基于信任估計的惡意節(jié)點檢測策略
發(fā)布時間:2018-03-12 11:58
本文選題:無線傳感器網絡 切入點:信任模型 出處:《西安電子科技大學》2014年碩士論文 論文類型:學位論文
【摘要】:無線傳感器網絡的有限能量和廣播特質使無線傳感器網絡更容易受到攻擊。因此,設計適合無線傳感器網絡特性的安全機制,抵制各種攻擊是確保網絡傳輸可靠數(shù)據的重要問題。目前信任模型已引用到無線傳感器網絡的安全機制中。然而,信任模型的自身缺陷也可成為被攻擊的對象。并且無線傳感器網絡中的惡意節(jié)點還會影響用戶的判斷。針對這些問題本文具體工作如下:首先,提出一種基于信任模型的無線傳感器網絡惡意節(jié)點檢測策略。該策略通過引入指數(shù)衰減因子來刻畫節(jié)點動態(tài)行為的變化,同時將交互失敗信息的比重在信任評估中逐漸增大,使所建立的模型對策略性攻擊具有較強的抵御能力。針對可能存在的惡意推薦問題,通過計算評估節(jié)點和推薦節(jié)點對公共交互節(jié)點的信任評估的平均差來建立推薦可信度,并將其作為推薦信任值的權重以降低惡意推薦的影響。另外,總體信任值評估時,將交互經驗充分性因子作為動態(tài)權重因子來平衡直接和推薦信任值。實驗結果驗證了該策略對網絡中惡意節(jié)點有較強的抵御能力和有較高的準確性。其次,設計了一種基于加權信任估計的惡意節(jié)點檢測策略。該策略先運用雙閾值進行事件檢測,并通過調整雙閾值來權衡事件檢測準確度和事件誤檢率。同時,通過設計一種事件邊界檢測算法來降低對事件邊界節(jié)點及其鄰居的誤判。最終提高惡意節(jié)點檢測率和降低誤判率。仿真實驗驗證了該策略的有效性。
[Abstract]:The limited energy and broadcast characteristics of wireless sensor networks make wireless sensor networks more vulnerable to attack. Resisting all kinds of attacks is an important problem to ensure the transmission of reliable data in the network. At present, the trust model has been referenced in the security mechanism of wireless sensor networks. However, The defects of the trust model can also be the target of attack, and the malicious nodes in the wireless sensor network will also affect the user's judgment. The specific work of this paper is as follows: first of all, This paper proposes a malicious node detection strategy based on trust model in wireless sensor networks, which describes the dynamic behavior of nodes by introducing exponential attenuation factor, and increases the proportion of mutual failure information in trust assessment. The model is able to resist the strategic attack. In view of the possible malicious recommendation problem, the recommendation credibility is established by calculating the average difference between the evaluation node and the recommendation node in the trust evaluation of the common interactive node. It is used as the weight of the recommended trust value to reduce the impact of malicious recommendation. In addition, when the overall trust value is evaluated, The interactive empirical adequacy factor is used as the dynamic weight factor to balance the direct and recommended trust values. The experimental results show that the strategy has strong resistance and accuracy to the malicious nodes in the network. Secondly, A malicious node detection strategy based on weighted trust estimation is designed, in which two thresholds are first used to detect events, and the accuracy of event detection and the false detection rate of events are measured by adjusting double thresholds. An event boundary detection algorithm is designed to reduce the misjudgment of event boundary nodes and their neighbors. Finally, the detection rate of malicious nodes is improved and the false judgment rate is reduced. The simulation results show the effectiveness of the strategy.
【學位授予單位】:西安電子科技大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP212.9;TN915.08
【參考文獻】
相關期刊論文 前1條
1 李小勇;桂小林;;大規(guī)模分布式環(huán)境下動態(tài)信任模型研究[J];軟件學報;2007年06期
,本文編號:1601459
本文鏈接:http://sikaile.net/kejilunwen/wltx/1601459.html
最近更新
教材專著