浏览全部资源
扫码关注微信
[ "合尼古力·吾买尔(1976-),女(维吾尔族),新疆交通职业技术学院副教授,主要研究方向为网络安全、信息安全。" ]
网络出版日期:2016-04,
纸质出版日期:2016-04-20
移动端阅览
合尼古力·吾买尔. ACO结合P2P信任模型的无线传感器网络Sinkhole攻击检测[J]. 电信科学, 2016,32(4):52-58.
Wumaier HENIGULI. Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN[J]. Telecommunication science, 2016, 32(4): 52-58.
合尼古力·吾买尔. ACO结合P2P信任模型的无线传感器网络Sinkhole攻击检测[J]. 电信科学, 2016,32(4):52-58. DOI: 10.11959/j.issn.1000-0801.2016089.
Wumaier HENIGULI. Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN[J]. Telecommunication science, 2016, 32(4): 52-58. DOI: 10.11959/j.issn.1000-0801.2016089.
针对无线传感器网络中的Sinkhole 攻击问题,提出了一种基于蚁群优化(ACO)结合P2P 信任模型的Sinkhole攻击检测(P-ACO)算法。首先,使用蚁群优化算法检测路由中是否存在Sinkhole攻击,并生成传感器节点的警报信息;然后,利用布尔表达式进化标记生成算法为群组警报节点分发密钥,并使用密钥标记可疑节点;最后,计算可疑节点列表中各节点的信任值,将信任值低于预设阈值的节点视为攻击节点。分析表明,相比二分查找算法与基于规则匹配的神经网络(RMNN)算法,该算法在匹配过程中需要更少的匹配搜索次数,提高了算法执行效率。实验结果显示,相比RMNN算法,该算法可以更加准确地检测Sinkhole攻击。
For the Sinkhole attack problem of wireless sensor network(WSN),a detection algorithm based on fusion of ant colony optimization(ACO)and P2P trust model was proposed.Firstly,ant colony optimization algorithm was used to detect the existence of a Sinkhole attack in route and generate the alarm information of sensor nodes. Then,Boolean expression evolve sign generation algorithm was used to distributed keys for group alarm nodes,and it was used to mark suspicious nodes. Finally,P2P trust model was used to compute trust value of each suspicious node,and the node with trust value was lower than the preset threshold as invasion of node. The analysis shows that the proposed algorithm need less matching search times in matching process than binary search algorithm and the rules matching based neural network(RMNN)algorithm,which indicates that it has improved the efficiency of the algorithm. Experimental results show that the proposed algorithm has higher detection accuracy on Sinkhole attack than RMNN algorithm.
叶苗 , 王宇平 . 一种新的容忍恶意节点攻击的无线传感器网络安全定位方法 [J ] . 计算机学报 , 2013 , 36 ( 3 ): 532 - 545 .
YE M , WANG Y P . A new malicious nodes attack-resistant security location method in wireless sensor network [J ] . Chinese Journal of Computers , 2013 , 36 ( 3 ): 532 - 545 .
胡蓉华 , 董晓梅 , 王大玲 . SenLeash:一种无线传感器网络虫洞攻击约束防御机制 [J ] . 通信学报 , 2013 , 34 ( 10 ): 65 - 75 .
HU R H , DONG X M , WANG D L . SenLeash:a restricted defense mechanism against wormhole attacks in wireless sensor network [J ] . Journal of Communications , 2013 , 34 ( 10 ): 65 - 75 .
ZHANG F J , ZHAI L D , YANG J C , et al . Sinkhole attack detection based on redundancy mechanism in wireless sensor networks [J ] . Procedia Computer Science , 2014 , 31 ( 3 ): 711 - 720 .
LU F , WANG L . Intrusion detection system based on integration of neural network for wireless sensor network [J ] . Journal of Software Engineering , 2014 , 8 ( 4 ): 225 - 238 .
ABDULLAH I , RAHMAN M M , ROY M C . Detecting sinkhole attacks in wireless sensor network using hop count [J ] . International Journal of Computer Network and Information Security(IJCNIS) , 2015 , 7 ( 3 ): 50 - 57 .
李睿 , 林亚平 , 易叶青 , 等 . 两层传感器网络中安全 Top-k查询协议 [J ] . 计算机研究与发展 , 2012 , 49 ( 9 ): 1947 - 1958 .
LI R , LIN Y P , YI Y Q , et al . A secure Top-k query protocol in two tired sensor networks [J ] . Journal of Computer Research and Development , 2012 , 49 ( 9 ): 1947 - 1958 .
MENDONCA M , AGUILAR J S , PEROZO N . An emergent ontology for ambient intelligence based on an ant colony optimization algorithm [C ] // Computing Conference (CLEI),September 15-19,2014,Montevideo,Uruguay . New Jersey : IEEE Press , 2014 : 1 - 11 .
WANG H Y , LIU Z Y , YING B U . Ant colony optimization algorithm for WSN cross-layer routing protocol [J ] . Journal of Changzhou University , 2014 .
宋立新 , 戴赫 , 等 . 基于蚁群算法的WSN路由协议研究 [J ] . 哈尔滨理工大学学报 , 2014 , 42 ( 6 ): 88 - 92 .
SONG L X , DAI H , et al . Research on WSN routing protocol based on ant colony algorithm [J ] . Journal of Harbin University of Science and Technology , 2014 , 42 ( 6 ): 88 - 92 .
XIONG L , LIU L . Peertrust:supporting reputation-based trust for peer-to-peer electronic communities [J ] . IEEE Transactions on Knowledge and Data Engineering , 2004 , 16 ( 7 ): 843 - 857 .
张乐君 , 邓鑫 , 国林 , 等 . 基于关联度分析的WSN 节点信任模型研究 [J ] . 电子科技大学学报 , 2015 , 34 ( 1 ): 106 - 111 .
ZHANG L J , DENG X , GUO L , et al . A CMP energy consumption estimate model for computer systems [J ] . Journal of University of Electronic Science and Technology of China , 2015 , 34 ( 1 ): 106 - 111 .
蔡绍滨 , 潘虹杞 , 姚念民 , 等 . 基于云信任模型和蚁群算法的WSN簇可信路由算法 [J ] . 软件学报 , 2014 , 25 ( s1 ): 122 - 130 .
CAI S B , PAN H Q , YAO N M , et al . Cluster reliability routing algorithm based on cloud trust model and ant colony algorithm [J ] . Journal of Software , 2014 , 25 ( s1 ): 122 - 130 .
WANG M , XU Z , ZHANG Y , et al . Modeling and analysis of PeerTrust-like trust mechanisms in P2P Networks [C ] // Global Communications Conference (GLOBECOM),December 3-7,2012,Anaheim,California,USA . New Jersey : IEEE Press , 2012 : 2689 - 2694 .
LIU S , QI D , MENG J , et al . Study and implementation of wireless sensor networks collaboration based on bio-inspired trust and reputation model(BTRM) [J ] . International Journal of Digital Content Technology & Its Applications , 2012 , 6 ( 1 ): 53 - 66 .
LIN C , WU G . Enhancing the attacking efficiency of the node capture attack in WSN:a matrix approach [J ] . Journal of Supercomputing , 2013 , 66 ( 2 ): 989 - 1007 .
0
浏览量
629
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构