摘要
针对现有无线传感器网络恶意节点检测方法效率较低的不足,提出一种基于增强低功耗自适应集簇分层(enhanced low energy adaptive clustering hierarchy,enhanced LEACH)路由协议信誉机制的恶意节点检测(malicious node detection based on enhanced LEACH with reputation,MNDELR)模型.在无线传感器网络中使用增强LEACH路由协议选取簇首节点,其余节点选择对应簇首形成各簇集群并确定网络数据包传递路径.节点在数据包内添加节点编号、信誉评价等信息并按传递路径将数据包发送至汇聚节点;汇聚节点解析获取数据包内节点编号并与源节点编号比较判定,形成可疑节点列表;计算节点信誉值并与阈值比较判定网络中的恶意节点.实验结果表明,与其他方法相比,MNDELR模型在无线传感器网络中对恶意节点的检测效果较为显著.
To solve the efficiency problem of the existing malicious node detection methods in wireless sensor networks(WSN),a malicious node detection model was proposed based on enhanced low energy adaptive clustering hierarchy(LEACH)routing protocol with reputation(MNDELR).Firstly,in wireless sensor network,the enhanced LEACH routing protocol was used to select the cluster-head nodes and make other nodes to be corresponding cluster-head nodes to form the clusters and determine the packets delivery paths in the network.Then,some information,including the node numbers and the reputation evaluation,were added to the data packets of nodes,and the data packets were sent to the sink node according to the delivery paths.The node numbers in the packets were parsed and compared with the source node numbers in the convergent node to form a list of suspicious nodes.Finally,the reputation values of the nodes were calculated and compared with the threshold to determine the malicious nodes in the network.The experiment results show that,compared with other methods,MNDELR model can detect malicious nodes in WSN more effectively.
引文
[1]张玉泉.无线传感器网络安全问题研究[M].济南:山东人民出版社,2013:5-18.Zhang Yuquan.The study on security problems of wireless sensor networks[M].Ji’nan:Shandong People’s Publishing House,2013:5-18.(in Chinese)
[2]Prathap U,Shenoy P D,Venugopal K R.CMNTS:catching malicious nodes with trust support in wireless sensor networks[C]∥2016IEEE Region 10Symposium.Piscataway,NJ,USA:IEEE Press,2016:77-82.
[3]Althunibat S,Antonopoulos A,Kartsakli E,et al.Countering intelligent-dependent malicious nodes in target detection wireless sensor networks[J].IEEE Sensors Journal,2016,16(23):8627-8639.
[4]崔慧,潘巨龙,闫丹丹.无线传感器网络中基于信誉-投票机制的恶意节点检测[J].中国计量学院学报,2013,24(4):353-359.Cui Hui,Pan Julong,Yan Dandan.Malicious node detection algorithm based on reputation with voting machanism in wireless sensor networks[J].Journal of China University of Metrology,2013,24(4):353-359.(in Chinese)
[5]Singh S S,Jinila Y B.Sensor node failure detection using check point recovery algorithm[C]∥2016International Conference on Recent Trends in Information Technology.Piscataway,NJ,USA:IEEE Press,2016:1-4.
[6]Prabha V R,Latha P.Fuzzy trust protocol for malicious node detection in wireless sensor networks[J].Wireless Personal Communications,2016,94(4):1-11.
[7]Varshney K K,Samundiswary P.Performance analysis of malicious nodes in IEEE 802.15.4based wireless sensor network[C]∥2014International Conference on Information Communication and Embedded Systems.Piscataway,NJ,USA:IEEE Press,2014:1-5.
[8]Das S,Das A.An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol[C]∥2015International Conference on Advances in Computer Engineering and Applications.Piscataway,NJ,USA:IEEE Press,2015:875-881.
[9]马振福.无线传感器网络中LEACH-C协议簇首选择方案研究[D].威海:山东大学(威海),2016.Ma Zhenfu.A study on cluster head selection scheme for LEACH-C in wireless sensor network[D].Weihai:Shandong University(Weihai),2016.(in Chinese)
[10]刘华博,崔建明,戴鸿君.基于多元分类的无线传感器网络恶意节点检测算法[J].传感技术学报,2011,24(5):771-777.Liu Huabo,Cui Jianming,Dai Hongjun.Multivariate classification-based malicious detection for wireless sensor network[J].Chinese Journal of Sensors and Actuators,2011,24(5):771-777.(in Chinese)
[11]胡玲龙,潘巨龙,崔慧.无线传感器网络中基于信誉的恶意节点检测[J].中国计量学院学报,2012,23(1):41-47.Hu Linglong,Pan Julong,Cui Hui.A reputation-based method for detecting malicious nodes in WSNs[J].Journal of China University of Metrology,2012,23(1):41-47.(in Chinese)
[12]Prathap U,Shenoy P D,Venugopal K R.CPMTS:catching packet modifiers with trust support in wireless sensor networks[C]∥2015IEEE International WIEConference on Electrical and Computer Engineering.Piscataway,NJ,USA:IEEE Press,2015:255-258.