期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于链路特征的无线传感网络数据多步攻击识别方法 被引量:1
1
作者 徐欢 李洁珊 +1 位作者 零颖俏 杨春 《传感技术学报》 CAS CSCD 北大核心 2024年第11期1958-1963,共6页
无线传感网络因其自身的拓扑结构具有不确定性,易受到恶意攻击,常规方法没有考虑的链路特征,导致网络的安全性较低。为此,提出一种基于链路特征的无线传感网络数据多步攻击识别方法。通过支持向量分类机对无线传感网络展开链路安全评估... 无线传感网络因其自身的拓扑结构具有不确定性,易受到恶意攻击,常规方法没有考虑的链路特征,导致网络的安全性较低。为此,提出一种基于链路特征的无线传感网络数据多步攻击识别方法。通过支持向量分类机对无线传感网络展开链路安全评估,得到链路安全等级,提取链路特征,获取传感器网络内部链路特征分布情况。引入自组织映射神经网络提取无线传感网络数据多步攻击特征,建立无线传感网络数据多步攻击特征组合,结合链路特征分布情况,通过特征组合识别无线传感网络数据多步攻击。仿真结果表明,采用所提方法的无线传感网络数据多步攻击识别率高于96%,误报率低于0.22%,识别时间在24 ms以内,具有良好的识别效果。 展开更多
关键词 无线传感网络数据 多步攻击识别 链路特征 支持向量分类机 自组织映射神经网络
在线阅读 下载PDF
A neighbor information based false data filtering scheme in wireless sensor networks 被引量:1
2
作者 刘志雄 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3147-3153,共7页
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie... In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes. 展开更多
关键词 wireless sensor network false report filtering neighbor information collaborative attack compromise tolerance
在线阅读 下载PDF
Hash-area-based data dissemination protocol in wireless sensor networks 被引量:1
3
作者 王田 王国军 +1 位作者 过敏意 贾维嘉 《Journal of Central South University of Technology》 EI 2008年第3期392-398,共7页
HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The se... HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks. 展开更多
关键词 wireless sensor networks Hash function data dissemination query processing mobile sinks
在线阅读 下载PDF
Energy-balanced clustering protocol for data gathering in wireless sensor networks with unbalanced traffic load 被引量:1
4
作者 奎晓燕 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3180-3187,共8页
Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering pr... Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering protocol (DSCP) was proposed to solve the data gathering problem in this scenario.In DSCP,a node evaluates the potential lifetime of the network (from its local point of view) assuming that it acts as the cluster head,and claims to be a tentative cluster head if it maximizes the potential lifetime.When evaluating the potential lifetime of the network,a node considers not only its remaining energy,but also other factors including its traffic load,the number of its neighbors,and the traffic loads of its neighbors.A tentative cluster head becomes a final cluster head with a probability inversely proportional to the number of tentative cluster heads that cover its neighbors.The protocol can terminate in O(n/lg n) steps,and its total message complexity is O(n2/lg n).Simulation results show that DSCP can effectively prolong the lifetime of the network in multi-hop networks with unbalanced traffic load.Compared with EECT,the network lifetime is prolonged by 56.6% in average. 展开更多
关键词 ENERGY-BALANCE CLUSTERING data gathering wireless sensor networks unbalanced traffic load
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部