期刊文献+

基于布隆过滤器的分簇式复制节点检测协议研究

Research on clustered copy node detection protocol based on Bloom filter
下载PDF
导出
摘要 针对传统的CBDM复制节点检测协议中簇头节点存储开销大,基站和基站附近节点通信开销大的问题,文章提出了一种基于布隆过滤器的分簇式复制节点检测协议。每一轮周期检测,簇头节点不再单纯地利用自身的存储空间来存储节点信息,而是通过携带存储空间利用率较高的布隆过滤器来储存信息,减轻了簇头节点的存储开销;与CBDM相比,该协议通过选择能量较高的簇头节点进行复制节点的判定、分析和广播,减轻了基站和基站附近的网络开销。仿真实验表明,该协议在保证网络复制节点检测率的情况下,提高了网络的生命周期。 According the problems of high storage overhead of cluster head nodes and high com-munication overhead between the base station and the nodes near the base station in the CBDM replication node detection protocol,a cluster based replication node detection protocol based on the Bloon filter is proposed.Each round of periodic detection,the cluster head node no longer simply uses its own storage space to store node information,but stores information by carrying a Blum filter with high utilization rate of storage space,alleviating the memory overhead of the cluster head node;Compared with CBDM,the protocol reduces the network overhead of the base station and nearby base stations by selecting cluster head nodes with higher energy to determine,analyze and broadcast replication nodes.Experimental results indicate that the protocol improves the network life cycle while ensuring the replication node detection.
作者 程俊 Cheng Jun(Jiangxi Institute of Economic Administrators,Nanchang 330088,China)
出处 《无线互联科技》 2023年第5期14-16,共3页 Wireless Internet Technology
基金 校级社科类项目,项目名称:无线传感网络中的复制节点检测协议,项目编号:2021YJYB3。
关键词 复制节点 检测率 存储代价 网络生命周期 replica node detection probability storage overhead network lifetime
  • 相关文献

参考文献2

二级参考文献19

  • 1Jokhio S H,Jokhio I A,Kemp A H.Node capture attack detectionand defence in wireless sensor networks[J].IET Wireless SensorSystems,2011,2(3):161-169.
  • 2Kwantae Cho,Minho Jo,Taekyoung Kwon,et al.Classificationand experimental analysis for clone detection approaches in wire-less sensor networks [J].IEEE Systems Journal,2013,7(1):26-35.
  • 3Parao B,Perrig A,Gligor V.Distributed detection of node replica-tion attacks in sensor networks[C]//2005 IEEE Symposium onSecurity and Privacy,Oakland,USA,2005:49-63.
  • 4Wen H,Luo J,Zhou L.Lightweight and effective detection schemefor node clone attack in wireless sensor networks [J].WirelessSensor Systems,IET,2011,1(3):137-143.
  • 5Pamo B,Perrig A,Gligor V.Distributed detection of clone attacksin wireless sensor networks[J].IEEE Transactions on Dependa-ble and Secure Computing,2011,8(5):685-698.
  • 6Yu Chia Mu,Lu Chun Shien,Kuo Sy Yen.Mobile sensor networkresilient against node replication attacks[C]//5th Annual IEEECommunications Society Conference on Sensor,Mesh and Ad HocCommunications and Networks,SECON 2008,San Francisco,CA,United States,2008:597-599.
  • 7Zeng Yingpei,Cao Jiannong,Zhang Shigeng,et al.Handom-walkbased approach to detect clone attacks in wireless sensor network-s[J].IEEE Journal on Selected Areas in Communications,2010,28(5):677-691.
  • 8曹磊,袁从明,徐晨,周晖.基于距离的无线传感器网络自定位新算法[J].南通大学学报(自然科学版),2008,7(1):42-45. 被引量:3
  • 9郭书城,卢昱,许定根.基于分簇无线传感器网络的路由算法研究[J].通信学报,2010,31(S1):63-69. 被引量:14
  • 10周芳,韩立岩.多传感器信息融合技术综述[J].遥测遥控,2006,27(3):1-7. 被引量:18

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部