期刊检索

  • 2024年第56卷
  • 2023年第55卷
  • 2022年第54卷
  • 2021年第53卷
  • 2020年第52卷
  • 2019年第51卷
  • 2018年第50卷
  • 2017年第49卷
  • 2016年第48卷
  • 2015年第47卷
  • 2014年第46卷
  • 2013年第45卷
  • 2012年第44卷
  • 2011年第43卷
  • 2010年第42卷
  • 第1期
  • 第2期

主管单位 中华人民共和国
工业和信息化部
主办单位 哈尔滨工业大学 主编 李隆球 国际刊号ISSN 0367-6234 国内刊号CN 23-1235/T

期刊网站二维码
微信公众号二维码
引用本文:滕志军,杜春秋,孙汇阳,李梦,王艳娇.融合节点信誉度和路径跳数的WSNs虫洞攻击检测策略[J].哈尔滨工业大学学报,2021,53(8):64.DOI:10.11918/202101035
TENG Zhijun,DU Chunqiu,SUN Huiyang,LI Meng,WANG Yanjiao.A wormhole attack detection strategy integrating node creditworthiness and path hops in WSNs[J].Journal of Harbin Institute of Technology,2021,53(8):64.DOI:10.11918/202101035
【打印本页】   【HTML】   【下载PDF全文】   查看/发表评论  下载PDF阅读器  关闭
过刊浏览    高级检索
本文已被:浏览 979次   下载 1174 本文二维码信息
码上扫一扫!
分享到: 微信 更多
融合节点信誉度和路径跳数的WSNs虫洞攻击检测策略
滕志军1,2,杜春秋2,孙汇阳3,李梦2,王艳娇1,2
(1.现代电力系统仿真控制与绿色电能新技术教育部重点实验室(东北电力大学),吉林 吉林 132012; 2.东北电力大学 电气工程学院,吉林 吉林 132012;3.北京电子科技学院 密码科学与技术系,北京 100070)
摘要:
为抵御无线传感器网络中的虫洞攻击,提高网络性能。本文根据虫洞攻击下节点邻居数目出现的异常情况,对邻居数目超出阈值的可疑节点进行筛选,然后令其专有邻居集中的节点相互通信,记录路径跳数,将跳数超出虫洞阈值的路径标记为待测路径;借助贝叶斯信誉模型计算该待测路径上中间节点的直接信任值,并结合邻居数目、处理延时、节点能量、包转发率等信任因素对节点的间接信任值进行评判,进而获得该节点的综合信任值;通过将路径跳数与中间节点的综合信任相结合,计算待测路径的路径信任评价量,并依据受虫洞攻击节点的路径特性合理设定信任阈值,提出一种融合节点信誉度和路径跳数的虫洞攻击检测策略(wormhole attack detection strategy integrating node creditworthiness and path hops,WADS-NC&PH),以检测无线传感器网络中的虫洞攻击。仿真结果表明,WADS-NC&PH对虫洞攻击的检测具有显著效果,即使面对高攻击度的网络,该策略仍能有效检出虫洞攻击并移除虚假链路,提高无线传感器网络的安全性和可靠性。
关键词:  无线传感器网络  虫洞攻击  路径跳数  虫洞阈值  信誉模型  信任阈值
DOI:10.11918/202101035
分类号:TN92
文献标识码:A
基金项目:国家自然科学基金青年科学基金(61501107)
A wormhole attack detection strategy integrating node creditworthiness and path hops in WSNs
TENG Zhijun1,2,DU Chunqiu2,SUN Huiyang3,LI Meng2,WANG Yanjiao1,2
(1.Key Laboratory of Modern Power System Simulation and Control & Renewable Energy Technology (Northeast Electric Power University), Ministry of Education, Jilin 132012, Jilin, China; 2.School of Electrical Engineering, Northeast Electric Power University, Jilin 132012, Jilin, China; 3. Department of Cryptography Science and Technology, Beijing Electronic Science and Technology Institute, Beijing 100070, China)
Abstract:
To resist the wormhole attacks in wireless sensor networks (WSNs) and improve network performance, a wormhole attack detection strategy integrating node creditworthiness and path hops (WADS-NC&PH) was proposed. Based on the abnormal situations of the neighbor number of the nodes under wormhole attacks, the suspicious nodes whose neighbor number exceeded the threshold were screened, and the nodes in their exclusive neighbor set were allowed to communicate with each other. The number of path hops was recorded, and the path whose number of hops exceeded the wormhole threshold was marked as the path to be tested. The Bayesian trust model was utilized to calculate the direct trust value of the intermediate node on the path to be tested, and combined with the trust factors such as the number of neighbors, processing delay, node energy, and packet forwarding rate, the indirect trust value of the node was judged, thereby obtaining the comprehensive trust value of the node. By integrating the number of path hops with the comprehensive trust of intermediate nodes, the path trust evaluation of the path to be tested was calculated. Based on the path characteristics of the nodes attacked by wormholes, the trust threshold was set reasonably, and WADS-NC&PH was proposed to detect wormhole attacks in WSNs. Simulation results show that WADS-NC&PH had a significant effect on the detection of wormhole attacks. Even in the face of highly attacked networks, this strategy could still effectively detect wormhole attacks and remove false links, improving the security and reliability of WSNs.
Key words:  wireless sensor networks (WSNs)  wormhole attack  path hops  wormhole threshold  trust model  trust threshold

友情链接LINKS