首页> 外文期刊>Journal of ambient intelligence and humanized computing >A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks
【24h】

A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks

机译:基于物种的防御技术,以确定多跳无线传感器网络中的恶性选择性转发攻击

获取原文
获取原文并翻译 | 示例

摘要

Multi-hop wireless sensor networks are being implemented in various domains. The collected data are used to make important decisions for censorious infrastructures. Data are processed by a huge quantity of sensor nodes as well as handled on intermediate nodes which are known as hops on the way to the Base Station (BS) which performs the resolution accomplishing. Information have been collected from various sources and intermediate hopes will process and aggregate information. A malevolent opponent may interfere through the information via proposing extra node within the web infrastructure. There are chances to compromising the existing nodes. Malevolent Selective Forwarding attacks are most important protection problem toward the information forwarding within wireless sensor networks (WSN), as this might hinder broadcast of susceptible information as well as it reduces network throughput. Assuring data trustworthiness in this situation has been critical in support of accurate resolution accomplishing. Information provenance signifies a main aspect into analyzing the trustworthiness of wireless sensor data. In this paper we introduce a provenance based technique to determine the attack. Three phases are there in this scheme, detecting packet-loss in the first phase, second phase dealing with identifying attacked sensor node and isolating malevolent sensor node in the third phase. We have included the detailedanalysis of the investigational outcomes for showing the accurateness as well as effectiveness of the proposed system.
机译:多跳无线传感器网络正在各种域中实现。收集的数据用于对缩义基础设施进行重要决策。数据由大量的传感器节点处理以及处理在向基站(BS)上的中间节点上处理的中间节点处理,该频率在于执行分辨率完成的基站(BS)。已从各种来源收集信息,中间希望将处理和汇总信息。恶意对手可能会通过在Web基础架构内提出额外节点来干扰信息。有机会损害现有节点。恶意选择性转发攻击是无线传感器网络(WSN)内信息转发的最重要的保护问题,因为这可能会阻碍易感信息的广播以及降低网络吞吐量。确保这种情况的数据可靠性对于支持准确的解决方案至关重要。信息出处意味着分析无线传感器数据可信度的主要方面。在本文中,我们介绍了一种基于物种的技术来确定攻击。在该方案中存在三个阶段,检测第一阶段中的分组丢失,第二阶段处理识别攻击传感器节点并在第三阶段中隔离恶性传感器节点。我们已经包括对拟议系统的准确性以及有效性的调查结果的详细分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号