高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于简化云与K/N投票的选择性转发攻击检测方法

尹荣荣 张文元 杨绸绸 李曦达

尹荣荣, 张文元, 杨绸绸, 李曦达. 基于简化云与K/N投票的选择性转发攻击检测方法[J]. 电子与信息学报, 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274
引用本文: 尹荣荣, 张文元, 杨绸绸, 李曦达. 基于简化云与K/N投票的选择性转发攻击检测方法[J]. 电子与信息学报, 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274
Rongrong YIN, Wenyuan ZHANG, Chouchou YANG, Xida LI. A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274
Citation: Rongrong YIN, Wenyuan ZHANG, Chouchou YANG, Xida LI. A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274

基于简化云与K/N投票的选择性转发攻击检测方法

doi: 10.11999/JEIT190274
基金项目: 国家自然科学基金(61802333),国家留学基金(201808130258),河北省高等学校科学技术研究项目(QN2018029)
详细信息
    作者简介:

    尹荣荣:女,1985年生,副教授,研究方向为无线传感器网络、网络安全

    张文元:男,1991年生,硕士生,研究方向为无线传感器网络攻击检测

    杨绸绸:女,1974年生,副研究员,研究方向为无线传感器网络攻击防御

    李曦达:女,1977年生,副教授,研究方向为无线传感器网络资源优化

    通讯作者:

    尹荣荣 yrr@ysu.edu.cn

  • 中图分类号: TN915.08; TP393

A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model

Funds: The National Natural Science Foundation of China (61802333), The State Scholarship Fund of China (201808130258), The Science and Technology Research Project of Colleges and Universities in Hebei Province (QN2018029)
  • 摘要:

    针对无线传感器网络中恶意节点产生的选择性转发攻击行为,该文提出一种有效的攻击检测方法。该方法将简化云模型引入信任评估中,结合改进的K/N投票算法确定目标节点的信任值,将目标节点信任值与信任阈值比较,进行选择性转发攻击节点的判定。仿真结果表明,当信任阈值为0.8时,经过5个时间段后,该方法能够有效地检测出网络中的选择性转发攻击节点,具有较高的检测率和较低的误检率。

  • 图  1  基于信任评估模型的选择性转发攻击检测方法流程图

    图  2  信任阈值对检测率和误检率的影响

    图  3  时间段对检测率和误检率的影响

    图  4  恶意节点比例对节点信任值的影响

    图  5  检测结果对比图

    图  6  恶意节点比例对检测率和误检率的影响

    表  1  仿真参数

    参数
    时间段t1000 s
    直接信任值权重α0.6
    云滴个数w100
    包的大小s64 bit
    包传输速率v640 bit/s
    下载: 导出CSV
  • 周伟伟, 郁滨. WSNs多阶段入侵检测博弈最优策略研究[J]. 电子与信息学报, 2018, 40(1): 63–71. doi: 10.11999/JEIT170323

    ZHOU Weiwei and YU Bin. Optimal defense strategy in WSNs based on the game of multi-stage intrusion detection[J]. Journal of Electronics &Information Technology, 2018, 40(1): 63–71. doi: 10.11999/JEIT170323
    IOANNOU C, VASSILIOU V, and SERGIOU C. An intrusion detection system for wireless sensor networks[C]. The 24th International Conference on Telecommunications, Limassol, Cyprus, 2017: 253–259. doi: 10.1109/ICT.2017.7998271.
    KALKHA H, SATORI H, and SATORI K. Preventing black hole attack in wireless sensor network using HMM[J]. Procedia Computer Science, 2019, 148: 522–561. doi: 10.1016/j.procs.2019.01.028
    SHABUT A M, DAHAL K P, BISTA S K, et al. Recommendation based trust model with an effective defence scheme for MANETs[J]. IEEE Transactions on Mobile Computing, 2015, 14(10): 2101–2115. doi: 10.1109/TMC.2014.2374154
    赵明, 闫寒, 曹高峰, 等. 融合用户信任度和相似度的基于核心用户抽取的鲁棒性推荐算法[J]. 电子与信息学报, 2019, 41(1): 180–186. doi: 10.11999/JEIT180142

    ZHAO Ming, YAN Han, CAO Gaofeng, et al. Robust recommendation algorithm based on core user extraction with user trust and similarity[J]. Journal of Electronics &Information Technology, 2019, 41(1): 180–186. doi: 10.11999/JEIT180142
    李致远, 王汝传. 一种移动P2P网络环境下的动态安全信任模型[J]. 电子学报, 2012, 40(1): 1–7. doi: 10.3969/j.issn.0372-2112.2012.01.001

    LI Zhiyuan and WANG Ruchuan. A dynamic secure trust model for mobile P2P networks[J]. Acta Electronica Sinica, 2012, 40(1): 1–7. doi: 10.3969/j.issn.0372-2112.2012.01.001
    荆琦, 唐礼勇, 陈钟. 无线传感器网络中的信任管理[J]. 软件学报, 2008, 19(7): 1716–1730. doi: 10.3724/SP.J.1001.2008.01716

    JING Qi, TANG Liyong, and CHEN Zhong. Trust management in wireless sensor networks[J]. Journal of Software, 2008, 19(7): 1716–1730. doi: 10.3724/SP.J.1001.2008.01716
    ZAWAIDEH F, SALAMAH M, and Al-BAHADILI H. A fair trust-based malicious node detection and isolation scheme for WSNs[C]. The 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan, 2017: 1–6. doi: 10.1109/IT-DREPS.2017.8277813.
    OZCELIK M M, IRMAK E, and OZDEMIR S. A hybrid trust based intrusion detection system for wireless sensor networks[C]. 2017 Networks, Computers and Communications (ISNCC), Marrakech, Morocco, 2017: 1–6. doi: 10.1109/ISNCC.2017.8071998.
    周治平, 邵楠楠. 基于贝叶斯的改进WSNs信任评估模型[J]. 传感技术学报, 2016, 29(6): 927–933. doi: 10.3969/j.issn.1004-1699.2016.06.023

    ZHOU Zhiping and SHAO Nannan. An improved trust evaluation model based on Bayesian for WSNs[J]. Chinese Journal of Sensors and Actuators, 2016, 29(6): 927–933. doi: 10.3969/j.issn.1004-1699.2016.06.023
    SAJJAD S M, BOUK S H, and YOUSAF M. Neighbor node trust based intrusion detection system for WSN[J]. Procedia Computer Science, 2015, 63: 183–188. doi: 10.1016/j.procs.2015.08.331
    PRABHAKAR A and ANJALI T. Mitigating selective Gray Hole Attack in wireless multi-hop network[C]. 2017 International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2017: 1223–1227. doi: 10.1109/WiSPNET.2017.8299958.
    AHMAD A, ALAJEELY M, and DOSS R. Reputation based malicious node detection in OppNets[C]. The 13th International Joint Conference on Computer Science and Software Engineering, Khon Kaen, Thailand, 2016: 1–6. doi: 10.1109/JCSSE.2016.7748925.
    李德毅, 刘常昱. 论正态云模型的普适性[J]. 中国工程科学, 2004, 6(8): 28–34. doi: 10.3969/j.issn.1009-1742.2004.08.006

    LI Deyi and LIU Changyu. Study on the universality of the normal cloud model[J]. Engineering Science, 2004, 6(8): 28–34. doi: 10.3969/j.issn.1009-1742.2004.08.006
    蔡绍滨, 韩启龙, 高振国, 等. 基于云模型的无线传感器网络恶意节点识别技术的研究[J]. 电子学报, 2012, 40(11): 2232–2238. doi: 10.3969/j.issn.0372-2112.2012.11.015

    CAI Shaobin, HAN Qilong, GAO Zhenguo, et al. Research on cloud trust model for malicious node detection in wireless sensor network[J]. Acta Electronica Sinica, 2012, 40(11): 2232–2238. doi: 10.3969/j.issn.0372-2112.2012.11.015
    徐晓斌, 张光卫, 王尚广, 等. 基于轻量云模型的WSN不确定性信任表示方法[J]. 通信学报, 2014, 35(2): 63–69. doi: 10.3969/j.issn.1000-436x.2014.02.009

    XU Xiaobin, ZHANG Guangwei, WANG Shangguang, et al. Representation for uncertainty trust of WSN based on lightweight-cloud[J]. Journal on Communications, 2014, 35(2): 63–69. doi: 10.3969/j.issn.1000-436x.2014.02.009
    肖云鹏, 姚豪豪, 刘宴兵. 一种基于云模型的WSNs节点信誉安全方案[J]. 电子学报, 2016, 44(1): 168–175. doi: 10.3969/j.issn.0372-2112.2016.01.025

    XIAO Yunpeng, YAO Haohao, and LIU Yanbing. A WSNs node reputation security scheme based on cloud model[J]. Acta Electronica Sinica, 2016, 44(1): 168–175. doi: 10.3969/j.issn.0372-2112.2016.01.025
    李德毅. 知识表示中的不确定性[J]. 中国工程科学, 2000, 2(10): 73–79. doi: 10.3969/j.issn.1009-1742.2000.10.018

    LI Deyi. Uncertainty in knowledge representation[J]. Engineering Science, 2000, 2(10): 73–79. doi: 10.3969/j.issn.1009-1742.2000.10.018
    胡涛, 王树宗, 杨建军. 基于云模型的物元综合评估方法[J]. 海军工程大学学报, 2006, 18(1): 85–88. doi: 10.3969/j.issn.1009-3486.2006.01.018

    HU Tao, WANG Shuzong, and YANG Jianjun. Matter-element integration evaluation method based on cloud model[J]. Journal of Naval University of Engineering, 2006, 18(1): 85–88. doi: 10.3969/j.issn.1009-3486.2006.01.018
    李慧, 马小平, 施珺, 等. 复杂网络环境下基于信任传递的推荐模型研究[J]. 自动化学报, 2018, 44(2): 363–376. doi: 10.16383/j.aas.2018.c160395

    LI Hui, MA Xiaoping, SHI Jun, et al. A recommendation model by means of trust transition in complex network environment[J]. Acta Automatica Sinica, 2018, 44(2): 363–376. doi: 10.16383/j.aas.2018.c160395
  • 加载中
图(6) / 表(1)
计量
  • 文章访问数:  784
  • HTML全文浏览量:  149
  • PDF下载量:  52
  • 被引次数: 0
出版历程
  • 收稿日期:  2019-04-22
  • 修回日期:  2020-05-28
  • 网络出版日期:  2020-11-13
  • 刊出日期:  2020-12-08

目录

    /

    返回文章
    返回