首页> 外文OA文献 >CMNTS: Catching malicious nodes with trust support in wireless sensor networks
【2h】

CMNTS: Catching malicious nodes with trust support in wireless sensor networks

机译:CmNTs:在无线传感器网络中捕获具有信任支持的恶意节点

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Security in wireless sensor networks is critical due to its way of open communication. In this paper we have considered suite of attacks - packet modification, packet dropping, sybil attack, packet misrouting, and bad mouthing attack, and provided a solution to detect attacks. In literature, many schemes have been proposed to mitigate such attacks but very few detect the malicious nodes effectively and also no single solution detects all attacks. In the proposed approach, each node chooses the parent node for forwarding the packet towards sink. Each node adds its identity and trust on parent as a routing path marker and encrypts only the bytes added by node in packet before forwarding to parent. Sink can identify the malicious node based on trust value and node identities marked in packet. Child node observes the parent and decides the trust on parent based on successful and unsuccessful transactions. Data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node at the beginning of a round based on its own observation on parent. Simulated the algorithm in NS-3 and performance analysis is discussed by comparing the results with other two recently proposed approaches. With the combination of trust factor and fixed path routing to detect malicious activity, simulation results show that proposed method detect malicious nodes efficiently and early, and also with low percentage of false detection.
机译:由于无线传感器网络采用开放式通讯方式,因此其安全性至关重要。在本文中,我们考虑了一系列攻击-数据包修改,数据包丢弃,sybil攻击,数据包错误路由和不良口攻击,并提供了一种检测攻击的解决方案。在文献中,已经提出了许多方案来减轻这种攻击,但是很少有方案可以有效地检测到恶意节点,而且没有一种解决方案可以检测到所有攻击。在提出的方法中,每个节点选择父节点以将分组转发到接收器。每个节点在父节点上添加其身份和信任作为路由路径标记,并仅加密节点在数据包中添加的字节,然后再转发给父节点。接收者可以根据数据包中标记的信任值和节点标识来识别恶意节点。子节点观察父节点,并基于成功和不成功的事务来决定对父节点的信任。数据传输分为多个等长持续时间的回合。每个节点根据自己对父节点的观察在回合开始时选择父节点。通过将结果与最近提出的其他两种方法进行比较,对NS-3中的算法进行了仿真并讨论了性能分析。仿真结果表明,结合信任因子和固定路径路由检测恶意行为,该方法可以有效,早期,低误检测率地检测出恶意节点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号