删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

无线传感器网络节点行为度量方案

清华大学 辅仁网/2017-07-07

无线传感器网络节点行为度量方案
周彩秋1, 杨余旺1, 王永建2
1. 南京理工大学 计算机科学与技术学院, 南京 210094;
2. 国家计算机网络应急技术处理协调中心, 北京 100029
Behavior measurement scheme for the wireless sensor network nodes
ZHOU Caiqiu1, YANG Yuwang1, WANG Yongjian2
1. School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094, China;
2. National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing 100029, China

摘要:

输出: BibTeX | EndNote (RIS)
摘要随着电子信息技术的发展,无线传感器网络得到了日益广泛的应用,传统安全防护技术却无法直接应用于无线传感网中,传感器节点容易遭受到恶意攻击。该文提出了一种无线传感器网络的节点行为度量机制,对不同计算能力的节点采用不同的度量机制,具有实时度量和主动控制的特点。仿真实验表明,该方案充分考虑了无线传感器节点能耗问题,能够有效识别恶意节点,同时有更好的环境适应性,能够在部分节点遭到攻击时保障传感器网络顺畅运行。
关键词 无线传感器网络,行为,实时度量,环境适应性
Abstract:The development of electronic information systems has led to many more wireless sensor networks. However, traditional security systems cannot be directly applied to wireless sensor networks, so the sensor nodes are vulnerable to malicious attacks. This paper presents a node behavior measurement mechanism for wireless sensor networks using different metric mechanisms for different computing nodes with real-time measurements and active control features. Simulations show that this method monitors the energy consumption of the wireless sensor nodes to identify malicious nodes while better adaptability to the environment to make the sensor network run smoothly when some nodes attack.
Key wordswireless sensor networkbehaviorreal-time measurementenvironmental adaptability
收稿日期: 2014-12-19 出版日期: 2017-01-20
ZTFLH:TP309.2
通讯作者:杨余旺,教授,E-mail:yuwangyang@njust.edu.cnE-mail: yuwangyang@njust.edu.cn
引用本文:
周彩秋, 杨余旺, 王永建. 无线传感器网络节点行为度量方案[J]. 清华大学学报(自然科学版), 2017, 57(1): 39-43.
ZHOU Caiqiu, YANG Yuwang, WANG Yongjian. Behavior measurement scheme for the wireless sensor network nodes. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 39-43.
链接本文:
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2017.21.008 http://jst.tsinghuajournals.com/CN/Y2017/V57/I1/39


图表:
1 传感器网络描述
2 无线传感器网络节点行为度量过程
1 仿真的物理参数
图3 传感器结点分布图
图4 面对节点劫持攻击时正常节点比率
图5 面对女巫攻击时正常节点比率
6 能量消耗对比


参考文献:
[1] 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M].北京:清华大学出版社, 2006.SUN Limin, LI Jianzhong, CHEN Yu, et al. Wireless Sensor Network[M]. Beijing:Tsinghua University, 2006. (in Chinese)
[2] Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey[J]. Computer Networks, 2008, 52(12):2292-2330.
[3] 李晓维. 无线传感器网络技术[M]. 北京:北京理工大学出版社, 2007.LI Xiaowei. Wireless sensor network technology[M]. Beijing:Beijing University of Technology Press, 2007.(in Chinese)
[11] Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.<br />
[4] 王擎. 无线传感器网络路由技术研究[D]. 西安:西安电子科技大学, 2009.WANG Qing. Research on the Routing Technology of Wireless Sensor Networks[D]. Xi'an:Xi Dian University, 2009. (in Chinese)
[5] 崔莉, 鞠海玲, 苗勇, 等。无线传感器网络研究进展[J]. 计算机研究与发展, 2005, 42(1):163-174.CUI Li, JU Hailing, MIAO Yong, et al. Research on progress in wireless sensor network[J]. Computer Research and Development, 2005, 42(1):163-174. (in Chinese)
[12] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)<br />
[13] 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)<br />
[6] Pandey A, Tripathi R C. A survey on wireless sensor networks security[J]. International Journal of Computer Applications, 2010, 3(2):43-49.
[14] 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)<br />
[7] Prasad D, Gupta M, Patel R B. A reliable security model irrespective of energy constraints in wireless sensor networks[J]. International Journal of Advanced Computer Sciences and Applications, 2011, 2(4):2156-5570.
[15] Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.<br />
[8] Boujelben M, Youssef H, Mzid R, et al. Self-healing key, distribution schemes for wireless networks:A survey[J]. The Computer Journal, 2011, 54(4):449-569.
[16] Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.
[9] LUO Hanjiang, WU Kaishun, GUO Zhongwen, et al. Ship detection with wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(7):1336-1343.
[10] ZHANG Ting, HE Jingsha, LI Xiaohui, et al. A signcryption-based secure localization scheme in wireless sensor networks[J]. Physics Procedia, 2012, 33:58-264.
[11] Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.
[12] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)
[13] 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)
[14] 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)
[15] Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.
[16] Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.


相关文章:
[1]苘大鹏, 王臣业, 杨武, 王巍, 玄世昌, 靳小鹏. 低能耗的无线传感器网络隐私数据融合方法[J]. 清华大学学报(自然科学版), 2017, 57(2): 213-219.
[2]付俊松, 刘云. 基于信誉系统及数据噪声点检测技术的无线传感器网络节点安全模型[J]. 清华大学学报(自然科学版), 2017, 57(1): 24-27.
[3]谭金华, 石京. 浓雾下高速公路双车道间断放行措施[J]. 清华大学学报(自然科学版), 2016, 56(9): 985-990.
[4]廖理, 梁昱, 张伟强. 谁在中国股票市场中“博彩”?——基于个人投资者交易数据的实证研究[J]. 清华大学学报(自然科学版), 2016, 56(6): 677-684.
[5]李舟军, 吴春明, 王啸. 基于沙盒的Android应用风险行为分析与评估[J]. 清华大学学报(自然科学版), 2016, 65(5): 453-460.
[6]李丽华, 马亚萍, 丁宁, 张辉, 马晔风. 应急疏散中社会关系网络与“领导-追随”行为变化[J]. 清华大学学报(自然科学版), 2016, 56(3): 334-340.
[7]奇格奇, 吴建平, 杜怡曼, 贾宇涵. 快速城镇化背景下的驾驶风格多样性分析[J]. 清华大学学报(自然科学版), 2016, 56(12): 1320-1326.
[8]龙奋杰, 王萧濛, 邹迪. 基于标尺竞争的地方政府土地出让行为互动[J]. 清华大学学报(自然科学版), 2015, 55(9): 971-976,983.
[9]刘念雄, 莫丹, 王牧洲, 张敬南. 城市家庭居住碳排放的社会-技术分析方法与应用[J]. 清华大学学报(自然科学版), 2015, 55(9): 933-939.
[10]蔡劼, 顾明. 基于IEEE 802.15.4的星形拓扑无线传感器网络性能分析[J]. 清华大学学报(自然科学版), 2015, 55(5): 565-571.
[11]陈元琳, 柴跃廷, 刘义, 徐扬. 基于群体偏好的交易评价可信度[J]. 清华大学学报(自然科学版), 2015, 55(5): 558-564,571.
[12]周沧琦, 赵千川, 卢文博. 基于兴趣变化的微博用户转发行为建模[J]. 清华大学学报(自然科学版), 2015, 55(11): 1163-1170.
[13]孙立远, 管晓宏. 在线社会网络多话题传播竞争特性的测量[J]. 清华大学学报(自然科学版), 2015, 55(11): 1157-1162.
[14]杨殿阁, 何长伟, 李满, 何奇洸. 基于支持向量机的汽车转向与换道行为识别[J]. 清华大学学报(自然科学版), 2015, 55(10): 1093-1097.
[15]何平, 吴添, 姜磊, 伍良杰. 投资者情绪与个股波动关系的微观检验[J]. 清华大学学报(自然科学版), 2014, 54(5): 655-663.

相关话题/传感器 网络 环境 北京 技术