Advanced Search
Volume 42 Issue 12
Dec.  2020
Turn off MathJax
Article Contents
Rongrong YIN, Wenyuan ZHANG, Chouchou YANG, Xida LI. A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274
Citation: Rongrong YIN, Wenyuan ZHANG, Chouchou YANG, Xida LI. A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274

A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model

doi: 10.11999/JEIT190274
Funds:  The National Natural Science Foundation of China (61802333), The State Scholarship Fund of China (201808130258), The Science and Technology Research Project of Colleges and Universities in Hebei Province (QN2018029)
  • Received Date: 2019-04-22
  • Rev Recd Date: 2020-05-28
  • Available Online: 2020-11-13
  • Publish Date: 2020-12-08
  • For the selective forwarding attack behavior generated by malicious nodes in wireless sensor networks, an efficient detection method is proposed. The simplified cloud model is introduced into the trust evaluation model, and the improved K/N voting algorithm is used to obtain the trust value of the target node. Then, the trust value of the target node is compared with the trust threshold to identify the attack node. The simulation results show that when the trust threshold is 0.8 and after 5 time periods, the proposed method can effectively detect the selective forwarding attack nodes, and it has high detection rate and low fault rate.

  • loading
  • 周伟伟, 郁滨. WSNs多阶段入侵检测博弈最优策略研究[J]. 电子与信息学报, 2018, 40(1): 63–71. doi: 10.11999/JEIT170323

    ZHOU Weiwei and YU Bin. Optimal defense strategy in WSNs based on the game of multi-stage intrusion detection[J]. Journal of Electronics &Information Technology, 2018, 40(1): 63–71. doi: 10.11999/JEIT170323
    IOANNOU C, VASSILIOU V, and SERGIOU C. An intrusion detection system for wireless sensor networks[C]. The 24th International Conference on Telecommunications, Limassol, Cyprus, 2017: 253–259. doi: 10.1109/ICT.2017.7998271.
    KALKHA H, SATORI H, and SATORI K. Preventing black hole attack in wireless sensor network using HMM[J]. Procedia Computer Science, 2019, 148: 522–561. doi: 10.1016/j.procs.2019.01.028
    SHABUT A M, DAHAL K P, BISTA S K, et al. Recommendation based trust model with an effective defence scheme for MANETs[J]. IEEE Transactions on Mobile Computing, 2015, 14(10): 2101–2115. doi: 10.1109/TMC.2014.2374154
    赵明, 闫寒, 曹高峰, 等. 融合用户信任度和相似度的基于核心用户抽取的鲁棒性推荐算法[J]. 电子与信息学报, 2019, 41(1): 180–186. doi: 10.11999/JEIT180142

    ZHAO Ming, YAN Han, CAO Gaofeng, et al. Robust recommendation algorithm based on core user extraction with user trust and similarity[J]. Journal of Electronics &Information Technology, 2019, 41(1): 180–186. doi: 10.11999/JEIT180142
    李致远, 王汝传. 一种移动P2P网络环境下的动态安全信任模型[J]. 电子学报, 2012, 40(1): 1–7. doi: 10.3969/j.issn.0372-2112.2012.01.001

    LI Zhiyuan and WANG Ruchuan. A dynamic secure trust model for mobile P2P networks[J]. Acta Electronica Sinica, 2012, 40(1): 1–7. doi: 10.3969/j.issn.0372-2112.2012.01.001
    荆琦, 唐礼勇, 陈钟. 无线传感器网络中的信任管理[J]. 软件学报, 2008, 19(7): 1716–1730. doi: 10.3724/SP.J.1001.2008.01716

    JING Qi, TANG Liyong, and CHEN Zhong. Trust management in wireless sensor networks[J]. Journal of Software, 2008, 19(7): 1716–1730. doi: 10.3724/SP.J.1001.2008.01716
    ZAWAIDEH F, SALAMAH M, and Al-BAHADILI H. A fair trust-based malicious node detection and isolation scheme for WSNs[C]. The 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan, 2017: 1–6. doi: 10.1109/IT-DREPS.2017.8277813.
    OZCELIK M M, IRMAK E, and OZDEMIR S. A hybrid trust based intrusion detection system for wireless sensor networks[C]. 2017 Networks, Computers and Communications (ISNCC), Marrakech, Morocco, 2017: 1–6. doi: 10.1109/ISNCC.2017.8071998.
    周治平, 邵楠楠. 基于贝叶斯的改进WSNs信任评估模型[J]. 传感技术学报, 2016, 29(6): 927–933. doi: 10.3969/j.issn.1004-1699.2016.06.023

    ZHOU Zhiping and SHAO Nannan. An improved trust evaluation model based on Bayesian for WSNs[J]. Chinese Journal of Sensors and Actuators, 2016, 29(6): 927–933. doi: 10.3969/j.issn.1004-1699.2016.06.023
    SAJJAD S M, BOUK S H, and YOUSAF M. Neighbor node trust based intrusion detection system for WSN[J]. Procedia Computer Science, 2015, 63: 183–188. doi: 10.1016/j.procs.2015.08.331
    PRABHAKAR A and ANJALI T. Mitigating selective Gray Hole Attack in wireless multi-hop network[C]. 2017 International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2017: 1223–1227. doi: 10.1109/WiSPNET.2017.8299958.
    AHMAD A, ALAJEELY M, and DOSS R. Reputation based malicious node detection in OppNets[C]. The 13th International Joint Conference on Computer Science and Software Engineering, Khon Kaen, Thailand, 2016: 1–6. doi: 10.1109/JCSSE.2016.7748925.
    李德毅, 刘常昱. 论正态云模型的普适性[J]. 中国工程科学, 2004, 6(8): 28–34. doi: 10.3969/j.issn.1009-1742.2004.08.006

    LI Deyi and LIU Changyu. Study on the universality of the normal cloud model[J]. Engineering Science, 2004, 6(8): 28–34. doi: 10.3969/j.issn.1009-1742.2004.08.006
    蔡绍滨, 韩启龙, 高振国, 等. 基于云模型的无线传感器网络恶意节点识别技术的研究[J]. 电子学报, 2012, 40(11): 2232–2238. doi: 10.3969/j.issn.0372-2112.2012.11.015

    CAI Shaobin, HAN Qilong, GAO Zhenguo, et al. Research on cloud trust model for malicious node detection in wireless sensor network[J]. Acta Electronica Sinica, 2012, 40(11): 2232–2238. doi: 10.3969/j.issn.0372-2112.2012.11.015
    徐晓斌, 张光卫, 王尚广, 等. 基于轻量云模型的WSN不确定性信任表示方法[J]. 通信学报, 2014, 35(2): 63–69. doi: 10.3969/j.issn.1000-436x.2014.02.009

    XU Xiaobin, ZHANG Guangwei, WANG Shangguang, et al. Representation for uncertainty trust of WSN based on lightweight-cloud[J]. Journal on Communications, 2014, 35(2): 63–69. doi: 10.3969/j.issn.1000-436x.2014.02.009
    肖云鹏, 姚豪豪, 刘宴兵. 一种基于云模型的WSNs节点信誉安全方案[J]. 电子学报, 2016, 44(1): 168–175. doi: 10.3969/j.issn.0372-2112.2016.01.025

    XIAO Yunpeng, YAO Haohao, and LIU Yanbing. A WSNs node reputation security scheme based on cloud model[J]. Acta Electronica Sinica, 2016, 44(1): 168–175. doi: 10.3969/j.issn.0372-2112.2016.01.025
    李德毅. 知识表示中的不确定性[J]. 中国工程科学, 2000, 2(10): 73–79. doi: 10.3969/j.issn.1009-1742.2000.10.018

    LI Deyi. Uncertainty in knowledge representation[J]. Engineering Science, 2000, 2(10): 73–79. doi: 10.3969/j.issn.1009-1742.2000.10.018
    胡涛, 王树宗, 杨建军. 基于云模型的物元综合评估方法[J]. 海军工程大学学报, 2006, 18(1): 85–88. doi: 10.3969/j.issn.1009-3486.2006.01.018

    HU Tao, WANG Shuzong, and YANG Jianjun. Matter-element integration evaluation method based on cloud model[J]. Journal of Naval University of Engineering, 2006, 18(1): 85–88. doi: 10.3969/j.issn.1009-3486.2006.01.018
    李慧, 马小平, 施珺, 等. 复杂网络环境下基于信任传递的推荐模型研究[J]. 自动化学报, 2018, 44(2): 363–376. doi: 10.16383/j.aas.2018.c160395

    LI Hui, MA Xiaoping, SHI Jun, et al. A recommendation model by means of trust transition in complex network environment[J]. Acta Automatica Sinica, 2018, 44(2): 363–376. doi: 10.16383/j.aas.2018.c160395
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(1)

    Article Metrics

    Article views (833) PDF downloads(53) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return