Behavior measurement scheme for the wireless sensor network nodes
ZHOU Caiqiu1, YANG Yuwang1, WANG Yongjian2
1. School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094, China;
2. National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing 100029, China
Abstract:The development of electronic information systems has led to many more wireless sensor networks. However, traditional security systems cannot be directly applied to wireless sensor networks, so the sensor nodes are vulnerable to malicious attacks. This paper presents a node behavior measurement mechanism for wireless sensor networks using different metric mechanisms for different computing nodes with real-time measurements and active control features. Simulations show that this method monitors the energy consumption of the wireless sensor nodes to identify malicious nodes while better adaptability to the environment to make the sensor network run smoothly when some nodes attack.
李晓维. 无线传感器网络技术[M]. 北京:北京理工大学出版社, 2007.LI Xiaowei. Wireless sensor network technology[M]. Beijing:Beijing University of Technology Press, 2007.(in Chinese)
[11]
Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.<br />
[4]
王擎. 无线传感器网络路由技术研究[D]. 西安:西安电子科技大学, 2009.WANG Qing. Research on the Routing Technology of Wireless Sensor Networks[D]. Xi'an:Xi Dian University, 2009. (in Chinese)
[5]
崔莉, 鞠海玲, 苗勇, 等。无线传感器网络研究进展[J]. 计算机研究与发展, 2005, 42(1):163-174.CUI Li, JU Hailing, MIAO Yong, et al. Research on progress in wireless sensor network[J]. Computer Research and Development, 2005, 42(1):163-174. (in Chinese)
[12]
杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)<br />
[13]
欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)<br />
[6]
Pandey A, Tripathi R C. A survey on wireless sensor networks security[J]. International Journal of Computer Applications, 2010, 3(2):43-49.
[14]
张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)<br />
[7]
Prasad D, Gupta M, Patel R B. A reliable security model irrespective of energy constraints in wireless sensor networks[J]. International Journal of Advanced Computer Sciences and Applications, 2011, 2(4):2156-5570.
[15]
Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.<br />
[8]
Boujelben M, Youssef H, Mzid R, et al. Self-healing key, distribution schemes for wireless networks:A survey[J]. The Computer Journal, 2011, 54(4):449-569.
[16]
Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.
[9]
LUO Hanjiang, WU Kaishun, GUO Zhongwen, et al. Ship detection with wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(7):1336-1343.
[10]
ZHANG Ting, HE Jingsha, LI Xiaohui, et al. A signcryption-based secure localization scheme in wireless sensor networks[J]. Physics Procedia, 2012, 33:58-264.
[11]
Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.
[12]
杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)
[13]
欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)
[14]
张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)
[15]
Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.
[16]
Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.