期刊文献+

无线传感器网络簇内可疑节点的博弈检测方法 被引量:3

Detecting suspicious node within one cluster in wireless sensor network using game theoretic approach
下载PDF
导出
摘要 针对无线传感器网络内部可能存在行为异常的可疑节点问题,在分簇路由协议的基础上,采用博弈方法通过簇内多个邻居节点对某一可疑节点进行判定,邻居节点产生的检测结果传输至簇头进行汇总.簇头节点统计结果并采用多数投票方式对可疑节点进行判定.为了保证数据传输的安全性,采用对称加密算法对各检测节点判定结果进行加密.若可疑节点是恶意节点,则该判定结果将在簇内广播,以达到隔离可疑节点的目的.为了更符合实际环境,在博弈模型判定时,考虑攻防双方节点的能量消耗.实验结果表明,该多检测节点方案能够较好地分析无线传感器网络中可疑入侵节点和检测系统之间的博弈关系,提高了对可疑节点判定的准确性. A new method using game theoretic approach with multiple detecting nodes within one cluster was proposed after clusters were formed by using low-energy adaptive clustering hierarchy(LEACH)-C router protocol in order to detect and distinguish suspicious nodes in wireless sensor network.A suspicious node in a cluster is determined as malicious or normal one by the cluster-head using majority voting principle after all its neighbor's decisions are collected.A symmetrical encryption algorithm is used to secure the neighbor's result transmission.If the suspicious node is malicious,the final detecting result will be broadcasted to all nodes within this cluster and the suspicious one will be isolated in order to decrease the risk of invasion.The energy consume of both attacker and defender in the game is considered to fit the wireless sensor network environment.Experimental results show that the multiple detecting nodes scheme is feasible and effective to use game theoretic approach in wireless sensor network,and the detection precision is promoted.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2012年第1期72-78,共7页 Journal of Zhejiang University:Engineering Science
基金 国家自然科学基金资助项目(60773180)
关键词 无线传感器网络 分簇 博弈论 可疑节点 wireless sensor network cluster game theory suspicious node
  • 相关文献

参考文献20

  • 1李建中,高宏.无线传感器网络的研究进展[J].计算机研究与发展,2008,45(1):1-15. 被引量:441
  • 2汪洋,林闯,李泉林,王竞奇,姜欣.基于非合作博弈的无线网络路由机制研究[J].计算机学报,2009,32(1):54-68. 被引量:32
  • 3孙利民等..无线传感器网络[M],2005.
  • 4AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y. A survey on sensor networks [J]. IEEE Communications Magazine, 2002, 40(8) : 102 - 114. 被引量:1
  • 5KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [J].Ad Hoc Networks, 2003, 1(2/3): 293-315. 被引量:1
  • 6HU Fei, SHARMA N K. Security considerations in ad hoc sensor networks [J]. Ad Hoc Networks, 2005, 3(1) : 69 - 89. 被引量:1
  • 7ZHANG Y, LEE W, HUANG Y A. Intrusion detection techniques for mobile wireless networks [J]. Wireless Networks,2003, 9(5) : 545 - 556. 被引量:1
  • 8BUCHEGGER S, BOUDEC J Y L. Performance analysis of the CONFIDANT protocol [C]// Proceedings of the 3rd ACM International Symposium on Mobile ad hoe Networking and Computing: Lausanne, Switzerland: ACM, 2002 : 226 - 236. 被引量:1
  • 9AGAH A. A novel game theoretic framework for security in wireless sensor networks [D]. Arlington: The University of Texas at Arlington, 2005: 1 -94. 被引量:1
  • 10杨峰..无线传感器网络恶意节点防范技术研究[D].中国科学技术大学,2009:

二级参考文献206

共引文献499

同被引文献29

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部