自动化技术、计算机技术 |
|
|
|
|
无线传感器网络簇内可疑节点的博弈检测方法 |
潘巨龙1,2,李善平1,张道远2 |
1.浙江大学 计算机科学与技术学院, 浙江 杭州 310027;2.中国计量学院 计算机科学与技术系, 浙江 杭州 310018 |
|
Detecting suspicious node within one cluster in wireless sensor network
using game theoretic approach |
PAN Ju-long1,2, LI Shan-ping1, ZHANG Dao-yuan2 |
1. College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China;
2. Department of Computer Science and Technology, China Jiliang University, Hangzhou 310018, China |
[1] 李建中,高宏. 无线传感器网络的研究进展[J]. 计算机研究与发展, 2008,45(1): 1-15.
LI Jianzhong, GAO Hong. Survey on sensor network research [J]. Journal of Computer Research and Development, 2008, 45(1): 1-15.
[2] 汪洋, 林闯, 李泉林, 等. 基于非合作博弈的无线网络路由机制研究[J]. 计算机学报, 2009, 32(1): 54-68.
WANG Yang, LIN Chuang, LI Quanlin , et al. Noncooperative game based research on routing schemes for wireless networks [J]. Journal of Computer, 2009, 32(1): 54-68.
[3] 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M]. 北京:清华大学出版社,2005: 1-100.
[4] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y.A survey on sensor networks [J].IEEE Communications Magazine, 2002, 40(8): 102-114.
[5] KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad Hoc Networks, 2003, 1(2/3): 293-315.
[6] HU Fei, SHARMA N K. Security considerations in ad hoc sensor networks [J]. Ad Hoc Networks, 2005, 3(1): 69-89.
[7] ZHANG Y, LEE W, HUANG Y A. Intrusion detection techniques for mobile wireless networks [J]. Wireless Networks,2003, 9(5): 545-556.
[8] BUCHEGGER S, BOUDEC J Y L. Performance analysis of the CONFIDANT protocol [C]∥ Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking and Computing: Lausanne, Switzerland: ACM,2002:226-236.
[9] AGAH A. A novel game theoretic framework for security in wireless sensor networks [D]. Arlington: The University of Texas at Arlington, 2005: 1-94.
[10] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科技大学, 2009: 1-102.
YANG Feng. Research on the technique of countering malicious nodes in wireless sensor networks [D]. Hefei: University of Science and Technology of China, 2009: 1-102.
[11] 俞波, 杨珉, 王治, 等. 选择传递攻击中的异常丢包检测[J]. 计算机学报, 2006, 29(9): 1542-1552.
YU Bo, YANG Min, WANG Zhi, et al. Identify abnormal packet loss in selective forwarding attacks [J]. Journal of Computer, 2006, 29(9): 1542-1552.
[12] JARAMILLO J J, SRIKANT R. A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks [J]. Ad Hoc Networks, 2010, 8(4):416-429.
[13] REDDY Y B. A game theory approach to detect malicious nodes in wireless sensor networks [C]∥3rd International Conference on Sensor Technologies and Applications. Athens/Glyfada, Greece: IEEE, 2009: 462-468.
[14] HEINZELMAN W B, CHANDRAKASAN A P, BALAKRISHNAN H. An applicationspecific protocol architecture for wireless microsensor networks [J]. IEEE Transactions on Wireless Communications, 2002, 1(4): 660-670.
[15] 王则柯, 李杰. 博弈论教程[M]. 北京:中国人民大学出版社,2004:1-230.
[16] YOUNIS O, FAHMY S. HEED: a hybrid, energyefficient, distributed clustering approach for ad hoc sensor networks [J]. IEEE Transactions on Mobile Computing, 2004, 3(4): 366-379.
[17] 潘巨龙, 李善平,张道远.无线医疗传感器网络中基于Feistel 加密算法研究[J]. 传感技术学报, 2010, 23(7): 1030-1036.
PAN Julong, LI Shanping, ZHANG Daoyuan. A study of two algorithms based on Feistel cipher in wireless medical sensor networks [J]. Chinese Journal of Sensors and Actuators, 2010, 23(7): 1030-1036.
[18] LIU Y, COMANICIU C, MAN H. A Bayesian game approach for intrusion detection in wireless ad hoc networks [C]∥ Proceeding from the 2006 Workshop on Game Theory for Communications and Networks. Pisa: ACM, 2006: 1-12.
[19] JING H, AIDA H. A cooperative game theoretic approach to clustering algorithms for wireless sensor networks [C]∥ Processing in Communications, Computers and Signal. [S.l.]: IEEE, 2009: 140-145.
[20] ABBASI A A, YOUNIS M. A survey on clustering algorithms for wireless sensor networks [J]. Computer Communications, 2007, 30(14/15): 2826-2841. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|