论文:2020,Vol:38,Issue(3):634-642
引用本文:
滕志军, 庞宝贺, 孙铭阳, 谢露莹, 郭力文. 基于环境参数优化和时间信誉序列的恶意节点识别模型[J]. 西北工业大学学报
TENG Zhijun, PANG Baohe, SUN Mingyang, XIE Luying, GUO Liwen. Model for Malicious Node Recognition Based on Environmental Parameter Optimization and Time Reputation Sequence[J]. Northwestern polytechnical university

基于环境参数优化和时间信誉序列的恶意节点识别模型
滕志军1,2, 庞宝贺2, 孙铭阳3, 谢露莹2, 郭力文4
1. 东北电力大学 现代电力系统仿真控制与绿色电能新技术教育部重点实验室, 吉林 吉林 132012;
2. 东北电力大学 电气工程学院, 长春 吉林 132012;
3. 东北电力大学 自动化工程学院, 吉林 吉林 132012;
4. 爱立信(西安)信息通信技术服务有限公司大连分公司, 辽宁 大连 116000
摘要:
在复杂无线传感器网络环境中,为阻断恶意节点发动危及网络安全的中断攻击和选择性转发攻击,在TS-BRS信誉模型的基础上,搭建基于MNRT-OEP&RS的恶意节点识别模型,利用机器学习中的线性回归并结合节点能量、工作量、邻节点数量、节点疏松度等可确定参数求解环境参数,计算基准信誉序列与周期内的节点信誉序列的相似度;设定动态信誉双阈值,对节点的信息转发行为进行动态考量,以甄别恶意节点。仿真实验表明,改进后的算法对恶意节点的识别率可达90%以上,对正常节点误判率降低到8%以下,有效提高复杂环境下无线传感器网络的安全性。
关键词:    无线传感器网络    网络安全    环境影响    线性回归    动态信誉双阈值   
Model for Malicious Node Recognition Based on Environmental Parameter Optimization and Time Reputation Sequence
TENG Zhijun1,2, PANG Baohe2, SUN Mingyang3, XIE Luying2, GUO Liwen4
1. Northeast Electric Power University, Key Laboratory of Modern Power System Simulation and Control&Renewable Energy Technology, Ministry of Education, Jilin 132012, China;
2. School of Electrical Engineering, Northeast Electric Power University, Jilin 132012, China;
3. School of Automation Engineering, Northeast Electric Power University, Jilin 132012, China;
4. Ericsson(Xi'an) Information and Communication Technology Service Co., Ltd. Dalian Branch, Dalian 116000, China
Abstract:
Wireless sensor network (WSN) works in a complex environment. To interdict the malicious nodes which attacks the safety of network, such as interrupt attacks and selective forwarding attacks, based on TS-BRS reputation model, a model for malicious node identification based on MNRT-OEP&RS algorithm is constructed. Using the linear regression of machine learning and combining the energy of nodes, data volume, number of adjacent nodes, the node sparsity and other deterministic parameters can solve environmental parameters. Then the similarity of between the benchmark reputation sequence and cycle reputation sequence sets the dynamic reputation double threshold are calculated in order to identify the malicious nodes by dynamically considering the information forwarding behavior. The simulated results show that the improved algorithm can guarantee the security of wireless sensor networks in complex environments effectively with above 90% recognition of malicious nodes and below 8% false positive rate.
Key words:    wireless senor network    network security    environmental impact    linear regression    dynamic reputation double threshold   
收稿日期: 2019-07-08     修回日期:
DOI: 10.1051/jnwpu/20203830634
基金项目: 国家自然科学基金青年科学基金项目(61501107)及吉林省教育厅"十三五"科学研究规划项目(JJKH20180439KJ)资助
通讯作者:     Email:
作者简介: 滕志军(1973-),东北电力大学教授,主要从事无线通信技术与物联网网络安全研究。
相关功能
PDF(1557KB) Free
打印本文
把本文推荐给朋友
作者相关文章
滕志军  在本刊中的所有文章
庞宝贺  在本刊中的所有文章
孙铭阳  在本刊中的所有文章
谢露莹  在本刊中的所有文章
郭力文  在本刊中的所有文章

参考文献:
[1] 王夙喆,李勇,程伟, 等. 传感器网络定位中节点攻击类型的分布式识别算法[J]. 西北工业大学学报, 2016, 34(1):85-91 WANG Suzhe, LI Yong, CHENG Wei, et al. Distributed Localization Attack Type Recognition Algorithm for Malicious Nodes in Wireless[J]. Journal of Northwestern Polytechnical University, 2016, 34(1):85-91(in Chinese)
[2] 韩挺,罗守山,辛阳,等. 面向MANET路由的多属性动态信任模型[J]. 北京邮电大学学报, 2013, 36(5):86-89,104 HAN Ting, LUO Shoushan, XIN Yang, et al. Dynamic Trust Model with Multiple Decision Factors in MANET[J]. Journal of Beijing University of Posts and Telecommunications, 2013, 36(5):86-89, 104(in Chinese)
[3] OSANAIYE O, ALFA A S, HANCKE G P. Denial of Service(DoS) Defence for Resource Availability in Wireless Sensor Networks[J]. IEEE Access, 2018, 6:6975-7004
[4] 王硕鹏. 基于数据挖掘系统网络安全模型预测分析[J]. 东北电力大学学报, 2019, 39(6):91-93 WANG Shuopeng. Prediction and Analysis of Systemic Network Security Model Based on Data Mining[J]. Journal of Northeast Electric Power University, 2019, 39(6):91-93(in Chinese)
[5] ELSHRKAWEY M, ELSHERIF S M, ELSAYED WAHED M. An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Networks[J]. Journal of King Saud University-Computer and Information Sciences, 2018, 30(2):259-267
[6] YU Y, LI K, ZHOU W, et al. Trust Mechanisms in Wireless Sensor Networks:Attack Analysis and Countermeasures[J]. Journal of Network and Computer Applications, 2012, 35(3):867-880
[7] 徐晓斌,张光卫,王尚广, 等. 基于群体信任的WSN异常数据过滤方法[J]. 通信学报, 2014, 35(5):108-117,123 XU Xiaobin, ZHANG Guangwei, WANG Shangguang, et al. Abnormal Data Filtering Approach Based on Collective Trust for WSN[J]. Journal on Communications, 2014, 35(5):108-117(in Chinese)
[8] 曲朝阳,宋晨晨,任有学,等. 结合用户活跃度的协同过滤推荐算法[J]. 东北电力大学学报, 2017, 37(5):74-79 QU Zhaoyang, SONG Chenchen, REN Youxue, et al. Recommendations Based on Collaborative Filtering by User Activity[J]. Journal of Northeast Electric Power University, 2017, 37(5):74-79(in Chinese)
[9] GANERIWAL S, SRIVASTAVA M. Reputation-Based Framework for High Integrity Sensor Networks[C]//Proceeding of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, 2004:66-77
[10] ISHMANOV F, KIM S, NAM S. A Secure Trust Establishment Scheme for Wireless Sensor Networks[J]. Sensors, 2014, 14(1):1877-1897
[11] ISHMANOV F, KIM S, NAM S. A Robust Trust Establishment Scheme for Wireless Sensor Networks[J]. Sensors, 2015, 15(3):7040-7061
[12] OUYANG Xi, TIAN Bin, LI Dong, et al. A Novel Hierarchical Reputation Model for Wireless Sensor Networks[J]. International Journal of Digital Content Technology and its Applications, 2012, 6(10):61-69
[13] 张琳,尹娜,王汝传. 无线传感网中基于DPAM-MD算法的恶意节点识别研究[J]. 通信学报, 2015, 36(增刊1):53-59 ZHANG Lin, YIN Na, WANG Ruchuan. Research of Malicious Nodes Identification Based on DPAM-DM Algorithm for WSN[J]. Journal on Communications, 2015, 36(suppl 1):53-59(in Chinese)
[14] ZHANG Z, ZHU H, LUO S, et al. Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks[J]. IEEE Access, 2017, 5(99):12088-12102
[15] TAYYAB Khan, KARAN Singh, LE Hoang Sona, et al. A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks[J]. IEEE Access, 2019, 7:58221-58240
[16] SAHOO R R, RAY S, SARKAR S, et al. Guard Against Trust Management Vulnerabilities in Wireless Sensor Network[J]. Arabian Journal for Science & Engineering, 2018, 43(12):7229-7251
[17] SINGH M, SARDAR A R, MAJUMDER K, et al. A Lightweight Trust Mechanism and Overhead Analysis for Clustered WSN[J]. IETE Journal of research, 2017, 63(3):297-308
[18] TARIQ N, ASIM M, MAAMAR Z, et al. A Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Sensor Node-Powered IOT[J]. Journal of Parallel and Distributed Computing, 2019, 134:198-206
[19] WU X, HUANG J, LING J, et al. BLTM:Beta and LQI Based Trust Model for Wireless Sensor Networks[J]. IEEE Access, 2019, 7:43679-43690
[20] 滕志军,郭力文,吕金玲,等. 基于时序信息分析的WSN贝叶斯信誉评价模型[J]. 郑州大学学报, 2019, 40(1):38-43 TENG Zhijun, GUO Liwen, LYU Jinling, et al. WSN Bayes Reputation Evaluation Model Based on Time Series Information Analysis[J]. Journal of Zhengzhou University, 2019, 40(1):38-43(in Chinese)
[21] 李云,于季弘,尤肖虎. 资源受限的机会网络节点激励策略研究[J]. 计算机学报, 2013, 36(5):947-956 LI Yun, YU Jihong, YOU Xiaohu. An Incentive Protocol for Opportunistic Networks with Resources Constraint[J]. Chinese Journal of Computers, 2013, 36(5):947-956(in Chinese)
[22] 杨静,李无忧,闫俊杰,等. 串谋行为识别的间断连接无线网络数据转发机制[J]. 系统工程与电子技术, 2017, 39(11):2571-2579 YANG Jing, LI Wuyou, YAN Junjie, et al. Collision Behavior Recognizing Data Forwarding for Intermittently Connected Wireless Network[J]. Systems Engineering and Electronics, 2017, 39(11):2571-2579(in Chinese)
[23] HEINZELMAN W R, CHANDRAKASAN A, BALAKRISHNAN H. Energy-Efficient Communication Protocol for Wireless Microsensor Networks[C]//Proceedings of the 3rd Annual Hawaii International Conference on System Sciences, Hawaii, USA, 2000:1-10
[24] SIDDIQUI S, GHANI S, KHAN A A. PD-MAC:Design and Implementation of Polling Distribution-Mac for Improving Energy Efficiency of Wireless Sensor Networks[J]. International Journal of Wireless Information Networks, 2018, 25(1):1-9
[25] BAO F, CHEN I R, CHANG M J, et al. Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection[J]. IEEE Trans on Network & Service Management, 2012, 9(2):169-183