期刊文献+

IWSN中基于属性变化率的全局信任入侵检测 被引量:1

Global Trust Intrusion Detection Based on Attribute Change Rate in IWSN
下载PDF
导出
摘要 为提高工业无线传感器网络的入侵检测的精度和降低检测能耗,设计了基于属性变化率的全局信任入侵检测算法。通过属性变化率获取节点的全局信任值以检测攻击;通过人工蜂群算法选择最优簇头集以确保簇头的高可信度和降低网络整体的能耗;通过信任恢复机制恢复临时故障节点的信任,以降低虚警率。实验证明本方案具有较高的检测率和较低的虚警率,并能延长网络的生命周期。 In order to improve the accuracy and reduce the energy consumption of intrusion detection in industrial wireless sensor networks,a global trust intrusion detection algorithm based on attribute change rate is designed.The global trust value of the node is obtained through the attribute change rate to detect the attack.The optimal cluster head set is selected by using artificial bee colony algorithm to ensure the high reliability of cluster head and reduce the energy consumption of the whole network.The trust of the temporarily failed node is restored through the trust recovery mechanism to reduce the false alarm rate.Experiments show that this scheme has high detection rate and low false alarm rate,and can prolong the life cycle of the network.
作者 李创 孙子文 LI Chuang;SUN Ziwen(School of Internet of Things Engineering,Jiangnan University,Wuxi Jiangsu 214122,China;MOE Engineering Research Center of Internet of Things Technology Applications,Wuxi Jiangsu 214122,China)
出处 《传感技术学报》 CAS CSCD 北大核心 2023年第2期294-300,共7页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61373126) 中央高校基本科研业务费专项资金项目(JUSRP51510) 江苏省自然科学基金项目(BK20131107)。
关键词 工业无线传感器网络 入侵检测 人工蜂群算法 全局信任 信任恢复 industrial wireless sensor networks intrusion detection artificial bee colony global trust trust recovery
  • 相关文献

参考文献7

二级参考文献54

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1259
  • 2AKYILDING I F, SU W, SANKARASUBRAMANIAM Y, CAYIRCI E. Wireless sensor networks : a survey [ J ] . ACM Computer Networks, 2002, 38 (4):393- 422. 被引量:1
  • 3PERRIG A, SZEWCZYK R, WEN V, CULLER D, TYGAR J D. SPINS: security protocols for sensor networks [ C ]// Proceedings of Seventh Annual International Conference on Mobile Computing and Networks. Washington, ACM MobiCom' 01, 2001:521 - 534. 被引量:1
  • 4INTANAGONWIWAT C, GOVINDAN R, ESTRIN D. Directed diffusion: a scalable and robust communication paradigm for sensor networks [ C ]// Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. Boston : MA, 2000:56 - 67. 被引量:1
  • 5HEINZELMAN W, CHANDRAKASAN A, BALAKRISHNAN H. Energy-efficient communication protocol for wireless micro sensor networks [ C]//Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, 2000:1 - 10. 被引量:1
  • 6YAN Yu, GOVINDAN R, ESTRIN D. Geographical and energyaware routing: a recursive data dissemination protocol for wireless sensor networks [ R ]. UCLA Computer Science Department, 2001 : 1 - 11. 被引量:1
  • 7KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [ C ]//First IEEE International Workshop on Sensor Network Protocols and applications, Anchorage, AK, 2003: 113- 127. 被引量:1
  • 8FERREIRA A C, VILACA M A, OLIVEIRA L B, HABIB E, WONG H C, LOUREIRO A. On the security of cluster-based communication protocols for wireless sensor networks[ C]//4th International Conference on Networking, Reunion Island. Berlin: Springer-Verlag, 2005:449 - 458. 被引量:1
  • 9BORISOV N. Computational puzzles as Sybil defenses[C]//The Sixth IEEE International Conference on Peer-to-Peer Computing, Cambridge, UK, 2006:171- 176. 被引量:1
  • 10ZHANG Qinghua, WANG Pan, REEVES D S, NING Peng. Defending against Sybil attacks in sensor networks [ C]// Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops, Washington, D C, USA, 2005:185- 191. 被引量:1

共引文献132

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部