无线网络传输数据节点入侵优化检测仿真
[Abstract]:Accurate detection of wireless network transmission data node intrusion can ensure the safe operation of wireless network. When the intrusion detection is carried out, the node behavior should be quantified and compared with the reputation value of the network node by using the pre-set reputation threshold to complete the detection. However, the traditional method analyzes the spontaneous critical state of variables in a certain area of wireless network, and finds out the most vulnerable network nodes to complete intrusion detection. However, it is impossible to compare the creditworthiness threshold of the node to be detected with the reputation value of the normal network node, which reduces the accuracy of intrusion detection. A wireless network transmission data node intrusion detection method based on reputation mechanism is proposed. Firstly, the behavior attributes of wireless network nodes are analyzed. After quantizing the data such as packet loss rate and transfer rate of nodes, a model is built to analyze the different attributes of different nodes. Then, the different attribute nodes are analyzed and judged by the established reputation mechanism, then the behavior of the nodes is quantified and compared with the reputation value of the network node by the pre-set reputation threshold. The relationship between the reputation value of the detected node and the pre-set threshold is determined, and whether the node is abnormal or not is detected. The simulation results show that compared with the traditional threshold method of reputation mechanism, the improved method can effectively detect the node intrusion status and provide support for the safe use of network data.
【作者单位】: 武汉科技大学计算机科学与技术学院;华中科技大学计算机学院;
【分类号】:TN915.08
【相似文献】
相关期刊论文 前10条
1 白杨;别红霞;;无线传感网数据回收管理软件设计[J];软件;2013年01期
2 黄骏虎;虞慧群;;一种基于信誉的P2P的评价模型[J];计算机科学;2011年S1期
3 陈旭;;利用APOLLO机的图形功能检查有限元节点数据[J];水电站设计;1989年04期
4 陶勇;龚正虎;;一种节点权重自适应调整的DTN拥塞控制[J];计算机工程与科学;2013年01期
5 李拥军;谢嵘;谭晓青;;基于冲突指示和分组隐藏节点冲突解析策略[J];软件学报;2014年06期
6 裴文彬;陶彦辉;魏振春;冯琳;;WSAN中基于节点分区的能耗均衡路由协议[J];合肥工业大学学报(自然科学版);2013年11期
7 张海亮;曾建潮;宋卫平;;一种基于WSN的目标跟踪节点唤醒策略[J];太原科技大学学报;2009年04期
8 张凯;沙锋;;一种基于三角校验碰撞预测的ZigBee网络防冲突机制[J];河南师范大学学报(自然科学版);2012年03期
9 郭英慧;刘云;程子栋;;基于移动节点的改进扩充口令协议[J];科技创新导报;2010年29期
10 张胜;杨郑龙;曹凯英;;TelosB节点的串口双向传输技术研究[J];南昌航空大学学报(自然科学版);2013年03期
相关硕士学位论文 前3条
1 王婧;WIDOSNet节点数据管理器的研究与设计[D];沈阳理工大学;2008年
2 罗辉琼;基于P2P的VOD服务体系研究[D];华南师范大学;2007年
3 李星;大规模网络拓扑节点数据监测与管理系统研究[D];长安大学;2013年
,本文编号:2445655
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2445655.html