期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
Air pressure law of a reservoir constructed in karst sinkholes
1
作者 YU Bo TAI Shengping +4 位作者 ZHENG Kexun CHEN Shiwan HAN Xiao WANG Senlin ZUO Shuangying 《Journal of Mountain Science》 SCIE CSCD 2024年第3期1048-1057,共10页
Karst sinkholes with natural negative landform provide favorable conditions for the pumped storage reservoir construction for less excavation work.However,the construction of the reservoir would plug the natural karst... Karst sinkholes with natural negative landform provide favorable conditions for the pumped storage reservoir construction for less excavation work.However,the construction of the reservoir would plug the natural karst channels for water and air,which would cause remarkable air pressure in karst channels when the groundwater level fluctuates.A large laboratory simulation test was carried out to study the air pressure variation of a reservoir built on the karst sinkhole.The air pressure in the karst channel and inside the model was monitored during the groundwater rising and falling process.Result showed that the variation of air pressure in the karst channel and the surrounding rock exhibited a high degree of similarity.The air pressure increased rapidly at the initial stage of water level rising,followed by a slight decrease,then the air pressure increased sharply when the water level approached the top of the karst cave.The initial peak of air pressure and the final peak of air pressure were defined,and both air pressure peaks were linearly increasing with the water level rising rate.The negative air pressure was also analyzed during the drainage process,which was linearly correlated with the water level falling rate.The causes of air pressure variation in karst channels of a pumped storage reservoir built on the karst sinkhole were discussed.The initial rapid increase,then slight decrease and final sudden increase of air pressure were controlled by the combined effects of air compression in karst channel and air seepage into the surrounding rock.For the drainage process,the instant negative air pressure and gradual recovering of air pressure were controlled by the combined effects of negative air pressure induced by water level falling and air supply from surrounding rock.This work could provide valuable reference for the reservoir construction in karst area. 展开更多
关键词 Simulation test Karst sinkhole Pumped storage reservoir Air pressure Flow rate
下载PDF
Tectonic Analysis of the Al Hamadah Al Hamra Plateau of the Ghadamis Basin (NW Libya): Hydrological Network, Sinkholes, Folds and Fractures. Style of Reactivation and Setting of Cenozoic Volcanism
2
作者 Mahmoud A. Benissa Jean Chorowicz 《International Journal of Geosciences》 2019年第5期527-562,共36页
Remote sensing analysis is an efficient tool for updating geological maps. The regional scale map obtained in this project from compilation of the pre-existing maps and of a number of space images is somewhat more com... Remote sensing analysis is an efficient tool for updating geological maps. The regional scale map obtained in this project from compilation of the pre-existing maps and of a number of space images is somewhat more complete. It takes into account the usual field and laboratory parameters of the rock units, through the previous geologic maps, together with remote sensing parameters such as spectral signatures, textures, roughness, morphology that are observed from optical, microwave and DEM imagery. With more rock characteristics, the old maps are obligatory improved. The Cenozoic faulting in the Al Hamra al Hamadah plateau is largely influenced by the tectonics affecting the Paleozoic oil bearing structures that are hidden by the late Cretaceous-Paleocene layers. The tectonic style is that of reactivation of the Paleozoic faults under effects of the NNE-trending regional tension. Then the faults on the surface of the plateau would indicate location of the hidden Paleozoic faults in depth. A flat plateau, in the arid environment, appears to be a very favorable environment for mapping of gentle folds, faults and tectonic sinkholes. Remote sensing is a fruitful approach in this case study. The gentle anticlines for instance are undetectable in the field, but computer assisted shadowing with a low elevation angle of illumination is the key processing for evidencing these features. Problems of drillings in the area are well known for example to Waha, AGOCO and PB Companies during their exploration activities in the concessions in Ghadames Basin. According to them several incidents of losing drilling Pits have occurred and drilling came into a hole. Because this paper is aimed to know the exact location of sinkholes in the Ghadames basin, I would recommend all the oil companies to review this work and try to trace the sinkholes indicated to minimize the risk of drilling problems. 展开更多
关键词 AL Qarqaf Arch Ghadamis BASIN TECTONIC AL Hamada AL Hamra PLATEAU Hydrological Network sinkholes Cenozoic Volcanism
下载PDF
Geospatial Modeling for Sinkholes Hazard Map Based on GIS &RS Data
3
作者 Omar Al-Kouri A’kif Al-Fugara +3 位作者 Samih Al-Rawashdeh Balqies Sadoun Balqies Sadoun Biswajeet Pradhan 《Journal of Geographic Information System》 2013年第6期584-592,共9页
The Kinta Valley is an area of karst in the north-western part of Peninsular Malaysia. Over 30 years of uncontrolled land use and development has led to significant changes in topography and geomorphology, such as the... The Kinta Valley is an area of karst in the north-western part of Peninsular Malaysia. Over 30 years of uncontrolled land use and development has led to significant changes in topography and geomorphology, such as the appearance of sinkholes. In this paper, geospatial techniques were utilized to the task of evaluating sinkholes susceptibility map using a spatial multi criteria evaluation approach (SMCE). Sinkhole location and a spatial database were applied to calculate eight inherent causative factors for limestone instability namely: lithology, structure (lineament), soil cover, slope, land use mining, urban area features, ponds and rivers. The preparation of the sinkhole geohazard map involved summing the weighted values for each hazard element, which permits the construction of geohazard model;the results of the analysis were validated using the previous actual sinkholes locations in the study area. The spatial distribution of sinkholes occurrence, urban development, faults distribution and ex-mining ponds are factors that are directly responsible for all sinkholes subsidence hazards. Further, the resulting geo-hazard map shows that 93% of recent sinkholes occur in areas where the model flags as “high” and “very high” potential hazard, located in the urbanized part of the valley, while less-developed areas to the west and southwest suffered less sinkhole development. The results can be used for hazard prevention and land-use planning. 展开更多
关键词 Geo-Hazard MAPPING KARST sinkholes GEOSPATIAL Modeling
下载PDF
Feasibility study on sinkhole monitoring with fiber optic strain sensing nerves
4
作者 Yuxin Gao Honghu Zhu +3 位作者 Liang Qiao Xifeng Liu Chao Wei Wei Zhang 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2023年第11期3059-3070,共12页
Anthropogenic activity-induced sinkholes pose a serious threat to building safety and human life nowadays.Real-time detection and early warning of sinkhole formation are a key and urgent problem in urban areas.This pa... Anthropogenic activity-induced sinkholes pose a serious threat to building safety and human life nowadays.Real-time detection and early warning of sinkhole formation are a key and urgent problem in urban areas.This paper presents an experimental study to evaluate the feasibility of fiber optic strain sensing nerves in sinkhole monitoring.Combining the artificial neural network(ANN)and particle image velocimetry(PIV)techniques,a series of model tests have been performed to explore the relationship between strain measurements and sinkhole development and to establish a conversion model from strain data to ground settlements.It is demonstrated that the failure mechanism of the soil above the sinkhole developed from a triangle failure plane to a vertical failure plane with increasing collapse volume.Meanwhile,the soil-embedded fiber optic strain sensing nerves allowed deformation monitoring of the ground soil in real time.Furthermore,the characteristics of the measured strain profiles indicate the locations of sinkholes and the associated shear bands.Based on the strain data,the ANN model predicts the ground settlement well.Additionally,micro-anchored fiber optic cables have been proven to increase the soil-to-fiber strain transfer efficiency for large deformation monitoring of ground collapse. 展开更多
关键词 SINKHOLE Geotechnical monitoring Distributed fiber optic sensing(DFOS) Artificial neural network(ANN) Ground settlement Soil arching Micro-anchor
下载PDF
基于汇聚度的传感器网络Sinkhole攻击检测 被引量:3
5
作者 谢磊 徐勇军 +1 位作者 祝跃飞 潘勇 《计算机工程》 CAS CSCD 北大核心 2009年第11期1-3,共3页
传感器网络以数据为中心的特殊流量汇聚模式尤其易受Sinkhole攻击。通过分析Sinkhole攻击点邻近区域的路由特点,提出一种新颖的基于汇聚度检测Sinkhole攻击的策略。该策略无需运行密码算法,无需额外通信开销,适用于不同网络部署密度、... 传感器网络以数据为中心的特殊流量汇聚模式尤其易受Sinkhole攻击。通过分析Sinkhole攻击点邻近区域的路由特点,提出一种新颖的基于汇聚度检测Sinkhole攻击的策略。该策略无需运行密码算法,无需额外通信开销,适用于不同网络部署密度、信道质量及攻击强度下的攻击检测。 展开更多
关键词 传感器网络 Sinkhole攻击 汇聚度
下载PDF
一种蚁群优化的WSN分布式入侵检测模型 被引量:3
6
作者 余小华 黄灿辉 陈瑛 《计算机工程与应用》 CSCD 2012年第9期78-82,85,共6页
针对无线传感器网络中入侵者能在多个节点上移动并隐藏攻击源头的特点,提出了一种基于蚁群优化的无线传感器网络分布式入侵检测模型。分析了现有入侵检测对未知攻击检测率和误报率方面的不足,在此基础上提出了分布式入侵检测的体系结构... 针对无线传感器网络中入侵者能在多个节点上移动并隐藏攻击源头的特点,提出了一种基于蚁群优化的无线传感器网络分布式入侵检测模型。分析了现有入侵检测对未知攻击检测率和误报率方面的不足,在此基础上提出了分布式入侵检测的体系结构,设计了基于蚁群优化的入侵检测算法。仿真实验表明提出的方案能够提高无线传感器网络对未知攻击的检测率和降低对正常网络流量的误报率,较好地解决了路由攻击、Sinkhole攻击问题,能够降低入侵检测的能耗。 展开更多
关键词 无线传感器网络 分布式入侵检测 蚁群优化 路由攻击 Sinkhole攻击
下载PDF
基于BGP协议的IP黑名单分发系统 被引量:3
7
作者 张焕杰 杨寿保 《中国海洋大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第S1期157-159,共3页
在网络中设置IP黑名单,可以极大的减少网络安全事件的发生。系统将IP黑名单信息存放在数据库中,简化的BGP协议客户端读取数据库中的信息,利用BGP协议将IP黑名单更新给路由服务器(Router Server)并分发到各个路由器上。数据库存放的IP黑... 在网络中设置IP黑名单,可以极大的减少网络安全事件的发生。系统将IP黑名单信息存放在数据库中,简化的BGP协议客户端读取数据库中的信息,利用BGP协议将IP黑名单更新给路由服务器(Router Server)并分发到各个路由器上。数据库存放的IP黑名单信息易于由程序自动进行添加、删除等操作,BGP协议的应用使得系统的可扩展性很强,路由器的管理员可选择性应用IP黑名单,灵活性更好。 展开更多
关键词 BGP IP黑名单 IP BLACKLIST blackhole SINKHOLE
下载PDF
关联规则挖掘结合简化粒子群优化的哈希回溯追踪协议 被引量:4
8
作者 侯燕 郭慧玲 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2016年第2期239-246,共8页
针对源路径隔离引擎(source path isolation engine,SPIE)不能回溯追踪早期经过路由器的攻击数据包问题,提出了一种IP回溯追踪协议(IP trace-back protocol,ITP),该协议根据压缩哈希表、Sinkhole路由算法和基于网络取证的数据挖掘技术... 针对源路径隔离引擎(source path isolation engine,SPIE)不能回溯追踪早期经过路由器的攻击数据包问题,提出了一种IP回溯追踪协议(IP trace-back protocol,ITP),该协议根据压缩哈希表、Sinkhole路由算法和基于网络取证的数据挖掘技术抵抗网络攻击。其中包含简化粒子群优化(simplified particle swarm optimization,SPSO)关联算法的分析管理器(attack analysis manager,AAM)通过分析来自Sinkhole路由器和入侵检测系统(intrusion detection systems,IDS)的攻击包的关联性生成攻击模式和攻击包规则,并将该结果通知系统管理器,Sinkhole路由器和IDS通过数据挖掘技术分析攻击包之间的关联性。通过比较SPIE,概率包标记(probabilistic packet marking,PPM)和i Trace的性能可以看出,ITP不仅能实时追踪后向攻击,而且能定期使用压缩哈希表(compressed hash table,CHT)完成追踪任务。因此,在抵抗Do S攻击方面,ITP性能优于SPIE,PPM和i Trace,此外,在回溯执行时间方面,相同跳跃数下,ITP比iTrace低2-3 s。 展开更多
关键词 攻击数据包 IP回溯协议 压缩哈希表 简化粒子群优化 Sinkhole路由器 数据挖掘
下载PDF
Geophysical Surveys over Karst Recharge Features,Illinois,USA
9
作者 Philip J.CARPENTER Shawkat AHMED 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2001年第3期249-253,共5页
Karst aquifers supply a significant fraction of the world's drinking water. These types of aquifers are alsohighly susceptible to pollution from the surface with recharge usually occurring through fractures and so... Karst aquifers supply a significant fraction of the world's drinking water. These types of aquifers are alsohighly susceptible to pollution from the surface with recharge usually occurring through fractures and solution openings at the bedrock surface. Thickness of the protective soil cover, macropores and openings within the soil cover, and the nature of the weathered bedrock surface all influence infiltration. Recharge openings at the bedrock surface, however, are often covered by unconsolidated sediments, resulting in the inadvertent placement of landfills, unregulated dump sites, tailing piles, waste lagoons and septic systems over recharge zones. In these settings surface geophysical surveys, calibrated by a few soil cores, could be employed to identify these recharge openings, and qualitatively assess the protection afforded by the soil cover. In a test of this hypothesis, geophysical measurements accurately predicted the thickness of unconsolidated deposits overlying karstic dolomite at a site about 100 km south of Chicago, Illinois. Zones of elevated electrical conductivity and high ground-penetrating radar (GPR) attenuation within the sediments coincided with subcropping solutionally-enlarged hydraulically active bedrock fractures. These fractures extend to over 12-m depth, as shown by 2-D inverted resistivity sections and soil coring. Anomalous electromagnetic (EM) conductivity and GPR response may be due to higher soil moisture above these enlarged fractures. An epikarstal conduit at 2.5-m depth was directly identified through a GPR survey. These results suggest that surface geophysical surveys are a viable tool for assessing the susceptibility of shallow karst aquifers to contamination. 展开更多
关键词 KARST GEOPHYSICS EPIKARST soil pipes RECHARGE INFILTRATION sinkholes
下载PDF
Risk Assessment for Karst Hazards at a Facility in Saudi Arabia—A Case Study
10
作者 Bassim A. Nawaz Emmanouil Spyropoulos Adly Kh. Al-Saafin 《Journal of Geoscience and Environment Protection》 2020年第5期277-312,共36页
The boom in industrial and infrastructure construction in Saudi Arabia requires in-depth knowledge of the underground conditions to build a sustainable project. This paper gave a practical example of the challenges fa... The boom in industrial and infrastructure construction in Saudi Arabia requires in-depth knowledge of the underground conditions to build a sustainable project. This paper gave a practical example of the challenges facing an existing facility built on a karstic limestone formation in 1970’s. Multiple geophysical techniques such as Microgravity, Electrical Resistivity Imaging, Vertical Seismic Velocity Profiling, Cross Hole Seismic Tomography, Ground Penetration Radar, Multi-Channel Analysis of Surface Waves, as well as boreholes and down-hole video imagery, were deployed through the journey of assessing the karst associated hazards of potential sinkholes or general subsidence. This paper described the karst processes, site geology, geophysical and geotechnical exploration program, and characterizes the subsurface karst conditions at the eastern province of Kingdom of Saudi Arabia. Results and findings of preliminary, geotechnical and geophysical investigations have been utilized to identify the major factors influencing the karst formation. Analyses and integration of obtained results to estimate the type and magnitude of risk affected the major components of industrial facility at the project site using well-known statistical approach were presented in this paper. Consequently number of remedial measures implemented to combating the experienced and expected karst hazards at the studied industrial facility placed in karstified landform are given. A model for using integrated geophysical and geotechnical techniques to assess karst-related risks to a facility was further explored herein. 展开更多
关键词 Risk Assessment CAVITIES KARST SUBSIDENCE sinkholes KARST HAZARD Remedial and PREVENTIVE Measures
下载PDF
无线传感器网络中的sinkhole攻击检测 被引量:2
11
作者 周玲玲 张建明 王良民 《计算机工程与应用》 CSCD 北大核心 2008年第22期135-138,共4页
对sinkhole攻击进行了研究,提出了基于多点监测与回复信息的攻击检测方法。利用基站和节点间数据包的传输与确认,结合邻节点的监视机制对节点收发的数据包统计分析,检测sinkhole攻击。这种方法避免了复杂的加密算法与身份认证,与多路径... 对sinkhole攻击进行了研究,提出了基于多点监测与回复信息的攻击检测方法。利用基站和节点间数据包的传输与确认,结合邻节点的监视机制对节点收发的数据包统计分析,检测sinkhole攻击。这种方法避免了复杂的加密算法与身份认证,与多路径安全机制相比有着更高的可靠性。对安全概率进行了理论分析,并进一步通过仿真实验对方法进行了验证。 展开更多
关键词 无线传感器网络 入侵检测 sinkhole攻击 多点监测
下载PDF
无线传感器网络中的sinkhole攻击检测技术研究
12
作者 王雪丽 《赤峰学院学报(自然科学版)》 2016年第13期16-18,共3页
在无线传感器系统中,Sinkhole是一种相对基础且常见的路由攻击类型,攻击者通过声称到目的节点或基站具有高质量的路径吸引周围节点的数据流,对网络的负载平衡造成了严重的影响.当前,sinkhole攻击检测技术在网络安全问题中占有重要的地位... 在无线传感器系统中,Sinkhole是一种相对基础且常见的路由攻击类型,攻击者通过声称到目的节点或基站具有高质量的路径吸引周围节点的数据流,对网络的负载平衡造成了严重的影响.当前,sinkhole攻击检测技术在网络安全问题中占有重要的地位,其重要性越来越受到人们的重视.基于此,本文对无线传感器网络中的sinkhole攻击检测技术原理与设计进行了分析,以便于更好利用该技术对计算机网络进行保护. 展开更多
关键词 sinkhole攻击 无线传感器 检测技术
下载PDF
基于模糊逻辑分类的WSN Sinkhole侦测 被引量:1
13
作者 高建斌 娄渊胜 《计算机工程》 CAS CSCD 北大核心 2011年第9期178-180,共3页
分析无线传感器网络Sinkhole攻击侦测的监测特征、方法和侦测流程,设计并实现基于模糊逻辑分类的攻击侦测方案。仿真实验表明,该方案能较好地解决多因素集合的模糊信息问题,克服以往方案侦测模型复杂、误报率较高的不足,具有运算量小,... 分析无线传感器网络Sinkhole攻击侦测的监测特征、方法和侦测流程,设计并实现基于模糊逻辑分类的攻击侦测方案。仿真实验表明,该方案能较好地解决多因素集合的模糊信息问题,克服以往方案侦测模型复杂、误报率较高的不足,具有运算量小,易于实现、适用性好的特点。 展开更多
关键词 无线传感器网络 模糊逻辑 Sinkhole攻击 侦测模型
下载PDF
无线传感器网络中基于Sinkhole攻击的入侵检测系统研究 被引量:3
14
作者 滕丽萍 《计算机应用与软件》 CSCD 北大核心 2013年第6期312-315,328,共5页
随着无线传感器网络应用范围的扩大、传感数据重要性的提高,其安全性也日益受到关注。Sinkhole是一种比较基础且常见的路由攻击类型,在该攻击中,攻击者通过声称到目的节点或基站具有高质量的路径吸引周围节点的数据流,严重破坏了网络的... 随着无线传感器网络应用范围的扩大、传感数据重要性的提高,其安全性也日益受到关注。Sinkhole是一种比较基础且常见的路由攻击类型,在该攻击中,攻击者通过声称到目的节点或基站具有高质量的路径吸引周围节点的数据流,严重破坏了网络的负载平衡。根据AODV协议中Sinkhole攻击方式特点,设计一个基于规范的分布式入侵检测系统,并对入侵检测系统的各功能模块进行详细的设计和分析。该系统通过本地数据监控模块提供的信息对节点的行为进行状态转换,判断节点是否发生异常行为,同时结合其他节点提供的信息最终确定攻击者。仿真结果和分析表明所设计的基于AODV路由协议的入侵检测系统具有良好性能,即使在有攻击出现的情况下,网络仍可以保持较高的传输率。 展开更多
关键词 无线传感器网络 SINKHOLE 入侵检测
下载PDF
无线传感器网络中sinkhole攻击研究 被引量:3
15
作者 滕丽萍 张永平 《计算机安全》 2011年第1期30-34,共5页
无线传感器网络在安全路由以及入侵检测研究等方面之所以没有显著的成绩,原因之一就是对于"入侵"的概念不是很清楚。对无线传感器网络中sinkhole这一类重要攻击进行了深入研究。首先介绍了sinkhole的产生及危害,然后分析了目... 无线传感器网络在安全路由以及入侵检测研究等方面之所以没有显著的成绩,原因之一就是对于"入侵"的概念不是很清楚。对无线传感器网络中sinkhole这一类重要攻击进行了深入研究。首先介绍了sinkhole的产生及危害,然后分析了目前针对sinkhole攻击检测技术研究进展,其次重点描述了攻击者在具体的路由协议中如何成功发起攻击,最后提出针对sinkhole攻击研究的若干热点问题与展望。 展开更多
关键词 无线传感器网络 入侵 SINKHOLE
下载PDF
Undrained stability of a spherical cavity in cohesive soils using finite element limit analysis 被引量:2
16
作者 Suraparb Keawsawasvong Boonchai Ukritchon 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2019年第6期1274-1285,共12页
A parametric study of undrained stability of a spherical cavity in clays is investigated by finite elementlimit analysis with an axisymmetric condition. Influences of cover depth ratio of cavity and dimensionlessoverb... A parametric study of undrained stability of a spherical cavity in clays is investigated by finite elementlimit analysis with an axisymmetric condition. Influences of cover depth ratio of cavity and dimensionlessoverburden factor on predicted failure mechanisms and dimensionless load factor are examined.It is found that a previously recommended and up-to-date lower bound solution to the problem wassignificantly inaccurate for practice use. Thus, an accurate approximate solution to the problem is proposedfrom nonlinear regression analysis of the computed average bound solutions. New cavity stabilityfactors for the soil cohesion and soil unit weight are proposed. New findings are revealed for the threedimensionaleffect of the cavity shape on these factors between the axisymmetric and plane strainconditions, and their applications to the undrained stability evaluation of cavity problems in practice aredescribed. 展开更多
关键词 LIMIT analysis UNDRAINED STABILITY SPHERICAL cavity SINKHOLE AXISYMMETRY
下载PDF
无线传感器网络中的Sinkhole攻击检测 被引量:1
17
作者 袁伟 《电脑编程技巧与维护》 2011年第6期67-69,共3页
探讨了无限传感网络的构成及无线传感器网络协议栈各层所面临的安全问题,重点讨论了Sinkhole攻击的危害及检测,通过分析Sinkhole攻击点邻近区域的路由特点,提出了基于汇聚度检测Sinkhole攻击的策略和基于多点监测与回复信息的攻击检测... 探讨了无限传感网络的构成及无线传感器网络协议栈各层所面临的安全问题,重点讨论了Sinkhole攻击的危害及检测,通过分析Sinkhole攻击点邻近区域的路由特点,提出了基于汇聚度检测Sinkhole攻击的策略和基于多点监测与回复信息的攻击检测方法。 展开更多
关键词 无线传感器网络 Sinkhole攻击 检测
下载PDF
ACO结合P2P信任模型的无线传感器网络Sinkhole攻击检测 被引量:1
18
作者 合尼古力.吾买尔 《电信科学》 北大核心 2016年第4期52-58,共7页
针对无线传感器网络中的Sinkhole攻击问题,提出了一种基于蚁群优化(ACO)结合P2P信任模型的Sinkhole攻击检测(P-ACO)算法。首先,使用蚁群优化算法检测路由中是否存在Sinkhole攻击,并生成传感器节点的警报信息;然后,利用布尔表达式进化标... 针对无线传感器网络中的Sinkhole攻击问题,提出了一种基于蚁群优化(ACO)结合P2P信任模型的Sinkhole攻击检测(P-ACO)算法。首先,使用蚁群优化算法检测路由中是否存在Sinkhole攻击,并生成传感器节点的警报信息;然后,利用布尔表达式进化标记生成算法为群组警报节点分发密钥,并使用密钥标记可疑节点;最后,计算可疑节点列表中各节点的信任值,将信任值低于预设阈值的节点视为攻击节点。分析表明,相比二分查找算法与基于规则匹配的神经网络(RMNN)算法,该算法在匹配过程中需要更少的匹配搜索次数,提高了算法执行效率。实验结果显示,相比RMNN算法,该算法可以更加准确地检测Sinkhole攻击。 展开更多
关键词 无线传感器网络 Sinkhole攻击 二分查找算法 蚁群优化 P2P信任模型
下载PDF
GPSR地理路由协议中sinkhole攻击及其入侵检测方法的研究 被引量:1
19
作者 降帅 《电子测试》 2016年第6X期155-156,共2页
随着微电子技术、计算技术和无线通信等技术的飞速发展和日益成熟,无线传感器网络被广泛应用于军事、环境监测等多个领域,但是网络的不安全性限制了它的应用,安全问题受到了越来越多研究者的关注。基于这一现状,提出了一种改进的GPSR地... 随着微电子技术、计算技术和无线通信等技术的飞速发展和日益成熟,无线传感器网络被广泛应用于军事、环境监测等多个领域,但是网络的不安全性限制了它的应用,安全问题受到了越来越多研究者的关注。基于这一现状,提出了一种改进的GPSR地理路由协议。这种简易的能量改进策略,以减少由于GPSR协议中周围模式引起的过多的跳跃。无线传感器网络中存在着多种攻击威胁着网络的安全,其中Sinkhole攻击是一种常见的、基础型的攻击,很多攻击以它为基础或辅助手段对网络实施攻击。本文根据GPSR的Sinkhole攻击手段,对sinkhole的入侵检测方法进行分析。 展开更多
关键词 GPSR地理路由协议 SINKHOLE 检测
下载PDF
A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network
20
作者 Geetha V. K. Chandrasekaran 《Wireless Sensor Network》 2014年第9期173-183,共11页
The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptograp... The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptography techniques can ensure confidentiality, integrity and authentication. However, wireless sensor network also needs to deal with inside and outside attackers. To deal with outside attackers, attacks by compromised or malicious nodes, trust management system is suggested by many researchers in the area of wireless sensor network. Trust management system can be implemented in various applications for security management such as secure data aggregation, secure cluster head selection, trusted routing, access control, etc. Many researchers provide different kind of solutions for these secure applications based on trust management. However, to incorporate, all such applications on a single sensor node in the network, it is essential to design and develop a trust management system, which considers various aspects and applications of wireless sensor network. As a result, in this paper, we would like to propose a parameter and trust factor based secure communication framework and design a trust management system for wireless sensor networks. Our main contribution is to identify various parameters and trust factors which influences on trust in wireless sensor network and developing a framework for a trust management system based on various parameters and trust factors. The working of the proposed model is shown by simulation experiments conducted in MATLAB for the application of secure communication, data aggregation and intrusion detection in wireless sensor networks. 展开更多
关键词 Wireless Sensor Network TRUST Management System BLACK HOLE SINKHOLE DOS TRUST Factors
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部