一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于簡化云與K/N投票的選擇性轉(zhuǎn)發(fā)攻擊檢測方法

尹榮榮 張文元 楊綢綢 李曦達(dá)

尹榮榮, 張文元, 楊綢綢, 李曦達(dá). 基于簡化云與K/N投票的選擇性轉(zhuǎn)發(fā)攻擊檢測方法[J]. 電子與信息學(xué)報(bào), 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274
引用本文: 尹榮榮, 張文元, 楊綢綢, 李曦達(dá). 基于簡化云與K/N投票的選擇性轉(zhuǎn)發(fā)攻擊檢測方法[J]. 電子與信息學(xué)報(bào), 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274
Rongrong YIN, Wenyuan ZHANG, Chouchou YANG, Xida LI. A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274
Citation: Rongrong YIN, Wenyuan ZHANG, Chouchou YANG, Xida LI. A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274

基于簡化云與K/N投票的選擇性轉(zhuǎn)發(fā)攻擊檢測方法

doi: 10.11999/JEIT190274
基金項(xiàng)目: 國家自然科學(xué)基金(61802333),國家留學(xué)基金(201808130258),河北省高等學(xué)??茖W(xué)技術(shù)研究項(xiàng)目(QN2018029)
詳細(xì)信息
    作者簡介:

    尹榮榮:女,1985年生,副教授,研究方向?yàn)闊o線傳感器網(wǎng)絡(luò)、網(wǎng)絡(luò)安全

    張文元:男,1991年生,碩士生,研究方向?yàn)闊o線傳感器網(wǎng)絡(luò)攻擊檢測

    楊綢綢:女,1974年生,副研究員,研究方向?yàn)闊o線傳感器網(wǎng)絡(luò)攻擊防御

    李曦達(dá):女,1977年生,副教授,研究方向?yàn)闊o線傳感器網(wǎng)絡(luò)資源優(yōu)化

    通訊作者:

    尹榮榮 yrr@ysu.edu.cn

  • 中圖分類號: TN915.08; TP393

A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model

Funds: The National Natural Science Foundation of China (61802333), The State Scholarship Fund of China (201808130258), The Science and Technology Research Project of Colleges and Universities in Hebei Province (QN2018029)
  • 摘要:

    針對無線傳感器網(wǎng)絡(luò)中惡意節(jié)點(diǎn)產(chǎn)生的選擇性轉(zhuǎn)發(fā)攻擊行為,該文提出一種有效的攻擊檢測方法。該方法將簡化云模型引入信任評估中,結(jié)合改進(jìn)的K/N投票算法確定目標(biāo)節(jié)點(diǎn)的信任值,將目標(biāo)節(jié)點(diǎn)信任值與信任閾值比較,進(jìn)行選擇性轉(zhuǎn)發(fā)攻擊節(jié)點(diǎn)的判定。仿真結(jié)果表明,當(dāng)信任閾值為0.8時(shí),經(jīng)過5個(gè)時(shí)間段后,該方法能夠有效地檢測出網(wǎng)絡(luò)中的選擇性轉(zhuǎn)發(fā)攻擊節(jié)點(diǎn),具有較高的檢測率和較低的誤檢率。

  • 圖  1  基于信任評估模型的選擇性轉(zhuǎn)發(fā)攻擊檢測方法流程圖

    圖  2  信任閾值對檢測率和誤檢率的影響

    圖  3  時(shí)間段對檢測率和誤檢率的影響

    圖  4  惡意節(jié)點(diǎn)比例對節(jié)點(diǎn)信任值的影響

    圖  5  檢測結(jié)果對比圖

    圖  6  惡意節(jié)點(diǎn)比例對檢測率和誤檢率的影響

    表  1  仿真參數(shù)

    參數(shù)
    時(shí)間段t1000 s
    直接信任值權(quán)重α0.6
    云滴個(gè)數(shù)w100
    包的大小s64 bit
    包傳輸速率v640 bit/s
    下載: 導(dǎo)出CSV
  • 周偉偉, 郁濱. WSNs多階段入侵檢測博弈最優(yōu)策略研究[J]. 電子與信息學(xué)報(bào), 2018, 40(1): 63–71. doi: 10.11999/JEIT170323

    ZHOU Weiwei and YU Bin. Optimal defense strategy in WSNs based on the game of multi-stage intrusion detection[J]. Journal of Electronics &Information Technology, 2018, 40(1): 63–71. doi: 10.11999/JEIT170323
    IOANNOU C, VASSILIOU V, and SERGIOU C. An intrusion detection system for wireless sensor networks[C]. The 24th International Conference on Telecommunications, Limassol, Cyprus, 2017: 253–259. doi: 10.1109/ICT.2017.7998271.
    KALKHA H, SATORI H, and SATORI K. Preventing black hole attack in wireless sensor network using HMM[J]. Procedia Computer Science, 2019, 148: 522–561. doi: 10.1016/j.procs.2019.01.028
    SHABUT A M, DAHAL K P, BISTA S K, et al. Recommendation based trust model with an effective defence scheme for MANETs[J]. IEEE Transactions on Mobile Computing, 2015, 14(10): 2101–2115. doi: 10.1109/TMC.2014.2374154
    趙明, 閆寒, 曹高峰, 等. 融合用戶信任度和相似度的基于核心用戶抽取的魯棒性推薦算法[J]. 電子與信息學(xué)報(bào), 2019, 41(1): 180–186. doi: 10.11999/JEIT180142

    ZHAO Ming, YAN Han, CAO Gaofeng, et al. Robust recommendation algorithm based on core user extraction with user trust and similarity[J]. Journal of Electronics &Information Technology, 2019, 41(1): 180–186. doi: 10.11999/JEIT180142
    李致遠(yuǎn), 王汝傳. 一種移動(dòng)P2P網(wǎng)絡(luò)環(huán)境下的動(dòng)態(tài)安全信任模型[J]. 電子學(xué)報(bào), 2012, 40(1): 1–7. doi: 10.3969/j.issn.0372-2112.2012.01.001

    LI Zhiyuan and WANG Ruchuan. A dynamic secure trust model for mobile P2P networks[J]. Acta Electronica Sinica, 2012, 40(1): 1–7. doi: 10.3969/j.issn.0372-2112.2012.01.001
    荊琦, 唐禮勇, 陳鐘. 無線傳感器網(wǎng)絡(luò)中的信任管理[J]. 軟件學(xué)報(bào), 2008, 19(7): 1716–1730. doi: 10.3724/SP.J.1001.2008.01716

    JING Qi, TANG Liyong, and CHEN Zhong. Trust management in wireless sensor networks[J]. Journal of Software, 2008, 19(7): 1716–1730. doi: 10.3724/SP.J.1001.2008.01716
    ZAWAIDEH F, SALAMAH M, and Al-BAHADILI H. A fair trust-based malicious node detection and isolation scheme for WSNs[C]. The 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan, 2017: 1–6. doi: 10.1109/IT-DREPS.2017.8277813.
    OZCELIK M M, IRMAK E, and OZDEMIR S. A hybrid trust based intrusion detection system for wireless sensor networks[C]. 2017 Networks, Computers and Communications (ISNCC), Marrakech, Morocco, 2017: 1–6. doi: 10.1109/ISNCC.2017.8071998.
    周治平, 邵楠楠. 基于貝葉斯的改進(jìn)WSNs信任評估模型[J]. 傳感技術(shù)學(xué)報(bào), 2016, 29(6): 927–933. doi: 10.3969/j.issn.1004-1699.2016.06.023

    ZHOU Zhiping and SHAO Nannan. An improved trust evaluation model based on Bayesian for WSNs[J]. Chinese Journal of Sensors and Actuators, 2016, 29(6): 927–933. doi: 10.3969/j.issn.1004-1699.2016.06.023
    SAJJAD S M, BOUK S H, and YOUSAF M. Neighbor node trust based intrusion detection system for WSN[J]. Procedia Computer Science, 2015, 63: 183–188. doi: 10.1016/j.procs.2015.08.331
    PRABHAKAR A and ANJALI T. Mitigating selective Gray Hole Attack in wireless multi-hop network[C]. 2017 International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2017: 1223–1227. doi: 10.1109/WiSPNET.2017.8299958.
    AHMAD A, ALAJEELY M, and DOSS R. Reputation based malicious node detection in OppNets[C]. The 13th International Joint Conference on Computer Science and Software Engineering, Khon Kaen, Thailand, 2016: 1–6. doi: 10.1109/JCSSE.2016.7748925.
    李德毅, 劉常昱. 論正態(tài)云模型的普適性[J]. 中國工程科學(xué), 2004, 6(8): 28–34. doi: 10.3969/j.issn.1009-1742.2004.08.006

    LI Deyi and LIU Changyu. Study on the universality of the normal cloud model[J]. Engineering Science, 2004, 6(8): 28–34. doi: 10.3969/j.issn.1009-1742.2004.08.006
    蔡紹濱, 韓啟龍, 高振國, 等. 基于云模型的無線傳感器網(wǎng)絡(luò)惡意節(jié)點(diǎn)識別技術(shù)的研究[J]. 電子學(xué)報(bào), 2012, 40(11): 2232–2238. doi: 10.3969/j.issn.0372-2112.2012.11.015

    CAI Shaobin, HAN Qilong, GAO Zhenguo, et al. Research on cloud trust model for malicious node detection in wireless sensor network[J]. Acta Electronica Sinica, 2012, 40(11): 2232–2238. doi: 10.3969/j.issn.0372-2112.2012.11.015
    徐曉斌, 張光衛(wèi), 王尚廣, 等. 基于輕量云模型的WSN不確定性信任表示方法[J]. 通信學(xué)報(bào), 2014, 35(2): 63–69. doi: 10.3969/j.issn.1000-436x.2014.02.009

    XU Xiaobin, ZHANG Guangwei, WANG Shangguang, et al. Representation for uncertainty trust of WSN based on lightweight-cloud[J]. Journal on Communications, 2014, 35(2): 63–69. doi: 10.3969/j.issn.1000-436x.2014.02.009
    肖云鵬, 姚豪豪, 劉宴兵. 一種基于云模型的WSNs節(jié)點(diǎn)信譽(yù)安全方案[J]. 電子學(xué)報(bào), 2016, 44(1): 168–175. doi: 10.3969/j.issn.0372-2112.2016.01.025

    XIAO Yunpeng, YAO Haohao, and LIU Yanbing. A WSNs node reputation security scheme based on cloud model[J]. Acta Electronica Sinica, 2016, 44(1): 168–175. doi: 10.3969/j.issn.0372-2112.2016.01.025
    李德毅. 知識表示中的不確定性[J]. 中國工程科學(xué), 2000, 2(10): 73–79. doi: 10.3969/j.issn.1009-1742.2000.10.018

    LI Deyi. Uncertainty in knowledge representation[J]. Engineering Science, 2000, 2(10): 73–79. doi: 10.3969/j.issn.1009-1742.2000.10.018
    胡濤, 王樹宗, 楊建軍. 基于云模型的物元綜合評估方法[J]. 海軍工程大學(xué)學(xué)報(bào), 2006, 18(1): 85–88. doi: 10.3969/j.issn.1009-3486.2006.01.018

    HU Tao, WANG Shuzong, and YANG Jianjun. Matter-element integration evaluation method based on cloud model[J]. Journal of Naval University of Engineering, 2006, 18(1): 85–88. doi: 10.3969/j.issn.1009-3486.2006.01.018
    李慧, 馬小平, 施珺, 等. 復(fù)雜網(wǎng)絡(luò)環(huán)境下基于信任傳遞的推薦模型研究[J]. 自動(dòng)化學(xué)報(bào), 2018, 44(2): 363–376. doi: 10.16383/j.aas.2018.c160395

    LI Hui, MA Xiaoping, SHI Jun, et al. A recommendation model by means of trust transition in complex network environment[J]. Acta Automatica Sinica, 2018, 44(2): 363–376. doi: 10.16383/j.aas.2018.c160395
  • 加載中
圖(6) / 表(1)
計(jì)量
  • 文章訪問數(shù):  850
  • HTML全文瀏覽量:  175
  • PDF下載量:  53
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2019-04-22
  • 修回日期:  2020-05-28
  • 網(wǎng)絡(luò)出版日期:  2020-11-13
  • 刊出日期:  2020-12-08

目錄

    /

    返回文章
    返回