Malicious nodes detection algorithm based on triangle module fusion operator in wireless sensor networks

Li Min, Gao Ranxin
{"title":"Malicious nodes detection algorithm based on triangle module fusion operator in wireless sensor networks","authors":"Li Min, Gao Ranxin","doi":"10.1109/IAEAC47372.2019.8997710","DOIUrl":null,"url":null,"abstract":"The characteristics of wireless sensor networks and its deployment environment determine that wireless sensor networks is vulnerable to intrusion. In this paper, a malicious nodes detection algorithm based on triangle module fusion operator (MDTMO) is proposed for selective forwarding attack. The algorithm establishes the membership functions according to data packets that received and forwarded by the node, it uses the fusion method of triangle module operator to determine the suspected malicious node. Subsequently, the base station node detects the buffer occupancy and channel occupancy of the suspected malicious node to judge whether the network is in congestion. If the network quality is good, it is considered that the packets loss is due to the selective forwarding attack instead of congestion, so the node is judged to be a malicious node. The experimental results show that compared with the algorithm in [6], MDTMO has improved performance in both the malicious nodes detection rate and false positive rate.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAEAC47372.2019.8997710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The characteristics of wireless sensor networks and its deployment environment determine that wireless sensor networks is vulnerable to intrusion. In this paper, a malicious nodes detection algorithm based on triangle module fusion operator (MDTMO) is proposed for selective forwarding attack. The algorithm establishes the membership functions according to data packets that received and forwarded by the node, it uses the fusion method of triangle module operator to determine the suspected malicious node. Subsequently, the base station node detects the buffer occupancy and channel occupancy of the suspected malicious node to judge whether the network is in congestion. If the network quality is good, it is considered that the packets loss is due to the selective forwarding attack instead of congestion, so the node is judged to be a malicious node. The experimental results show that compared with the algorithm in [6], MDTMO has improved performance in both the malicious nodes detection rate and false positive rate.
基于三角形模块融合算子的无线传感器网络恶意节点检测算法
无线传感器网络的特点及其部署环境决定了无线传感器网络容易受到入侵。针对选择性转发攻击,提出了一种基于三角模块融合算子(MDTMO)的恶意节点检测算法。该算法根据节点接收和转发的数据包建立隶属函数,采用三角模块算子的融合方法确定可疑恶意节点。随后,基站节点检测疑似恶意节点的缓冲区占用率和信道占用率,判断网络是否处于拥塞状态。如果网络质量良好,则认为丢包是选择性转发攻击造成的,而不是拥塞造成的,因此判断该节点为恶意节点。实验结果表明,与[6]中的算法相比,MDTMO在恶意节点检测率和误报率方面都有提高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信