浏览全部资源
扫码关注微信
[ "王骐(1970-),男,博士,湖北第二师范学院副教授,主要研究方向为无线传感器网络安全、嵌入式系统应用。" ]
[ "王青萍(1980-),女,博士,湖北第二师范学院副教授,主要研究方向为光电功能材料与器件。" ]
[ "王怀兴(1977-),男,博士,湖北第二师范学院讲师,主要研究方向为虚拟仪器技术。" ]
[ "肖正安(1974-),男,湖北第二师范学院讲师,主要研究方向为数字信号处理。" ]
网络出版日期:2016-03,
纸质出版日期:2016-03-20
移动端阅览
王骐, 王青萍, 王怀兴, 等. 基于序贯概率比检验的自私路径检测方法[J]. 电信科学, 2016,32(3):81-86.
Qi WANG, Qingping WANG, Huaixing WANG, et al. Detection method for selfish routes based on the sequential probability ratio test[J]. Telecommunication science, 2016, 32(3): 81-86.
王骐, 王青萍, 王怀兴, 等. 基于序贯概率比检验的自私路径检测方法[J]. 电信科学, 2016,32(3):81-86. DOI: 10.11959/j.issn.1000-0801.2016059.
Qi WANG, Qingping WANG, Huaixing WANG, et al. Detection method for selfish routes based on the sequential probability ratio test[J]. Telecommunication science, 2016, 32(3): 81-86. DOI: 10.11959/j.issn.1000-0801.2016059.
根据基于序贯概率比检验的无线传感器网络模型,对基于路由功能的自私路径的检测方法进行了研究。通过分析节点接收到的观测样本值,将计算得出的路径评判值与已知阈值进行比较,从而判定是否为自私路径。仿真结果表明,这种基于序贯概率比检验的序贯抽样方案所需观测值的数量大大减少,运行更快,且具有较高的检测精度。相比于其他固定抽样方案,这种方法无需事先确定检验统计假设所需的样本观测值数量,有利于对危害网络安全的行为做出快速响应,从而限制受损网络的范围。
According to a network model based on the sequential probability ratio test(SPRT),one detection method of selfish routes with respect to the routing functionality in wireless sensor network was developed.Through the analysis of the observed sample values of the nodes,the calculated routes evaluation values were compared with the known threshold values so as to determine whether it was selfish route.Simulation results show that the sequential sampling scheme based on the sequential probability ratio test had high detection accuracy,and the number of the required observation was greatly reduced,so it could operate faster.A merit of SPRT is that the number of observations required to test statistical hypotheses need not be determined in advance when compared to other methods based on a fixed number of observations.This allows for making prompt decision on the behavior of damage to the network,thus it can limit the scope of the damaged networks.
DJENOURI D , KHELLADI L , BADACHE N . A survey of security issues in mobile ad hoc and sensor networks [J ] . IEEE Communications Surveys & Tutorials , 2005 , 7 ( 4 ): 2 - 28 .
MICHIARDI P , MOLVA R . Core:a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks [C ] // The IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security , September 26 - 27 , 2002 , Portoroz,Slovenia . New York : Springer US , 2002 : 107 - 121 .
张帅 , 张凤斌 . 无线传感器网络中基于规范的入侵检测算法研究 [J ] . 计算机应用与研究 , 2012 , 29 ( 9 ): 3464 - 3466 .
ZHANG S , ZHANG F B . Research on intrusion detection algorithm based on specification for WSN [J ] . Application Research of Computers , 2012 , 29 ( 9 ): 3464 - 3466 .
HO J W , WRIGHT M , DAS S K . Distributed detection of mobile malicious node attacks in wireless sensor networks [J ] . Ad Hoc Networks , 2011 , 10 ( 3 ): 512 - 523 .
RONG Y , LEE S K , AND CHOI H A . Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis [C ] // IEEE INFOCOM ’06 , April 23 - 29 , 2006 , Barcelona,Catalunya,Spain . New Jersey : Springer US , 2006 : 1 - 13 .
RADOSAVAC S , BARAS J S , KOUTSOPOULOS I . A framework for MAC protocol misbehavior detection in wireless networks [C ] // The 4th ACM Workshop on Wireless Security , September 2 , 2005 , Philadelphia,PA,USA . New York : ACM Press , 2005 : 33 - 42 .
陈波 , 毛剑琳 , 郭宁 , 等 . 基于K-means 算法的无线传感器网络节点自私行为检测方法 [J ] . 系统仿真学报 , 2014 ,( 3 ): 580 - 585 .
CHEN B , MAO J L , GUO N , et al . Detection method for selfish behavior of wireless sensor networks nodes based on K-means algorithm [J ] . Journal of System Simulation , 2014 ( 3 ): 580 - 585 .
王骐 , 蔡子元 , 范慧璞 . 一种检测被捕获节点的基于异常的算法研究 [J ] . 压电与声光 , 2014 , 36 ( 6 ): 1030 - 1034 .
WANG Q , CAI Z Y , FAN H P . Research on an anomaly-based intrusion detection algorithm for compromised nodes in wireless sensor networks [J ] . Piezoelectrics & Acoustooptics , 2014 , 36 ( 6 ): 1030 - 1034 .
王骐 , 王殊 , 孟中楼 . 无线传感器网络中一种基于能效的入侵检测算法-3N算法研究 [J ] . 微电子学与计算机 , 2010 , 27 ( 4 ): 153 - 157 .
WANG Q , WANG S , MENG Z L . Research on energy-efficiency intrusion detection algorithm (3Nalgorithm)in wireless sensor networks [J ] . Microelectronics&Computer , 2010 , 27 ( 4 ): 153 - 157 .
0
浏览量
489
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构