基于簡化云與K/N投票的選擇性轉(zhuǎn)發(fā)攻擊檢測方法
doi: 10.11999/JEIT190274
-
1.
燕山大學(xué)信息科學(xué)與工程學(xué)院 秦皇島 066004
-
2.
燕山大學(xué)河北省特種光纖與光纖傳感重點(diǎn)實(shí)驗(yàn)室 秦皇島 066004
A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model
-
1.
School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China
-
2.
Key Laboratory for Special Fiber and Fiber Sensor of Hebei Province, Yanshan University, Qinhuangdao 066004, China
-
摘要:
針對無線傳感器網(wǎng)絡(luò)中惡意節(jié)點(diǎn)產(chǎn)生的選擇性轉(zhuǎn)發(fā)攻擊行為,該文提出一種有效的攻擊檢測方法。該方法將簡化云模型引入信任評估中,結(jié)合改進(jìn)的K/N投票算法確定目標(biāo)節(jié)點(diǎn)的信任值,將目標(biāo)節(jié)點(diǎn)信任值與信任閾值比較,進(jìn)行選擇性轉(zhuǎn)發(fā)攻擊節(jié)點(diǎn)的判定。仿真結(jié)果表明,當(dāng)信任閾值為0.8時(shí),經(jīng)過5個(gè)時(shí)間段后,該方法能夠有效地檢測出網(wǎng)絡(luò)中的選擇性轉(zhuǎn)發(fā)攻擊節(jié)點(diǎn),具有較高的檢測率和較低的誤檢率。
-
關(guān)鍵詞:
- 選擇性轉(zhuǎn)發(fā)攻擊 /
- 簡化云 /
- 改進(jìn)的K/N投票算法 /
- 信任評估模型 /
- 信任閾值
Abstract:For the selective forwarding attack behavior generated by malicious nodes in wireless sensor networks, an efficient detection method is proposed. The simplified cloud model is introduced into the trust evaluation model, and the improved K/N voting algorithm is used to obtain the trust value of the target node. Then, the trust value of the target node is compared with the trust threshold to identify the attack node. The simulation results show that when the trust threshold is 0.8 and after 5 time periods, the proposed method can effectively detect the selective forwarding attack nodes, and it has high detection rate and low fault rate.
-
表 1 仿真參數(shù)
參數(shù) 值 時(shí)間段t 1000 s 直接信任值權(quán)重α 0.6 云滴個(gè)數(shù)w 100 包的大小s 64 bit 包傳輸速率v 640 bit/s 下載: 導(dǎo)出CSV
-
周偉偉, 郁濱. WSNs多階段入侵檢測博弈最優(yōu)策略研究[J]. 電子與信息學(xué)報(bào), 2018, 40(1): 63–71. doi: 10.11999/JEIT170323ZHOU Weiwei and YU Bin. Optimal defense strategy in WSNs based on the game of multi-stage intrusion detection[J]. Journal of Electronics &Information Technology, 2018, 40(1): 63–71. doi: 10.11999/JEIT170323 IOANNOU C, VASSILIOU V, and SERGIOU C. An intrusion detection system for wireless sensor networks[C]. The 24th International Conference on Telecommunications, Limassol, Cyprus, 2017: 253–259. doi: 10.1109/ICT.2017.7998271. KALKHA H, SATORI H, and SATORI K. Preventing black hole attack in wireless sensor network using HMM[J]. Procedia Computer Science, 2019, 148: 522–561. doi: 10.1016/j.procs.2019.01.028 SHABUT A M, DAHAL K P, BISTA S K, et al. Recommendation based trust model with an effective defence scheme for MANETs[J]. IEEE Transactions on Mobile Computing, 2015, 14(10): 2101–2115. doi: 10.1109/TMC.2014.2374154 趙明, 閆寒, 曹高峰, 等. 融合用戶信任度和相似度的基于核心用戶抽取的魯棒性推薦算法[J]. 電子與信息學(xué)報(bào), 2019, 41(1): 180–186. doi: 10.11999/JEIT180142ZHAO Ming, YAN Han, CAO Gaofeng, et al. Robust recommendation algorithm based on core user extraction with user trust and similarity[J]. Journal of Electronics &Information Technology, 2019, 41(1): 180–186. doi: 10.11999/JEIT180142 李致遠(yuǎn), 王汝傳. 一種移動(dòng)P2P網(wǎng)絡(luò)環(huán)境下的動(dòng)態(tài)安全信任模型[J]. 電子學(xué)報(bào), 2012, 40(1): 1–7. doi: 10.3969/j.issn.0372-2112.2012.01.001LI Zhiyuan and WANG Ruchuan. A dynamic secure trust model for mobile P2P networks[J]. Acta Electronica Sinica, 2012, 40(1): 1–7. doi: 10.3969/j.issn.0372-2112.2012.01.001 荊琦, 唐禮勇, 陳鐘. 無線傳感器網(wǎng)絡(luò)中的信任管理[J]. 軟件學(xué)報(bào), 2008, 19(7): 1716–1730. doi: 10.3724/SP.J.1001.2008.01716JING Qi, TANG Liyong, and CHEN Zhong. Trust management in wireless sensor networks[J]. Journal of Software, 2008, 19(7): 1716–1730. doi: 10.3724/SP.J.1001.2008.01716 ZAWAIDEH F, SALAMAH M, and Al-BAHADILI H. A fair trust-based malicious node detection and isolation scheme for WSNs[C]. The 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan, 2017: 1–6. doi: 10.1109/IT-DREPS.2017.8277813. OZCELIK M M, IRMAK E, and OZDEMIR S. A hybrid trust based intrusion detection system for wireless sensor networks[C]. 2017 Networks, Computers and Communications (ISNCC), Marrakech, Morocco, 2017: 1–6. doi: 10.1109/ISNCC.2017.8071998. 周治平, 邵楠楠. 基于貝葉斯的改進(jìn)WSNs信任評估模型[J]. 傳感技術(shù)學(xué)報(bào), 2016, 29(6): 927–933. doi: 10.3969/j.issn.1004-1699.2016.06.023ZHOU Zhiping and SHAO Nannan. An improved trust evaluation model based on Bayesian for WSNs[J]. Chinese Journal of Sensors and Actuators, 2016, 29(6): 927–933. doi: 10.3969/j.issn.1004-1699.2016.06.023 SAJJAD S M, BOUK S H, and YOUSAF M. Neighbor node trust based intrusion detection system for WSN[J]. Procedia Computer Science, 2015, 63: 183–188. doi: 10.1016/j.procs.2015.08.331 PRABHAKAR A and ANJALI T. Mitigating selective Gray Hole Attack in wireless multi-hop network[C]. 2017 International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2017: 1223–1227. doi: 10.1109/WiSPNET.2017.8299958. AHMAD A, ALAJEELY M, and DOSS R. Reputation based malicious node detection in OppNets[C]. The 13th International Joint Conference on Computer Science and Software Engineering, Khon Kaen, Thailand, 2016: 1–6. doi: 10.1109/JCSSE.2016.7748925. 李德毅, 劉常昱. 論正態(tài)云模型的普適性[J]. 中國工程科學(xué), 2004, 6(8): 28–34. doi: 10.3969/j.issn.1009-1742.2004.08.006LI Deyi and LIU Changyu. Study on the universality of the normal cloud model[J]. Engineering Science, 2004, 6(8): 28–34. doi: 10.3969/j.issn.1009-1742.2004.08.006 蔡紹濱, 韓啟龍, 高振國, 等. 基于云模型的無線傳感器網(wǎng)絡(luò)惡意節(jié)點(diǎn)識別技術(shù)的研究[J]. 電子學(xué)報(bào), 2012, 40(11): 2232–2238. doi: 10.3969/j.issn.0372-2112.2012.11.015CAI Shaobin, HAN Qilong, GAO Zhenguo, et al. Research on cloud trust model for malicious node detection in wireless sensor network[J]. Acta Electronica Sinica, 2012, 40(11): 2232–2238. doi: 10.3969/j.issn.0372-2112.2012.11.015 徐曉斌, 張光衛(wèi), 王尚廣, 等. 基于輕量云模型的WSN不確定性信任表示方法[J]. 通信學(xué)報(bào), 2014, 35(2): 63–69. doi: 10.3969/j.issn.1000-436x.2014.02.009XU Xiaobin, ZHANG Guangwei, WANG Shangguang, et al. Representation for uncertainty trust of WSN based on lightweight-cloud[J]. Journal on Communications, 2014, 35(2): 63–69. doi: 10.3969/j.issn.1000-436x.2014.02.009 肖云鵬, 姚豪豪, 劉宴兵. 一種基于云模型的WSNs節(jié)點(diǎn)信譽(yù)安全方案[J]. 電子學(xué)報(bào), 2016, 44(1): 168–175. doi: 10.3969/j.issn.0372-2112.2016.01.025XIAO Yunpeng, YAO Haohao, and LIU Yanbing. A WSNs node reputation security scheme based on cloud model[J]. Acta Electronica Sinica, 2016, 44(1): 168–175. doi: 10.3969/j.issn.0372-2112.2016.01.025 李德毅. 知識表示中的不確定性[J]. 中國工程科學(xué), 2000, 2(10): 73–79. doi: 10.3969/j.issn.1009-1742.2000.10.018LI Deyi. Uncertainty in knowledge representation[J]. Engineering Science, 2000, 2(10): 73–79. doi: 10.3969/j.issn.1009-1742.2000.10.018 胡濤, 王樹宗, 楊建軍. 基于云模型的物元綜合評估方法[J]. 海軍工程大學(xué)學(xué)報(bào), 2006, 18(1): 85–88. doi: 10.3969/j.issn.1009-3486.2006.01.018HU Tao, WANG Shuzong, and YANG Jianjun. Matter-element integration evaluation method based on cloud model[J]. Journal of Naval University of Engineering, 2006, 18(1): 85–88. doi: 10.3969/j.issn.1009-3486.2006.01.018 李慧, 馬小平, 施珺, 等. 復(fù)雜網(wǎng)絡(luò)環(huán)境下基于信任傳遞的推薦模型研究[J]. 自動(dòng)化學(xué)報(bào), 2018, 44(2): 363–376. doi: 10.16383/j.aas.2018.c160395LI Hui, MA Xiaoping, SHI Jun, et al. A recommendation model by means of trust transition in complex network environment[J]. Acta Automatica Sinica, 2018, 44(2): 363–376. doi: 10.16383/j.aas.2018.c160395 -