期刊文献+

基于演化博弈的无线传感器网络入侵检测研究 被引量:1

Research on wireless sensor network intrusion detection based on evolutionary game
下载PDF
导出
摘要 针对无线传感器网络易遭受内部节点攻击的问题,本文提出了一种基于演化博弈的无线传感器网络入侵检测方法。将传感器网络的攻防对抗映射到博弈过程中,建立恶意节点和簇头节点之间的攻防博弈模型,改进传统复制动态方程,使得簇头节点在演化博弈过程中考虑到其他节点的历史策略,预测恶意节点的攻击策略;同时将改进复制动态方程应用于入侵检测算法,提高算法响应时间。实验表明,与传统方法的复制动态方程相比,采用该算法使得演化博弈能够快速达到均衡,收敛速度相比传统方法提高了80%,保障了网络安全性的同时避免了传感器网络检测能量的消耗。 In the context of wireless sensor networks(WSNs),prone to internal node attacks,this study advances an intrusion detection approach underpinned by evolutionary game theory.The attack-defense confrontation of sensor networks is mapped into the game process,and the attack-defense game model between malicious nodes and cluster head nodes is established.The traditional replication dynamic equation is improved,so that the cluster head node takes the historical strategies of other nodes in the evolutionary game process to predict the attack strategy of malicious nodes.At the same time,the improved replication dynamic equation is applied to the intrusion detection algorithm to improve the response time of the algorithm.Experiments show that compared with the replication dynamic equation of the traditional method,the evolutionary game can quickly reach equilibrium by using this algorithm,and the convergence speed is 80%higher than that of the traditional method,which ensures the network security and avoids the consumption of sensor network detection energy.
作者 王心怡 行鸿彦 侯天浩 郑锦程 Wang Xinyi;Xing Hongyan;Hou Tianhao;Zheng Jincheng(School of Electronics and Information Engineering,Nanjing University of Information Science&Technology,Nanjing 210044,China)
出处 《电子测量与仪器学报》 CSCD 北大核心 2023年第10期97-105,共9页 Journal of Electronic Measurement and Instrumentation
基金 国家重点研发计划(2021YFE0105500) 国家自然科学基金(62171228)项目资助。
关键词 无线传感器网络 入侵检测 演化博弈 改进的复制动态方程 wireless sensor network intrusion detection evolutionary game improved replication dynamic equation
  • 相关文献

参考文献11

二级参考文献76

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2李晶,王福豹,段渭军.无线传感器网络中TinyOS的研究[J].计算机测量与控制,2006,14(6):838-840. 被引量:30
  • 3ZHANG Y, LEE W. Intrusion detection in wireless ad hoc networks[A]. Proc MobiCom 2000[C]. 2000. 275-283. 被引量:1
  • 4JOHAR.I R, TSITSIKLIS J N. Routing and peering in a competitive Intemet[A]. Conference on Decision and Control[C]. 2004. 被引量:1
  • 5HIJAZI A, NASSER N. Using mobile agents for intrusion detection in wireless ad-hoc networks[A]. Proc of Second IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2005)[C]. 2005.362-366. 被引量:1
  • 6HASSWA A, ZULKERNINE M, HASSANEIN H, Routeguard: an intrusion detection and response system for mobile ad-hoc networks[A]. Proc of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2005) vol 3[C]. 2005. 336-343. 被引量:1
  • 7JIANHUA S, FAN H, YAJUN G. A distributed monitoring mechanism for mobile ad-hoc networks[A]. Proc of the 8th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN'05)[C]. 2005.236-240. 被引量:1
  • 8KETAN N, AMITABH M, A novel intrusion detection approach for wireless ad hoc networks[A]. Wireless Communications and Networking Conference[C]. 2004.831-836. 被引量:1
  • 9HUBAUX P, GROSS T, LE Y, et al. Towards self-organizing mobile ad-hoc networks: the Terminodes project[J]. IEEE Communication Magazine, 2001, 39(1): 118-124. 被引量:1
  • 10MISHRA A, NADKARNI K, PATCHA A. Intrusion detection in wireless ad hoc networks[A]. Proc of IEEE Wireless Communications[C].2004.48-60. 被引量:1

共引文献84

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部