计算机工程
計算機工程
계산궤공정
COMPUTER ENGINEERING
2009年
21期
140-143
,共4页
无线传感器刚络%选择转发攻击%丢包行为评估%信任度
無線傳感器剛絡%選擇轉髮攻擊%丟包行為評估%信任度
무선전감기강락%선택전발공격%주포행위평고%신임도
wireless sensor networks%selective forwarding attack%behavior evaluation of packet loss%trust degree
针对无线传感器网络中现有检测攻击方法衙要节点协同或检测硬件的缺点,对选择转发攻击进行研究,提出一种基于信任度与丢包行为的检测方法,通过节点收发数据包的情况,计算节点的信任度,结合节点丢包行为评估,判断节点是否发动攻击.这种检测方法的计算与存储开销都集中于基站,且不需增加额外的检测设备.实验结果表明,这种方法较之现有检测方法,检测率更高.
針對無線傳感器網絡中現有檢測攻擊方法衙要節點協同或檢測硬件的缺點,對選擇轉髮攻擊進行研究,提齣一種基于信任度與丟包行為的檢測方法,通過節點收髮數據包的情況,計算節點的信任度,結閤節點丟包行為評估,判斷節點是否髮動攻擊.這種檢測方法的計算與存儲開銷都集中于基站,且不需增加額外的檢測設備.實驗結果錶明,這種方法較之現有檢測方法,檢測率更高.
침대무선전감기망락중현유검측공격방법아요절점협동혹검측경건적결점,대선택전발공격진행연구,제출일충기우신임도여주포행위적검측방법,통과절점수발수거포적정황,계산절점적신임도,결합절점주포행위평고,판단절점시부발동공격.저충검측방법적계산여존저개소도집중우기참,차불수증가액외적검측설비.실험결과표명,저충방법교지현유검측방법,검측솔경고.
According to the drawbacks that methods of attack detection in wireless sensor networks require cooperation of nodes or hardware, selective forwarding attack is studied and a light-weight method based on trust degree and behavior of packet loss is proposed. The method detects the attack by calculating trust degree and evaluating behavior of packet loss of nodes, which are based on statistics of receiving and forwarding packets. The calculating and storage pressure of the method are concentrated on the base station and the method works without auxiliary equipment. Experimental results show that the method has relatively higher detection rate than existing methods.