Please wait a minute...
J4  2012, Vol. 46 Issue (1): 72-78    DOI: 10.3785/j.issn.1008-973X.2012.01.12
自动化技术、计算机技术     
无线传感器网络簇内可疑节点的博弈检测方法
潘巨龙1,2,李善平1,张道远2
1.浙江大学 计算机科学与技术学院, 浙江 杭州 310027;2.中国计量学院 计算机科学与技术系, 浙江 杭州 310018
Detecting suspicious node within one cluster in wireless sensor network
using game theoretic approach
PAN Ju-long1,2, LI Shan-ping1, ZHANG Dao-yuan2
1. College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China;
2. Department of Computer Science and Technology, China Jiliang University, Hangzhou 310018, China
 全文: PDF  HTML
摘要:

针对无线传感器网络内部可能存在行为异常的可疑节点问题,在分簇路由协议的基础上,采用博弈方法通过簇内多个邻居节点对某一可疑节点进行判定,邻居节点产生的检测结果传输至簇头进行汇总. 簇头节点统计结果并采用多数投票方式对可疑节点进行判定. 为了保证数据传输的安全性,采用对称加密算法对各检测节点判定结果进行加密.若可疑节点是恶意节点,则该判定结果将在簇内广播,以达到隔离可疑节点的目的. 为了更符合实际环境,在博弈模型判定时,考虑攻防双方节点的能量消耗.实验结果表明,该多检测节点方案能够较好地分析无线传感器网络中可疑入侵节点和检测系统之间的博弈关系,提高了对可疑节点判定的准确性.

Abstract:

A new method using game theoretic approach with multiple detecting nodes within one cluster was proposed after clusters were formed by using low-energy adaptive clustering hierarchy(LEACH)-C router protocol in order to detect and distinguish suspicious nodes in wireless sensor network. A suspicious node in a cluster is determined as malicious or normal one by the cluster-head using majority voting principle after all its neighbor’s decisions are collected. A symmetrical encryption algorithm is used to secure the neighbor’s result transmission. If the suspicious node is malicious, the final detecting result will be broadcasted to all nodes within this cluster and the suspicious one will be isolated in order to decrease the risk of invasion. The energy consume of both attacker and defender in the game is considered to fit the wireless sensor network environment. Experimental results show that the multiple detecting nodes scheme is feasible and effective to use game theoretic approach in wireless sensor network, and the detection precision is promoted.

出版日期: 2012-02-22
:  TP 393  
基金资助:

国家自然科学基金资助项目(60773180).

通讯作者: 李善平,男,教授.     E-mail: shan@zju.edu.cn
作者简介: 潘巨龙(1965-),男,教授,从事无线传感器网络安全、嵌入式计算等研究. E-mail:pjl@cjlu.edu.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  

引用本文:

潘巨龙,李善平,张道远. 无线传感器网络簇内可疑节点的博弈检测方法[J]. J4, 2012, 46(1): 72-78.

PAN Ju-long, LI Shan-ping, ZHANG Dao-yuan. Detecting suspicious node within one cluster in wireless sensor network
using game theoretic approach. J4, 2012, 46(1): 72-78.

链接本文:

http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2012.01.12        http://www.zjujournals.com/eng/CN/Y2012/V46/I1/72

[1] 李建中,高宏. 无线传感器网络的研究进展[J]. 计算机研究与发展, 2008,45(1): 1-15.
LI Jianzhong, GAO Hong. Survey on sensor network research [J]. Journal of Computer Research and Development, 2008, 45(1): 1-15.
[2] 汪洋, 林闯, 李泉林, 等. 基于非合作博弈的无线网络路由机制研究[J]. 计算机学报, 2009, 32(1): 54-68.
WANG Yang, LIN Chuang, LI Quanlin , et al. Noncooperative game based research on routing schemes for wireless networks [J]. Journal of Computer, 2009, 32(1): 54-68.
[3] 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M]. 北京:清华大学出版社,2005: 1-100.
[4] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y.A survey on sensor networks [J].IEEE Communications Magazine, 2002, 40(8): 102-114.
[5] KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad Hoc Networks, 2003, 1(2/3): 293-315.
[6] HU Fei, SHARMA N K. Security considerations in ad hoc sensor networks [J]. Ad Hoc Networks, 2005, 3(1): 69-89.
[7] ZHANG Y, LEE W, HUANG Y A. Intrusion detection techniques for mobile wireless networks [J]. Wireless Networks,2003, 9(5): 545-556.
[8] BUCHEGGER S, BOUDEC J Y L. Performance analysis of the CONFIDANT protocol [C]∥ Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking and Computing:   Lausanne, Switzerland:  ACM,2002:226-236.
[9] AGAH A. A novel game theoretic framework for security in wireless sensor networks [D]. Arlington: The University of Texas at Arlington, 2005: 1-94.
[10] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科技大学, 2009: 1-102.
YANG Feng. Research on the technique of countering malicious nodes in wireless sensor networks [D]. Hefei: University of Science and Technology of China, 2009: 1-102.
[11] 俞波, 杨珉, 王治, 等. 选择传递攻击中的异常丢包检测[J]. 计算机学报, 2006, 29(9): 1542-1552.
YU Bo, YANG Min, WANG Zhi, et al. Identify abnormal packet loss in selective forwarding attacks [J]. Journal of Computer, 2006, 29(9): 1542-1552.
[12] JARAMILLO J J, SRIKANT R. A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks [J]. Ad Hoc Networks, 2010, 8(4):416-429.
[13] REDDY Y B. A game theory approach to detect malicious nodes in wireless sensor networks [C]∥3rd International Conference on Sensor Technologies and Applications. Athens/Glyfada, Greece: IEEE,  2009: 462-468.
[14] HEINZELMAN W B, CHANDRAKASAN A P, BALAKRISHNAN H. An applicationspecific protocol architecture for wireless microsensor networks [J]. IEEE Transactions on Wireless Communications, 2002, 1(4): 660-670.
[15] 王则柯, 李杰. 博弈论教程[M]. 北京:中国人民大学出版社,2004:1-230.
[16] YOUNIS O, FAHMY S. HEED: a hybrid, energyefficient, distributed clustering approach for ad hoc sensor networks [J]. IEEE Transactions on Mobile Computing, 2004, 3(4): 366-379.
[17] 潘巨龙, 李善平,张道远.无线医疗传感器网络中基于Feistel 加密算法研究[J]. 传感技术学报, 2010, 23(7): 1030-1036.
PAN Julong, LI Shanping, ZHANG Daoyuan. A study of two algorithms based on Feistel cipher in wireless medical sensor networks [J]. Chinese Journal of Sensors and Actuators, 2010, 23(7): 1030-1036.
[18] LIU Y, COMANICIU C, MAN H. A Bayesian game approach for intrusion detection in wireless ad hoc networks [C]∥ Proceeding from the 2006 Workshop on Game Theory for Communications and Networks. Pisa: ACM, 2006: 1-12.
[19] JING H, AIDA H. A cooperative game theoretic approach to clustering algorithms for wireless sensor networks [C]∥ Processing in Communications, Computers and Signal. [S.l.]: IEEE, 2009: 140-145.
[20] ABBASI A A, YOUNIS M. A survey on clustering algorithms for wireless sensor networks [J]. Computer Communications, 2007, 30(14/15): 2826-2841.

[1] 李德骏,汪港,杨灿军,金波,陈燕虎. 基于NTP和IEEE1588海底观测网时间同步系统[J]. J4, 2014, 48(1): 1-7.
[2] 郭童,林峰. 基于混合遗传鱼群算法的贝叶斯网络结构学习[J]. J4, 2014, 48(1): 130-135.
[3] 杜瑞忠, 田俊峰, 张焕国. 基于信任和个性偏好的云服务选择模型[J]. J4, 2013, 47(1): 53-61.
[4] 张帅,孙建伶,徐斌,黄超,KAVS Aleksander J.. 基于RBAC的跨多企业服务组合访问控制模型[J]. J4, 2012, 46(11): 2035-2043.
[5] 陈岁生,卢建刚,楼晓春. 基于MDS-MAP和非线性滤波的WSN定位算法[J]. J4, 2012, 46(5): 866-872.
[6] 杨朝晖,李善平,林欣. 增量型上下文信息服务的质量优化实时调度[J]. J4, 2012, 46(1): 90-97.
[7] 高庆,李善平,杨朝晖. 基于虚拟场的能量高效传感器网络地理路由[J]. J4, 2012, 46(1): 98-104.
[8] 钱剑锋, 尹建伟, 董金祥. 结构化P2P网络的语义发布/订阅系统
负载均衡算法
[J]. J4, 2011, 45(10): 1710-1719.
[9] 杨朝晖,李善平,林欣. LBS中面向K-匿名服务资源约束的匿名度调节算法[J]. J4, 2011, 45(7): 1154-1160.
[10] 潘纲, 李石坚, 陈云星. ScudContext:信息-物理空间融合的大规模
环境上下文服务
[J]. J4, 2011, 45(6): 991-998.
[11] 车建华, 何钦铭, 陈建海, 王备. 基于软件模拟的虚拟机系统故障插入工具[J]. J4, 2011, 45(4): 614-620.
[12] 李鉴庭,金心宇,唐军,张昱. 基于无线多媒体传感器网络的目标定位方法[J]. J4, 2011, 45(1): 45-49.
[13] 张莉苹,潘纲,郑能干,杨国青,李红,赵民德. SmartC模型与代码一致性双向生成方法及开发平台[J]. J4, 2011, 45(1): 20-29.
[14] 舒挺, 孙守迁,王海宁,徐伟强. ESIS序列自适应生成算法[J]. J4, 2010, 44(11): 2183-2187.
[15] 陈友荣, 俞立, 董齐芬, 洪榛. 基于近邻算法的无线传感器网络功率控制[J]. J4, 2010, 44(7): 1321-1326.