Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们 横山亮次奖 百年刊庆
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  横山亮次奖  |  百年刊庆
清华大学学报(自然科学版)  2017, Vol. 57 Issue (1): 39-43    DOI: 10.16511/j.cnki.qhdxxb.2017.21.008
  计算机科学与技术 本期目录 | 过刊浏览 | 高级检索 |
无线传感器网络节点行为度量方案
周彩秋1, 杨余旺1, 王永建2
1. 南京理工大学 计算机科学与技术学院, 南京 210094;
2. 国家计算机网络应急技术处理协调中心, 北京 100029
Behavior measurement scheme for the wireless sensor network nodes
ZHOU Caiqiu1, YANG Yuwang1, WANG Yongjian2
1. School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094, China;
2. National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing 100029, China
全文: PDF(1081 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 随着电子信息技术的发展,无线传感器网络得到了日益广泛的应用,传统安全防护技术却无法直接应用于无线传感网中,传感器节点容易遭受到恶意攻击。该文提出了一种无线传感器网络的节点行为度量机制,对不同计算能力的节点采用不同的度量机制,具有实时度量和主动控制的特点。仿真实验表明,该方案充分考虑了无线传感器节点能耗问题,能够有效识别恶意节点,同时有更好的环境适应性,能够在部分节点遭到攻击时保障传感器网络顺畅运行。
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
周彩秋
杨余旺
王永建
关键词 无线传感器网络行为实时度量环境适应性    
Abstract:The development of electronic information systems has led to many more wireless sensor networks. However, traditional security systems cannot be directly applied to wireless sensor networks, so the sensor nodes are vulnerable to malicious attacks. This paper presents a node behavior measurement mechanism for wireless sensor networks using different metric mechanisms for different computing nodes with real-time measurements and active control features. Simulations show that this method monitors the energy consumption of the wireless sensor nodes to identify malicious nodes while better adaptability to the environment to make the sensor network run smoothly when some nodes attack.
Key wordswireless sensor network    behavior    real-time measurement    environmental adaptability
收稿日期: 2014-12-19      出版日期: 2017-01-15
ZTFLH:  TP309.2  
通讯作者: 杨余旺,教授,E-mail:yuwangyang@njust.edu.cn     E-mail: yuwangyang@njust.edu.cn
引用本文:   
周彩秋, 杨余旺, 王永建. 无线传感器网络节点行为度量方案[J]. 清华大学学报(自然科学版), 2017, 57(1): 39-43.
ZHOU Caiqiu, YANG Yuwang, WANG Yongjian. Behavior measurement scheme for the wireless sensor network nodes. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 39-43.
链接本文:  
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2017.21.008  或          http://jst.tsinghuajournals.com/CN/Y2017/V57/I1/39
  图1 传感器网络描述
  图2 无线传感器网络节点行为度量过程
  表1 仿真的物理参数
  图3 传感器结点分布图
  图4 面对节点劫持攻击时正常节点比率
  图5 面对女巫攻击时正常节点比率
  图6 能量消耗对比
[1] 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M].北京:清华大学出版社, 2006.SUN Limin, LI Jianzhong, CHEN Yu, et al. Wireless Sensor Network[M]. Beijing:Tsinghua University, 2006. (in Chinese)
[2] Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey[J]. Computer Networks, 2008, 52(12):2292-2330.
[3] 李晓维. 无线传感器网络技术[M]. 北京:北京理工大学出版社, 2007.LI Xiaowei. Wireless sensor network technology[M]. Beijing:Beijing University of Technology Press, 2007.(in Chinese)
[11] Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.<br />
[4] 王擎. 无线传感器网络路由技术研究[D]. 西安:西安电子科技大学, 2009.WANG Qing. Research on the Routing Technology of Wireless Sensor Networks[D]. Xi'an:Xi Dian University, 2009. (in Chinese)
[5] 崔莉, 鞠海玲, 苗勇, 等。无线传感器网络研究进展[J]. 计算机研究与发展, 2005, 42(1):163-174.CUI Li, JU Hailing, MIAO Yong, et al. Research on progress in wireless sensor network[J]. Computer Research and Development, 2005, 42(1):163-174. (in Chinese)
[12] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)<br />
[13] 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)<br />
[6] Pandey A, Tripathi R C. A survey on wireless sensor networks security[J]. International Journal of Computer Applications, 2010, 3(2):43-49.
[14] 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)<br />
[7] Prasad D, Gupta M, Patel R B. A reliable security model irrespective of energy constraints in wireless sensor networks[J]. International Journal of Advanced Computer Sciences and Applications, 2011, 2(4):2156-5570.
[15] Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.<br />
[8] Boujelben M, Youssef H, Mzid R, et al. Self-healing key, distribution schemes for wireless networks:A survey[J]. The Computer Journal, 2011, 54(4):449-569.
[16] Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.
[9] LUO Hanjiang, WU Kaishun, GUO Zhongwen, et al. Ship detection with wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(7):1336-1343.
[10] ZHANG Ting, HE Jingsha, LI Xiaohui, et al. A signcryption-based secure localization scheme in wireless sensor networks[J]. Physics Procedia, 2012, 33:58-264.
[11] Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.
[12] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)
[13] 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)
[14] 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)
[15] Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.
[16] Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.
[1] 喻宏伟, 周东波, 徐雯慧, 余雅滢, 王小梅, 涂悦. 基于多片段语义时空图卷积网络的大学生校园日常行为预测[J]. 清华大学学报(自然科学版), 2022, 62(1): 105-115.
[2] 陈安滢, 朱昊然, 苏国锋. 微博用户的应急预警信息传播行为研究[J]. 清华大学学报(自然科学版), 2021, 61(6): 527-535.
[3] 管仲尧, 项天, 方东平, 郭红领. 改进的建筑工人疲劳与不安全行为实验测量方法[J]. 清华大学学报(自然科学版), 2021, 61(10): 1186-1194.
[4] 王卫, 汪博浩, 赵运天, 潘坚文, 金峰. 胶结颗粒料力学行为与声发射信号特征[J]. 清华大学学报(自然科学版), 2019, 59(5): 337-344.
[5] 郭红领, 张知田, 郁润. 基于危险系数的施工工人不安全行为评估[J]. 清华大学学报(自然科学版), 2019, 59(11): 873-879.
[6] 张辉, 苏宁, 刘奕群, 马少平. 文本飘红策略对搜索引擎用户行为的影响[J]. 清华大学学报(自然科学版), 2018, 58(8): 703-709.
[7] 徐磊, 徐恪. 范式路由器:规范路由器数据层的动态行为[J]. 清华大学学报(自然科学版), 2018, 58(8): 693-697.
[8] 吕学强, 张学敬, 周强. 对话语篇中对话者的心理距离预测初探[J]. 清华大学学报(自然科学版), 2018, 58(4): 362-367.
[9] 邢邗, 张琳, 刘奕. 利他情境对驾驶个体跟驰行为的影响[J]. 清华大学学报(自然科学版), 2018, 58(11): 1000-1005.
[10] 杨宏宇, 李航. 无线Mesh网络恶意节点检测模型[J]. 清华大学学报(自然科学版), 2017, 57(7): 687-694.
[11] 康举, 梁苏莹, 吴爱萍, 王国庆. 2219-T8铝合金搅拌摩擦焊接头在酸性介质中的腐蚀行为[J]. 清华大学学报(自然科学版), 2017, 57(5): 465-470.
[12] 郑航, 陈奔, 林木. 基于集市型水权交易模型的报价行为[J]. 清华大学学报(自然科学版), 2017, 57(4): 351-356.
[13] 杨晓芳, 王喆, 姜海. 基于多项logit模型的在线机票代理商选择行为[J]. 清华大学学报(自然科学版), 2017, 57(4): 437-442.
[14] 苘大鹏, 王臣业, 杨武, 王巍, 玄世昌, 靳小鹏. 低能耗的无线传感器网络隐私数据融合方法[J]. 清华大学学报(自然科学版), 2017, 57(2): 213-219.
[15] 强茂山, 张东成, 江汉臣. 基于加速度传感器的建筑工人施工行为识别方法[J]. 清华大学学报(自然科学版), 2017, 57(12): 1338-1344.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 《清华大学学报(自然科学版)》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn