期刊文献+

一种基于互信息量的安全监测节点选择算法

Monitoring Node Selection Algorithm Based on Mutual Information in Wireless Mesh Networks
下载PDF
导出
摘要 针对无线网状网入侵检测系统监测节点能耗、时延等问题,提出一种基于互信息量的监测节点选择算法。从网络拓扑结构出发,采用桥连接系数表征节点拓扑位置的重要性,同时考虑到节点间联系程度对节点重要性的影响,利用互信息理论确定监测节点。为了减少信息冗余量,该算法引入线性阈值模型,以节点相似度作为影响力边权值,建立影响力模型,从而确定安全监测节点的监测范围。仿真结果表明,在保证监测准确性的前提下,该算法能够降低系统检测开销,提高网络性能。 In this paper, we focus on the issues of energy consumption and delay about monitoring nodes in intrusion detection system and propose an algorithm based on mutual information for selecting monitoring nodes in wireless mesh networks. Considering on the network topology, we use the bridge connection coefficient to characterize the importance of node location. Meanwhile, we take into account the importance of nodes which is affected by the communication ability between nodes and determine the monitoring nodes through mutual information theory. In order to reduce the amount of redundant information, our algorithm introduces the linear threshold model and establishes the influence model based on the node similarity as the influence of the edge weights. This model can determine the monitoring scope of selected nodes. The simulation results show that the proposed algorithm could reduce detection overhead and improve network performance under the premise of ensuring the accuracy of monitoring.
出处 《控制工程》 CSCD 北大核心 2016年第S1期99-104,共6页 Control Engineering of China
基金 国家自然科学基金资助项目(61302071) 中央高校基本科研业务费(N150404015)
关键词 无线网状网 入侵检测 节点选择 互信息量 Wireless mesh network intrusion detection node selection mutual information
  • 相关文献

参考文献17

  • 1Frank A. Zdarsky,Sebastian Robitzsch,Albert Banchs.??Security analysis of wireless mesh backhauls for mobile networks(J)Journal of Network and Computer Applications . 2010 (2)
  • 2Szott S.Selfish insider attacks in ieee 802.11s wireless mesh networks. IEEE Communications Magazine . 2014
  • 3Butun,I,Morgera,S.D.,Sankar,R.'A Survey of Intrusion Detection Systems in Wireless Sensor Networks,'. Communications Surveys & Tutorials,IEEE . 2014
  • 4Okechukwu E. Muogilim,Kok-Keong Loo,Richard Comley.Wireless mesh network security: A traffic engineering management approach. Journal of Network and Computer Applications . 2011
  • 5Chen W,Yuan Y,Zhang L.Scalable influence maximization insocial networks under the linear threshold model. The 2010IEEE International Conference on Data Mining (ICDM) . 2010
  • 6N. Deb,M. Chakraborty,N. Chaki.The Evolution of IDS Solutions in Wireless Ad-Hoc Networks to Wireless Mesh Networks. Network Security & Applications . 2011
  • 7Yao Yu,Lei Guo,Xingwei Wang,Cuixiang Liu.??Routing security scheme based on reputation evaluation in hierarchical ad hoc networks(J)Computer Networks . 2009 (9)
  • 8Anne-Marie Kermarrec,Erwan Le Merrer,Bruno Sericola,Gilles Trédan.??Second order centrality: Distributed assessment of nodes criticity in complex networks(J)Computer Communications . 2010 (5)
  • 9Zorana Bankovic,David Fraga,José Manuel Moya,Juan Carlos Vallejo,Pedro Malagón,álvaro Araujo,Juan-Mariano de Goyeneche,Elena Romero,Javier Blesa,Daniel Villanueva,Octavio Nieto-Taladriz.??Improving security in WMNs with reputation systems and self-organizing maps(J)Journal of Network and Computer Applications . 2010 (2)
  • 10Yao Yu,Yuhuai Peng,Yinpeng Yu,Tianyu Rao.??A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks(J)Computers and Electrical Engineering . 2014 (2)

二级参考文献96

  • 1丁丁,罗四维,艾丽华.基于双向拍卖的适应性云计算资源分配机制[J].通信学报,2012,33(S1):132-140. 被引量:25
  • 2刘玮,王丽宏.云计算应用及其安全问题研究[J].计算机研究与发展,2012,49(S2):186-191. 被引量:26
  • 3肖艳文,王金宝,李亚平,高宏.云计算系统中能量有效的数据摆放算法和节点调度策略[J].计算机研究与发展,2013,50(S1):342-351. 被引量:9
  • 4常潘,沈富可.使用域名负载均衡技术实现校园网对外服务器的高速访问[J].计算机应用,2007,27(7):1585-1586. 被引量:10
  • 5AKYILDIZ F, WANG Xu-dong, WANG Wei-lin. Wireless mesh net- works: a survey[J]. Computer Networks,2005,47(4) :445-487.
  • 6HU Zhi-yuan, DENG Jian-liang, CHANG Ying-hua,et aL Design and analysis of reliability wireless mesh network [ C ]//Proc of Internatio- nal Conference on Computer Science and Service System. 2011:3128- 3131.
  • 7ALRAYES M, TRIPATHI R, TYAGI N, et al. Enhancement of route maintenance in AODV over hybrid wireless mesh network [ C ]//Prec of the 1 st International Conference on Recent Advances in Information Technology. 2012:276-278.
  • 8LIU Shu-xin, PENG Jian-hua, LIU Cai-xia. Analysis of wireless mesh network security based on node functio'n[ C]//Proc of the 7th Interna- tional Conference on Computational Intelligence and Security. 2011 : 648-652.
  • 9KHAN S, ALRAJEH N A, LOOK K. Secure route selection in wireless mesh networks [ J]. Computer Nelworks,2012,56(2):491-503.
  • 10DONG Jing, CURTMOLAB R, NITA-ROTARU C. Secure network coding for wireless mesh networks : threats, challenges, and direc- tions [ J]. Computer Communications ,2009,32 ( 17 ) : 1790-1801.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部