无线传感器网络节点行为度量方案

周彩秋, 杨余旺, 王永建

清华大学学报(自然科学版) ›› 2017, Vol. 57 ›› Issue (1) : 39-43.

PDF(1081 KB)
PDF(1081 KB)
清华大学学报(自然科学版) ›› 2017, Vol. 57 ›› Issue (1) : 39-43. DOI: 10.16511/j.cnki.qhdxxb.2017.21.008
计算机科学与技术

无线传感器网络节点行为度量方案

  • 周彩秋1, 杨余旺1, 王永建2
作者信息 +

Behavior measurement scheme for the wireless sensor network nodes

  • ZHOU Caiqiu1, YANG Yuwang1, WANG Yongjian2
Author information +
文章历史 +

摘要

随着电子信息技术的发展,无线传感器网络得到了日益广泛的应用,传统安全防护技术却无法直接应用于无线传感网中,传感器节点容易遭受到恶意攻击。该文提出了一种无线传感器网络的节点行为度量机制,对不同计算能力的节点采用不同的度量机制,具有实时度量和主动控制的特点。仿真实验表明,该方案充分考虑了无线传感器节点能耗问题,能够有效识别恶意节点,同时有更好的环境适应性,能够在部分节点遭到攻击时保障传感器网络顺畅运行。

Abstract

The development of electronic information systems has led to many more wireless sensor networks. However, traditional security systems cannot be directly applied to wireless sensor networks, so the sensor nodes are vulnerable to malicious attacks. This paper presents a node behavior measurement mechanism for wireless sensor networks using different metric mechanisms for different computing nodes with real-time measurements and active control features. Simulations show that this method monitors the energy consumption of the wireless sensor nodes to identify malicious nodes while better adaptability to the environment to make the sensor network run smoothly when some nodes attack.

关键词

无线传感器网络 / 行为 / 实时度量 / 环境适应性

Key words

wireless sensor network / behavior / real-time measurement / environmental adaptability

引用本文

导出引用
周彩秋, 杨余旺, 王永建. 无线传感器网络节点行为度量方案[J]. 清华大学学报(自然科学版). 2017, 57(1): 39-43 https://doi.org/10.16511/j.cnki.qhdxxb.2017.21.008
ZHOU Caiqiu, YANG Yuwang, WANG Yongjian. Behavior measurement scheme for the wireless sensor network nodes[J]. Journal of Tsinghua University(Science and Technology). 2017, 57(1): 39-43 https://doi.org/10.16511/j.cnki.qhdxxb.2017.21.008
中图分类号: TP309.2   

参考文献

[1] 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M].北京:清华大学出版社, 2006.SUN Limin, LI Jianzhong, CHEN Yu, et al. Wireless Sensor Network[M]. Beijing:Tsinghua University, 2006. (in Chinese) [2] Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey[J]. Computer Networks, 2008, 52(12):2292-2330. [3] 李晓维. 无线传感器网络技术[M]. 北京:北京理工大学出版社, 2007.LI Xiaowei. Wireless sensor network technology[M]. Beijing:Beijing University of Technology Press, 2007.(in Chinese) [4] 王擎. 无线传感器网络路由技术研究[D]. 西安:西安电子科技大学, 2009.WANG Qing. Research on the Routing Technology of Wireless Sensor Networks[D]. Xi'an:Xi Dian University, 2009. (in Chinese) [5] 崔莉, 鞠海玲, 苗勇, 等。无线传感器网络研究进展[J]. 计算机研究与发展, 2005, 42(1):163-174.CUI Li, JU Hailing, MIAO Yong, et al. Research on progress in wireless sensor network[J]. Computer Research and Development, 2005, 42(1):163-174. (in Chinese) [6] Pandey A, Tripathi R C. A survey on wireless sensor networks security[J]. International Journal of Computer Applications, 2010, 3(2):43-49. [7] Prasad D, Gupta M, Patel R B. A reliable security model irrespective of energy constraints in wireless sensor networks[J]. International Journal of Advanced Computer Sciences and Applications, 2011, 2(4):2156-5570. [8] Boujelben M, Youssef H, Mzid R, et al. Self-healing key, distribution schemes for wireless networks:A survey[J]. The Computer Journal, 2011, 54(4):449-569. [9] LUO Hanjiang, WU Kaishun, GUO Zhongwen, et al. Ship detection with wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(7):1336-1343. [10] ZHANG Ting, HE Jingsha, LI Xiaohui, et al. A signcryption-based secure localization scheme in wireless sensor networks[J]. Physics Procedia, 2012, 33:58-264. [11] Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182. [12] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese) [13] 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese) [14] 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese) [15] Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149. [16] Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.

PDF(1081 KB)

Accesses

Citation

Detail

段落导航
相关文章

/