qingxin, Wang Mingwen.Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks[J].Computer Communication,2006(29):2230- 2237.
  • 4Liaw Jiunjian, Dai Chenyi, Wang Yijie. The steady clustering scheme for heterogeneous wireless sensor networks[C].Symposia and Workshops on Ubiquitous,Autonomic and Trusted Computing,2009:336-341.
  • 5Murata T, Ishibuchi H.Performance evaluation of genetic algorithms for flowshop scheduling problems [C]. Orlando USA: 1st IEEE Conf Evolutionary Computation, 1994:812-817.
  • 6Li Yaohang, Vladimir A Protopopeseu, Nikita Amold,et al.Hybrid parallel tempering and simulated annealing method[J].Applied Mathematics and Computation,2009,212(1):216-228.
  • 7Wang ZG,Wong YS,Rahman M.Development of a parallel optimization method based on genetic simulated annealing algori- thm[J].Parallel Computing,2005,31 (8-9):839-857.
  • 8Weisstein, Eric W.Voronoi diagram[DB/OL].http://mathworld. wolfram.com/VoronoiDiagram.html,2010.
  • 9Gnu Haosong,Yoo Younghwan,Zeng Hongqing.A partition-based LEACH algorithm for wireless sensor networks [C]. Xiamen, China:IEEE Ninth International Conference on Computer and Information Technology, 2009:40-45.
  • 10魏勇军.浅谈工业控制系统信息安全防护的应用[J].网络安全技术与应用,2014(8):194-195. 被引量:5

共引文献35

同被引文献24

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部