无线传感网络最佳候选节点空洞攻击抑制方法  被引量:1

Hole Attack Suppression Method of the Best Candidate Node in Wireless Sensor Networks

在线阅读下载全文

作  者:张迪 韩铮 王雪丽[1] ZHANG Di;HAN Zheng;WANG Xueli(School of Physics and Intelligent Manufacturing Engineering,Chifeng University,Chifeng,Inner Mongolia 024000,China;Laboratory of Intelligent Information Processing Technology and System,Tiangong University,Tianjin 300387,China)

机构地区:[1]赤峰学院物理与智能制造工程学院,内蒙古赤峰024000 [2]天津工业大学智能信息处理技术与系统实验室,天津300387

出  处:《传感技术学报》2023年第6期984-989,共6页Chinese Journal of Sensors and Actuators

基  金:内蒙古自治区高等学校科学研究项目(NJZY22199);赤峰学院青年科研基金项目(cfxyqn202104);赤峰市自然科学科研课题项目(SZR21014)。

摘  要:无线传感网络受到空洞攻击时,导致部分节点失效,影响传输数据的安全性和稳定性,为此提出了无线传感网络最佳候选节点空洞攻击抑制方法。选取目标范围内休眠的冗余节点作为最佳候选节点,明确检测空洞攻击的位置。运用加权平均法检测攻击行为,把节点重点标记信息实行加权。分析簇首接收和传输数据的整体能量损耗,令所有簇首的存活周期达到最大,借助构建的空洞抑制模型实现对各种类型攻击的抑制。仿真结果表明,所提方法网络覆盖率高于94%、检测成功率高于87%、虚警率低于4%、分组投递率高于93%。由此可知所提方法抑制空洞攻击的效果较佳,可保证网络正常工作。When wireless sensor networks are attacked by holes,some nodes will fail,which will affect the security and stability of data transmission.Therefore,a hole attack suppression method for the best candidate nodes in wireless sensor networks is proposed.the dormant redundant nodes within the target range and selected as the best candidate nodes to clearly detect the location of hole attacks.The weighted average method is used to detect the attack behavior,and the key marking information of nodes is weighted.The overall energy loss of the cluster head receiving and transmitting data is analyzed to maximize the life cycle of all cluster heads.With the help of the hole suppression model,various types of attacks can be suppressed.Simulation results show that the network coverage rate of the proposed method is higher than 94%,the detection success rate is higher than 87%,the false alarm rate is lower than 4%,and the packet delivery rate is higher than 93%.It can be seen that the proposed method can suppress the hole attack effectively and ensure the normal operation of the network.

关 键 词:无线传感网络 最佳候选节点 空洞攻击 能量分析 特征预测 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象