天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

物聯(lián)網(wǎng)可信感知與識別關(guān)鍵技術(shù)研究

發(fā)布時間:2018-01-22 23:20

  本文關(guān)鍵詞: 物聯(lián)網(wǎng) 無線傳感器網(wǎng)絡(luò) 可信感知 惡意節(jié)點 虛假數(shù)據(jù)攻擊 出處:《長沙理工大學(xué)》2014年碩士論文 論文類型:學(xué)位論文


【摘要】:近年來,物聯(lián)網(wǎng)受到各界廣泛的關(guān)注,作為一種新型的泛在網(wǎng)絡(luò),物聯(lián)網(wǎng)感知層相比于其他網(wǎng)絡(luò),對物理世界具有更深層次、更廣范圍的接觸的特點。因此,感知獲得的數(shù)據(jù)具有“異構(gòu)、實時、分布、海量”的特點。通過無線傳感器獲取數(shù)據(jù)技術(shù)是物聯(lián)網(wǎng)感知層所采用的關(guān)鍵技術(shù)之一。感知數(shù)據(jù)的可靠性、有效性、安全性及穩(wěn)定性是物聯(lián)網(wǎng)感知層領(lǐng)域的研究熱點和難點。本文在總體介紹物聯(lián)網(wǎng)的發(fā)展背景、相關(guān)理論及應(yīng)用的基礎(chǔ)上,從物聯(lián)網(wǎng)可信感知技術(shù)入手,介紹了無線傳感器網(wǎng)絡(luò)的特點,并將無線傳感器網(wǎng)絡(luò)與傳統(tǒng)網(wǎng)絡(luò)進行對比,分析無線傳感器網(wǎng)絡(luò)安全問題的特點以及目前常見的安全防御思想;同時,重點介紹了無線傳感器網(wǎng)絡(luò)易遭受的攻擊類型,對目前業(yè)界提出的經(jīng)典算法進行了總結(jié)與歸納,并對這些經(jīng)典算法的優(yōu)點與不足進行了分析。針對Hur算法容納度低、所需先驗知識多,提出對特征節(jié)點分析的惡意節(jié)點檢測算法(DAFNA)。該算法首先對事件源的能量值估計,且在此過程中過濾保留良性特征節(jié)點;然后以特征節(jié)點為參照建立坐標(biāo)系,通過分析待檢測節(jié)點與事件源的距離計算值與距離感知值之間的差異,進行惡意節(jié)點的判斷;最后通過仿真實驗,對該算法性能進行分析,并與Hur算法對比,得出DAFNA算法所需先驗知識少,惡意節(jié)點容納度比Hur算法更好。此外,本文針對虛假數(shù)據(jù)攻擊還提出基于三角形內(nèi)點幾何性質(zhì)的判斷算法。首先將感知節(jié)點排序成能量值序列,并由判斷節(jié)點的后續(xù)點對構(gòu)造一系列三角形的集合;然后分別提取出各三角形內(nèi)點能量感知最小值,重新構(gòu)成集合,另外提出可信度函數(shù),根據(jù)三角形內(nèi)點性質(zhì)與可信度函數(shù)提出對提供偏小值的惡意節(jié)點判斷依據(jù),同時,通過分析三角形內(nèi)點能量感知最小值集合,根據(jù)三角形內(nèi)點性質(zhì),也能得到對提供偏大值的惡意節(jié)點判斷依據(jù);最后,通過仿真實驗,對該算法進行性能分析。
[Abstract]:In recent years, the Internet of things has received extensive attention from all walks of life. As a new type of ubiquitous network, the perception layer of the Internet of things has the characteristics of deeper and wider contact to the physical world than other networks. Perceptual data has the characteristics of "heterogeneous, real-time, distributed and massive". Data acquisition through wireless sensors is one of the key technologies used in the perception layer of the Internet of things. The reliability and effectiveness of perceptual data. Security and stability are the hot and difficult points in the field of Internet of things perception layer. This paper introduces the background of the development of the Internet of things, related theories and applications, and starts with the trusted perception technology of the Internet of things. This paper introduces the characteristics of wireless sensor networks, compares wireless sensor networks with traditional networks, analyzes the characteristics of security problems in wireless sensor networks and the current common security defense ideas. At the same time, the emphasis is placed on the types of attacks that wireless sensor networks are vulnerable to, and the classical algorithms proposed by the industry are summarized and summarized. The advantages and disadvantages of these classical algorithms are analyzed. Aiming at the low capacity of Hur algorithm, the prior knowledge is much needed. A malicious node detection algorithm for feature node analysis is proposed. Firstly, the energy value of event source is estimated, and the benign feature nodes are filtered and retained in the process. Then using the characteristic node as reference to establish the coordinate system, by analyzing the difference between the distance calculation value and the distance perception value between the detected node and the event source, the malicious node can be judged. Finally, through the simulation experiment, the performance of the algorithm is analyzed, and compared with the Hur algorithm, it is concluded that the DAFNA algorithm requires less prior knowledge, and the tolerance of malicious nodes is better than that of the Hur algorithm. In this paper, a judgment algorithm based on geometric properties of interior points of a triangle is proposed for false data attacks. Firstly, the perceptual nodes are sorted into a sequence of energy values, and a series of triangles are constructed by the subsequent points of the judgment nodes. Then, the minimum energy perception of each triangle is extracted, and the set is reconstituted, and the credibility function is proposed. According to the properties of interior points and credibility function of triangles, the judgment basis of malicious nodes providing smaller values is put forward. At the same time, by analyzing the set of minimum values of energy perception in triangles, and according to the properties of interior points of triangles. We can also get the judgment basis of the malicious node which provides the larger value; Finally, the performance of the algorithm is analyzed by simulation experiments.
【學(xué)位授予單位】:長沙理工大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP391.44;TN929.5

【參考文獻】

相關(guān)期刊論文 前2條

1 任豐原,黃海寧,林闖;無線傳感器網(wǎng)絡(luò)[J];軟件學(xué)報;2003年07期

2 王立平;席曉鵬;趙進;;基于RFID技術(shù)的高速公路不停車收費系統(tǒng)[J];現(xiàn)代電子技術(shù);2012年03期

,

本文編號:1456010

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/1456010.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶2e8cb***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com