Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2017, Vol. 57 Issue (1) : 39-43     DOI: 10.16511/j.cnki.qhdxxb.2017.21.008
COMPUTER SCIENCE AND TECHNOLOGY |
Behavior measurement scheme for the wireless sensor network nodes
ZHOU Caiqiu1, YANG Yuwang1, WANG Yongjian2
1. School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094, China;
2. National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing 100029, China
Download: PDF(1081 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  The development of electronic information systems has led to many more wireless sensor networks. However, traditional security systems cannot be directly applied to wireless sensor networks, so the sensor nodes are vulnerable to malicious attacks. This paper presents a node behavior measurement mechanism for wireless sensor networks using different metric mechanisms for different computing nodes with real-time measurements and active control features. Simulations show that this method monitors the energy consumption of the wireless sensor nodes to identify malicious nodes while better adaptability to the environment to make the sensor network run smoothly when some nodes attack.
Keywords wireless sensor network      behavior      real-time measurement      environmental adaptability     
ZTFLH:  TP309.2  
Issue Date: 15 January 2017
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
ZHOU Caiqiu
YANG Yuwang
WANG Yongjian
Cite this article:   
ZHOU Caiqiu,YANG Yuwang,WANG Yongjian. Behavior measurement scheme for the wireless sensor network nodes[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 39-43.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2017.21.008     OR     http://jst.tsinghuajournals.com/EN/Y2017/V57/I1/39
  
  
  
  
  
  
  
[1] 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M].北京:清华大学出版社, 2006.SUN Limin, LI Jianzhong, CHEN Yu, et al. Wireless Sensor Network[M]. Beijing:Tsinghua University, 2006. (in Chinese)
[2] Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey[J]. Computer Networks, 2008, 52(12):2292-2330.
[3] 李晓维. 无线传感器网络技术[M]. 北京:北京理工大学出版社, 2007.LI Xiaowei. Wireless sensor network technology[M]. Beijing:Beijing University of Technology Press, 2007.(in Chinese)
[11] Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.<br />
[4] 王擎. 无线传感器网络路由技术研究[D]. 西安:西安电子科技大学, 2009.WANG Qing. Research on the Routing Technology of Wireless Sensor Networks[D]. Xi'an:Xi Dian University, 2009. (in Chinese)
[5] 崔莉, 鞠海玲, 苗勇, 等。无线传感器网络研究进展[J]. 计算机研究与发展, 2005, 42(1):163-174.CUI Li, JU Hailing, MIAO Yong, et al. Research on progress in wireless sensor network[J]. Computer Research and Development, 2005, 42(1):163-174. (in Chinese)
[12] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)<br />
[13] 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)<br />
[6] Pandey A, Tripathi R C. A survey on wireless sensor networks security[J]. International Journal of Computer Applications, 2010, 3(2):43-49.
[14] 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)<br />
[7] Prasad D, Gupta M, Patel R B. A reliable security model irrespective of energy constraints in wireless sensor networks[J]. International Journal of Advanced Computer Sciences and Applications, 2011, 2(4):2156-5570.
[15] Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.<br />
[8] Boujelben M, Youssef H, Mzid R, et al. Self-healing key, distribution schemes for wireless networks:A survey[J]. The Computer Journal, 2011, 54(4):449-569.
[16] Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.
[9] LUO Hanjiang, WU Kaishun, GUO Zhongwen, et al. Ship detection with wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(7):1336-1343.
[10] ZHANG Ting, HE Jingsha, LI Xiaohui, et al. A signcryption-based secure localization scheme in wireless sensor networks[J]. Physics Procedia, 2012, 33:58-264.
[11] Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.
[12] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)
[13] 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)
[14] 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)
[15] Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.
[16] Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.
[1] CHEN Zixiao, LIANG Yao, LIU Hongyu. Land-buying behaviors of listed real estate firms and their capital market performance[J]. Journal of Tsinghua University(Science and Technology), 2024, 64(2): 181-188.
[2] LI Gen, ZHAI Wei, HUANG Haibo, REN Jiaolong, Wang Dengzhong, WU Lan. Merging decision behavior model based on multivariate adaptive regression splines[J]. Journal of Tsinghua University(Science and Technology), 2024, 64(1): 55-62.
[3] GU Botao, CAO Sihan, WANG Yao, HUANG Yuecheng, FANG Dongping. Types and characteristics of unsafe behaviors in construction teamwork[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(2): 160-168.
[4] HUANG Yuecheng, LI Boning, YU Xiaoxia, WANG Yao, FANG Dongping. Path analysis of attachment in the safety interactions of construction team members[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(2): 169-178.
[5] LI Xinyang, ZHU Xiaoshan, TAO Yi. Preliminary exploration of marine pollution evolutionary ecology: From behavior, adaptation to evolution[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(12): 2042-2056.
[6] ZANG Jinrui, JIAO Pengpeng, SONG Guohua, WANG Tianshi, WANG Jianyu. Eco-driving evaluation and trajectory optimization based on vehicle specific power distribution[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(11): 1760-1769.
[7] XU Xiaorong, HE Taohong, LEI Zhengqi, ZHANG Quanyi, LI Cong, JIN Feng. Safety evaluation of rock-filled concrete gravity dam with long section during the impoundment operation period[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(9): 1375-1387.
[8] CHENG Heng, ZHOU Qiujing, LOU Shijian, ZHANG Guoxin, LIU Yi, LEI Zhengqi. Simulation of the working behavior of Shibahe reservoir rock-filled concrete gravity dam during construction[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(9): 1408-1416.
[9] YU Hongwei, ZHOU Dongbo, XU Wenhui, YU Yaying, WANG Xiaomei, TU Yue. Daily behavior prediction of college students on campus based on multifragment semantic spatiotemporal graph convolutional network[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(1): 105-115.
[10] LI Shaojun, ZHENG Minzong, QIU Shili, YAO Zhibin, XIAO Yaxun, ZHOU Jifang, PAN Pengzhi. Characteristics of excavation disasters and long-term in-situ mechanical behavior of the tunnels in the China Jinping Underground Laboratory[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(8): 842-852.
[11] CHEN Anying, ZHU Haoran, SU Guofeng. Emergency warning information repost behavior of Weibo users[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(6): 527-535.
[12] GUAN Zhongyao, XIANG Tian, FANG Dongping, GUO Hongling. Improved experimental measurement method of construction worker fatigue and unsafe behavior[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(10): 1186-1194.
[13] LIU Qu, CHEN Gaoqiang, ZENG Shenbo, ZHANG Shuai, PAN Jiluan, SHI Qingyu. Effect of microstructure refinement on the corrosion of AZ91D magnesium alloys[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(9): 765-771.
[14] WANG Wei, WANG Bohao, ZHAO Yuntian, PAN Jianwen, JIN Feng. Mechanical behavior and acoustic emission responsecharacteristics of cemented granular materials[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(5): 337-344.
[15] REN Mingqian, AN Xuehui, TAN Ni, LI Pengfei. Experimental study of the influence of rocks on the interlayer shear behavior of rock-filled concrete[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(12): 967-974.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd