首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于多跳确认和信任评估的选择性转发攻击检测方法
引用本文:尹荣荣,张文元,杨绸绸,李曦达.一种基于多跳确认和信任评估的选择性转发攻击检测方法[J].控制与决策,2020,35(4):949-955.
作者姓名:尹荣荣  张文元  杨绸绸  李曦达
作者单位:燕山大学信息科学与工程学院,河北秦皇岛066004;燕山大学河北省特种光纤与光纤传感重点实验室,河北秦皇岛066004;燕山大学信息科学与工程学院,河北秦皇岛,066004
基金项目:国家自然科学基金项目(61802333);河北省高等学校科学技术研究项目(QN2018029).
摘    要:针对无线传感器网络中的选择性转发攻击行为,提出一种基于多跳确认和信任评估(MHA-TE)的选择性转发攻击检测方法.MHA-TE方法利用基于源节点的请求响应形式的多跳确认方案,通过源节点发送请求包、中间节点回复响应包的方式确定路径中产生恶意丢包行为的节点,进而将被检举出的恶意节点作为信任评估的参数更新标准,运用Bate分布建立信任评估模型分析各个节点的交互情况,确定路径中各节点的信任值,并将更新后的信任值与对应的信任值阈值比较,进行恶意节点的判定.该方法结合多跳确认和信任评估的优势,能够解决路径上多恶意节点误警率高和静态信任阈值适应性差以及检测率低的问题.仿真实验结果表明,相比于Two-hops方法、MLCM方法和ITEM方法,MHA-TE方法不仅能够有效检测恶意节点,具有较高的检测率和较低的误警率,而且可以在很大程度上降低网络开销.

关 键 词:无线传感器网络  选择性转发攻击  攻击检测  多跳确认

A selective forwarding attacks detection approach based on multi-hop acknowledgment and trust evaluation
YIN Rong-rong,ZHANG Wen-yuan,YANG Chou-chou and LI Xi-da.A selective forwarding attacks detection approach based on multi-hop acknowledgment and trust evaluation[J].Control and Decision,2020,35(4):949-955.
Authors:YIN Rong-rong  ZHANG Wen-yuan  YANG Chou-chou and LI Xi-da
Affiliation:School of Information Science and Engineering,Yanshan University,Qinhuangdao066004,China;The Key Laboratory for Special Fiber and Fiber Sensor of Hebei Province,Yanshan University,Qinhuangdao066004, China,School of Information Science and Engineering,Yanshan University,Qinhuangdao066004,China;The Key Laboratory for Special Fiber and Fiber Sensor of Hebei Province,Yanshan University,Qinhuangdao066004, China,School of Information Science and Engineering,Yanshan University,Qinhuangdao066004,China and School of Information Science and Engineering,Yanshan University,Qinhuangdao066004,China
Abstract:Considering the selective forwarding attacks behavior, based on multi-hop acknowledgment and trust evaluation(MHA-TE), a selective forwarding attacks detection method is proposed in wireless sensor networks. MHA-TE method using the multi-hop acknowledgment mechanism based on request response patterns from the source node. Through the source node send the request packets and the middle nodes reply to the response packets, the nodes which generate malicious packets loss behavior in the path are confirmed. Then using the malicious nodes as the standard of update parameters in trust evaluation mechanism, the data exchange among nodes is analyzed by the Bate distribution trust evaluation model. And the each node''s trust value is obtained. Finally, by comparing the updated trust value with the corresponding trust value threshold, the determination of the malicious nodes is performed. By combining the best of both multi-hop acknowledgment and trust evaluation, these problems such as the high false alarm rate of multiply malicious nodes in the path, low adaptability of static trust value threshold and low accuracy detection rate can be solved. Compared with Two-hops, MLCM and ITEM methods, the simulation results show that the MHA-TE can detect the malicious nodes effectively with higher detection rate and lower false alarm rate, and also can reduce the network overhead to a large extent.
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《控制与决策》浏览原始摘要信息
点击此处可从《控制与决策》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号