用户名: 密码: 验证码:
基于增强LEACH协议的无线传感器网络恶意节点检测模型
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Enhanced LEACH Protocol Based Wireless Sensor Network Malicious Node Detection Model
  • 作者:杨宏宇 ; 程放
  • 英文作者:YANG Hong-yu;CHENG Fang;School of Computer Science and Technology,Civil Aviation University of China;
  • 关键词:无线传感器网络 ; 恶意节点 ; 信誉值 ; 簇集群 ; 判定
  • 英文关键词:wireless sensor network;;malicious node;;reputation value;;cluster;;determine
  • 中文刊名:BJLG
  • 英文刊名:Transactions of Beijing Institute of Technology
  • 机构:中国民航大学计算机科学与技术学院;
  • 出版日期:2019-03-15
  • 出版单位:北京理工大学学报
  • 年:2019
  • 期:v.39;No.289
  • 基金:国家科技重大专项项目(2012ZX03002002);; 国家自然科学基金资助项目(U1833107);; 中国民航科技项目(MHRD201009,MHRD201205);; 中央高校基本科研业务费专项项目(3122014D033)
  • 语种:中文;
  • 页:BJLG201903013
  • 页数:7
  • CN:03
  • ISSN:11-2596/T
  • 分类号:88-94
摘要
针对现有无线传感器网络恶意节点检测方法效率较低的不足,提出一种基于增强低功耗自适应集簇分层(enhanced low energy adaptive clustering hierarchy,enhanced LEACH)路由协议信誉机制的恶意节点检测(malicious node detection based on enhanced LEACH with reputation,MNDELR)模型.在无线传感器网络中使用增强LEACH路由协议选取簇首节点,其余节点选择对应簇首形成各簇集群并确定网络数据包传递路径.节点在数据包内添加节点编号、信誉评价等信息并按传递路径将数据包发送至汇聚节点;汇聚节点解析获取数据包内节点编号并与源节点编号比较判定,形成可疑节点列表;计算节点信誉值并与阈值比较判定网络中的恶意节点.实验结果表明,与其他方法相比,MNDELR模型在无线传感器网络中对恶意节点的检测效果较为显著.
        To solve the efficiency problem of the existing malicious node detection methods in wireless sensor networks(WSN),a malicious node detection model was proposed based on enhanced low energy adaptive clustering hierarchy(LEACH)routing protocol with reputation(MNDELR).Firstly,in wireless sensor network,the enhanced LEACH routing protocol was used to select the cluster-head nodes and make other nodes to be corresponding cluster-head nodes to form the clusters and determine the packets delivery paths in the network.Then,some information,including the node numbers and the reputation evaluation,were added to the data packets of nodes,and the data packets were sent to the sink node according to the delivery paths.The node numbers in the packets were parsed and compared with the source node numbers in the convergent node to form a list of suspicious nodes.Finally,the reputation values of the nodes were calculated and compared with the threshold to determine the malicious nodes in the network.The experiment results show that,compared with other methods,MNDELR model can detect malicious nodes in WSN more effectively.
引文
[1]张玉泉.无线传感器网络安全问题研究[M].济南:山东人民出版社,2013:5-18.Zhang Yuquan.The study on security problems of wireless sensor networks[M].Ji’nan:Shandong People’s Publishing House,2013:5-18.(in Chinese)
    [2]Prathap U,Shenoy P D,Venugopal K R.CMNTS:catching malicious nodes with trust support in wireless sensor networks[C]∥2016IEEE Region 10Symposium.Piscataway,NJ,USA:IEEE Press,2016:77-82.
    [3]Althunibat S,Antonopoulos A,Kartsakli E,et al.Countering intelligent-dependent malicious nodes in target detection wireless sensor networks[J].IEEE Sensors Journal,2016,16(23):8627-8639.
    [4]崔慧,潘巨龙,闫丹丹.无线传感器网络中基于信誉-投票机制的恶意节点检测[J].中国计量学院学报,2013,24(4):353-359.Cui Hui,Pan Julong,Yan Dandan.Malicious node detection algorithm based on reputation with voting machanism in wireless sensor networks[J].Journal of China University of Metrology,2013,24(4):353-359.(in Chinese)
    [5]Singh S S,Jinila Y B.Sensor node failure detection using check point recovery algorithm[C]∥2016International Conference on Recent Trends in Information Technology.Piscataway,NJ,USA:IEEE Press,2016:1-4.
    [6]Prabha V R,Latha P.Fuzzy trust protocol for malicious node detection in wireless sensor networks[J].Wireless Personal Communications,2016,94(4):1-11.
    [7]Varshney K K,Samundiswary P.Performance analysis of malicious nodes in IEEE 802.15.4based wireless sensor network[C]∥2014International Conference on Information Communication and Embedded Systems.Piscataway,NJ,USA:IEEE Press,2014:1-5.
    [8]Das S,Das A.An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol[C]∥2015International Conference on Advances in Computer Engineering and Applications.Piscataway,NJ,USA:IEEE Press,2015:875-881.
    [9]马振福.无线传感器网络中LEACH-C协议簇首选择方案研究[D].威海:山东大学(威海),2016.Ma Zhenfu.A study on cluster head selection scheme for LEACH-C in wireless sensor network[D].Weihai:Shandong University(Weihai),2016.(in Chinese)
    [10]刘华博,崔建明,戴鸿君.基于多元分类的无线传感器网络恶意节点检测算法[J].传感技术学报,2011,24(5):771-777.Liu Huabo,Cui Jianming,Dai Hongjun.Multivariate classification-based malicious detection for wireless sensor network[J].Chinese Journal of Sensors and Actuators,2011,24(5):771-777.(in Chinese)
    [11]胡玲龙,潘巨龙,崔慧.无线传感器网络中基于信誉的恶意节点检测[J].中国计量学院学报,2012,23(1):41-47.Hu Linglong,Pan Julong,Cui Hui.A reputation-based method for detecting malicious nodes in WSNs[J].Journal of China University of Metrology,2012,23(1):41-47.(in Chinese)
    [12]Prathap U,Shenoy P D,Venugopal K R.CPMTS:catching packet modifiers with trust support in wireless sensor networks[C]∥2015IEEE International WIEConference on Electrical and Computer Engineering.Piscataway,NJ,USA:IEEE Press,2015:255-258.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700