期刊文献+

基于生成对抗网络的UWSNs恶意节点检测方法

Malicious Nodes Detection Method for UWSNs Based on Generative Adversarial Network
下载PDF
导出
摘要 水下无线传感器网络(Underwater Wireless Sensor Networks,UWSNs)节点通常部署于无人值守的恶劣环境中,恶意节点的存在对网络的安全构成了极大威胁。为了在缺乏节点行为证据的情况下有效检测恶意节点,提出了一种基于生成对抗网络(Generative Adversarial Network,GAN)的恶意节点检测方法。首先,构建了基于GAN的异常预测模型;其次,收集数据、链路、能量等多维信任证据,构建出训练数据集;最后,训练异常预测模型,并通过信任决策检测恶意节点。仿真结果表明,该方法可以在不需要大量信任证据的情况下有效地进行恶意节点检测,并且与同类型方法相比,所提方法具有较高的恶意节点检测率、通信成功率及较低的假阳率。 UWSNs(Underwater Wireless Sensor Networks)nodes are usually deployed in unattended or harsh environments,and the presence of malicious nodes poses a great threat to the security of the networks.To effectively detect malicious nodes in the absence of evidence about node behavior,a malicious node detection method based on GAN(Generative Adversarial Network)is proposed.First,a GAN-based anomaly prediction model is constructed.Then,multi-dimensional trust evidences regarding data,link,and energy are collected to construct training dataset.Finally,the anomaly prediction model is trained and malicious nodes are detected through trust decision.Simulation results indicate that the method can effectively perform malicious node detection without large numbers of trust evidences.In addition,the proposed method has a better performance on malicious node detection rate,communication success rate,and low false positive rate than other state-of-the-art methods.
作者 杨柳 王宇 陶洋 YANG Liu;WANG Yu;TAO Yang(School of Communications and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)
出处 《通信技术》 2024年第5期512-518,共7页 Communications Technology
基金 中国博士后科学基金(2023MD744139) 重庆市教育委员会科学技术研究项目(KJQN202300653)。
关键词 水下无线传感器网络 生成对抗网络 异常预测 信任证据 信任决策 UWSNs(Underwater Wireless Sensor Networks) GAN(Generative Adversarial Networks) anomaly prediction trust evidence trust decision
  • 相关文献

参考文献6

二级参考文献29

  • 1孙晓雅,李永倩,李天.无线传感器网络在电力系统中的应用[J].传感器与微系统,2012,31(6):5-7. 被引量:15
  • 2杨德明,慕德俊,许钟.Ad hoc空间网络密钥管理与认证方案[J].通信学报,2006,27(8):104-107. 被引量:17
  • 3张春.有关水下无线通信网络安全主要技术探析[J].军民两用技术与产品,2014(7)下:63-65.
  • 4DOMINGO M C. Securing Underwater wireless Communi- cation Network [ J ]. IEEE Wireless Communications, 2011(2) :22-28.
  • 5TIAN Chen, JIANG Hong-bo, LIU Xue,et al. Tri-Mes- sage: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks[ M ]. IEEE ICC, 2009.
  • 6TIAN Chen, LIU Wen-yu, JIN Jiang,et a|. I.ocalization and Synchronization for 3D Underwater Acoustic Sensor Networks Ubiquitous [ J ]. Intelligence and Computing, LNCS, 2007:622-631.
  • 7Chirdchoo N, Sob W S, Chua K. MU-Sync: A Time Synchronization Protocol for Underwater Mobile Networks [ M]. WUWNet, 2008.
  • 8SONG Hui, ZHU Sencun, CAO Guo-hong. Attack-Re- silient Time Synchronization for Wireless Sensor Networks [J]. Ad Hoe Networks, 2007(5) :112-125.
  • 9HU Fei, Malkawi Yamin, Kumar Sunil, et al. Vertical and ttorizontal Synchronization Services with Outlier De- tection in Underwater Acoustic Networks [ J ]. Wireless Communications and Mobile Computing, November 2008: 1165-1181.
  • 10Erol M, Oktug S. A Localization and Routing Frame- work for Mobile Underwater Sensor Networks[ M ]. IEEE INFOCOM, 2008.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部