首页> 外文会议>2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery >Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust
【24h】

Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust

机译:基于信任的无线传感器网络反击方法

获取原文
获取外文期刊封面目录资料

摘要

This article discusses the development of methodology of countering attacks based on the use of Bayes' theorem and normal distribution, where the workload, node residual energy, as well as an analysis of successful and unsuccessful network events used to compute the trust level. Estimation of the workload and the residual energy allows detecting attacks such as "Denial of Service", "Sybil" attacks directed on depletion of host resources. Direct trust calculation allows detecting "Black hole", "Grey hole" and "Wormhole" attacks. For the implementation of this methodology the software that can be installed on the base station and the network nodes was developed.
机译:本文讨论了基于贝叶斯定理和正态分布的反攻击方法的发展,其中工作量,节点剩余能量以及用于计算信任级别的成功和失败网络事件的分析。估计工作负载和剩余能量可以检测到针对主机资源耗尽的攻击,例如“拒绝服务”,“ Sybil”攻击。直接信任计算允许检测“黑洞”,“灰洞”和“蠕虫”攻击。为了实施该方法,开发了可以安装在基站和网络节点上的软件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号