共查询到20条相似文献,搜索用时 296 毫秒
1.
在存在恶意攻击存环境条件下,针对传感器网络中节点的自定位问题,提出一种基于距离和连通性校验的安全定位算法。通过对传感器网络中节点间的距离和连通性进行分析,获得节点间具有的基本关系并建立相应位置校验规则。从而确定并删除恶意攻击节点,进而重新利用定位算法进行定位。算法以MDS定位设计为参照,仿真结果表明,该算法对于节点随机部署均匀分布的静态传感器网络,通过选择合适的参数,对攻击点能够获得高于98%的探测率且误探测率低于6%。从而能有效地抵御虫孔、女巫、泛洪和注入错误位置数据等恶意攻击对MDS定位性能的影响,使节点定位系统在恶意攻击存在的条件下,仍能有效地确定节点位置。 相似文献
2.
3.
本文针对传感器网络(SN)面临的主要安全威胁,结合节点计算、存储、通信能力限制,提出一种基于节点协作的SN安全定位算法(节点协作安全定位,NCSL)。该算法以提高SN位置信息的安全性为设计目标,利用节点协作形成协作天线阵列进行相互通信和定位,在不增加额外硬件成本的同时,获得了阵列信号处理技术给SN带来的诸多优势,如减小多径效应、提高接收端的信噪比、增加系统容量和减小发射功率等。仿真结果表明,波达角(DOA)估计精度较高时,基于协作阵列结构NCSL算法能够得到较好的定位性能,并且通过提出的恶意攻击判断规则,使网络对常见恶意攻击具有更好的抵御能力,特别是对虫孔、女巫和泛洪攻击具有非常好的抵御性能。 相似文献
4.
该文提出一种基于进化思想的容忍恶意攻击安全定位算法(ELAMP)。依据最大似然估计概率模型,结合接收信号强度(RSS)标准差与距离的分布关系,建立ZigBee网络安全定位模型。进一步,设计进化算法对模型进行求解,并分析了算法的收敛性和时间复杂度。实验结果表明,当恶意节点比例不超过50%的情况下,所提算法的定位精度明显优于已有定位算法。 相似文献
5.
在无线传感器网络中位置信息有着重要应用,但是定位过程容易受到恶意攻击者的攻击或环境因素的干扰。为了增加节点定位的安全性。本文提出一种基于节点部署模型的检测方法用来提高定位的安全性能,该方法独立于节点定位过程,根据节点位置的邻居发现和部署知识的一致性判断节点位置是否异常。在具体的异常判断过程中使用一种由马氏距离定义差异矩阵作为比较工具。最后通过Matlab仿真实验分别从检测率,错误警报率两个方面评估验证了该方法的正确性。 相似文献
6.
7.
8.
9.
10.
11.
针对无照料的无线传感网(UWSN, unattended wireless sensor network)收集效率和安全问题,提出一种安全的UWSN分簇方案,实现了一种三角形网格图的网络拓扑分簇算法,并可完成簇头对移动节点的认证。该方案利用三角形的性质提高了网络的连通度,折中数据收集效率与能耗;将分布式密钥共享方案与分簇算法无缝结合,在网络中高效地搜索移动节点公钥信息,从而在本地不存有对应公钥信息的情况下验证签名信息。实验结果表明,该算法在节点密度越大的情况下分簇越趋近于正三角形网格图,且分簇后的网络对于低于20%节点变节有95%以上概率抵御攻击。 相似文献
12.
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behaviors such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is an outlier when compared to others. In this paper, we propose a collaborative and trust-based outlier detection algorithm that factors in a node??s reputation for MANETs. The algorithm leads to a common outlier view amongst distributed nodes with a limited communication overhead. Simulation results demonstrate that the proposed algorithm is efficient and accurate. 相似文献
13.
Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution, and residual energy of nodes. Comparing the proposed routing protocol algorithm with simple direction diffusion routing technology, cluster-based routing mechanisms, and simple hierarchical routing protocol algorithm through comprehensive analysis and simulation in terms of the energy usage, packet latency, and security in the presence of node protocol algorithm is more efficient for wireless sensor networks. compromise attacks, the results show that the proposed routing 相似文献
14.
15.
16.
《Digital Communications & Networks》2023,9(1):111-124
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, complex and diverse structures, and lack of computing resources. Traditional network intrusion detection systems cannot meet the security needs of IoT applications. In view of this situation, this study applies cloud computing and machine learning to the intrusion detection system of IoT to improve detection performance. Usually, traditional intrusion detection algorithms require considerable time for training, and these intrusion detection algorithms are not suitable for cloud computing due to the limited computing power and storage capacity of cloud nodes; therefore, it is necessary to study intrusion detection algorithms with low weights, short training time, and high detection accuracy for deployment and application on cloud nodes. An appropriate classification algorithm is a primary factor for deploying cloud computing intrusion prevention systems and a prerequisite for the system to respond to intrusion and reduce intrusion threats. This paper discusses the problems related to IoT intrusion prevention in cloud computing environments. Based on the analysis of cloud computing security threats, this study extensively explores IoT intrusion detection, cloud node monitoring, and intrusion response in cloud computing environments by using cloud computing, an improved extreme learning machine, and other methods. We use the Multi-Feature Extraction Extreme Learning Machine (MFE-ELM) algorithm for cloud computing, which adds a multi-feature extraction process to cloud servers, and use the deployed MFE-ELM algorithm on cloud nodes to detect and discover network intrusions to cloud nodes. In our simulation experiments, a classical dataset for intrusion detection is selected as a test, and test steps such as data preprocessing, feature engineering, model training, and result analysis are performed. The experimental results show that the proposed algorithm can effectively detect and identify most network data packets with good model performance and achieve efficient intrusion detection for heterogeneous data of the IoT from cloud nodes. Furthermore, it can enable the cloud server to discover nodes with serious security threats in the cloud cluster in real time, so that further security protection measures can be taken to obtain the optimal intrusion response strategy for the cloud cluster. 相似文献
17.
18.
一种新的移动Ad hoc网络的安全路由策略 总被引:3,自引:2,他引:1
本文从各网络节点易受攻击、俘获,各网络节点之间不可信赖的角度出发,引入了可信任第三方的信任分散策略并结合Diffie-Hellman密钥交换算法,提出了一种新的移动Adhoc网络的安全路由策略。 相似文献
19.
In view of high efficiency and security requirements in WSN encryption algorithm,a lightweight chaotic block encryption algorithm was designed and a novel scheme of dynamic sub keys extension was proposed.To greatly reduce the computing burden of WSN nodes,this scheme made full use of WSN cloud servers monitoring platform,which was powerful in data computing and processing,and transfered the sub keys synchronization task from nodes to cloud servers.Experimental results and performance analysis show that the scheme has good characteristics of diffusion,confusion and statistical balance,strong key security and high algorithm efficiency.It has a good application prospect in the field of WSN communication encryption. 相似文献
20.
由于无线传感器网络容易受到攻击,所以保证无线传感器在网络数据传输过程中的路由安全是必要的,文中提出一种基于节点信任值、节点度和距离的簇头选举算法,进行路由主干节点的可信选举,建立安全可信的层次路由。仿真结果表明,该算法可有效评估节点的信任值,解决了节点失效或被俘获所导致的层次路由安全问题。 相似文献