基于接收信号功率的基于样条曲线的自组网信号检测性能分析

Q4 Business, Management and Accounting
Aditi Paul, Somnath Sinha
{"title":"基于接收信号功率的基于样条曲线的自组网信号检测性能分析","authors":"Aditi Paul, Somnath Sinha","doi":"10.1504/IJMNDI.2017.10010152","DOIUrl":null,"url":null,"abstract":"Detection of Sybil attack in mobile ad hoc network (MANET) has been a serious issue. A legitimate node, in general, varies its transmission power within a threshold limit. A Sybil attacker can create multiple forged identities having transmission power higher than that of the legitimate nodes. This article focuses on the performance analysis of the Sybil detection technique based on received signal power. Here, we propose the concept of a Sybil detection method for a specific category of Sybil attack where the attacker changes its transmission power along with IDs time to time. To distinguish between a legitimate node and a Sybil node, we calculate received signal power (RSP) of some initially suspected nodes for a number of time instances and draw cubic Bezier curve with these values. By using tangent properties of Bezier curve, we finally trace out Sybil nodes from the suspected nodes and represent them both graphically and mathematically. We analyse the result of each step of the proposed method throug...","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"7 1","pages":"222"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Performance analysis of received signal power-based Sybil detection in MANET using spline curve\",\"authors\":\"Aditi Paul, Somnath Sinha\",\"doi\":\"10.1504/IJMNDI.2017.10010152\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Detection of Sybil attack in mobile ad hoc network (MANET) has been a serious issue. A legitimate node, in general, varies its transmission power within a threshold limit. A Sybil attacker can create multiple forged identities having transmission power higher than that of the legitimate nodes. This article focuses on the performance analysis of the Sybil detection technique based on received signal power. Here, we propose the concept of a Sybil detection method for a specific category of Sybil attack where the attacker changes its transmission power along with IDs time to time. To distinguish between a legitimate node and a Sybil node, we calculate received signal power (RSP) of some initially suspected nodes for a number of time instances and draw cubic Bezier curve with these values. By using tangent properties of Bezier curve, we finally trace out Sybil nodes from the suspected nodes and represent them both graphically and mathematically. We analyse the result of each step of the proposed method throug...\",\"PeriodicalId\":35022,\"journal\":{\"name\":\"International Journal of Mobile Network Design and Innovation\",\"volume\":\"7 1\",\"pages\":\"222\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Mobile Network Design and Innovation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJMNDI.2017.10010152\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Business, Management and Accounting\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mobile Network Design and Innovation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJMNDI.2017.10010152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
引用次数: 9

摘要

移动自组网(MANET)中Sybil攻击的检测一直是一个严峻的问题。一般来说,一个合法的节点在一个阈值限制内改变其传输功率。Sybil攻击者可以创建多个伪造的身份,这些身份的传输能力高于合法节点的传输能力。本文重点分析了基于接收信号功率的Sybil检测技术的性能。在这里,我们提出了Sybil检测方法的概念,针对特定类别的Sybil攻击,攻击者会不时地改变其传输功率和id。为了区分合法节点和Sybil节点,我们在多个时间实例中计算了一些最初怀疑节点的接收信号功率(RSP),并用这些值绘制了三次Bezier曲线。最后利用Bezier曲线的切线性质,从疑似节点中求出Sybil节点,并进行图形化和数学化表示。我们通过…来分析所提出方法的每一步的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Performance analysis of received signal power-based Sybil detection in MANET using spline curve
Detection of Sybil attack in mobile ad hoc network (MANET) has been a serious issue. A legitimate node, in general, varies its transmission power within a threshold limit. A Sybil attacker can create multiple forged identities having transmission power higher than that of the legitimate nodes. This article focuses on the performance analysis of the Sybil detection technique based on received signal power. Here, we propose the concept of a Sybil detection method for a specific category of Sybil attack where the attacker changes its transmission power along with IDs time to time. To distinguish between a legitimate node and a Sybil node, we calculate received signal power (RSP) of some initially suspected nodes for a number of time instances and draw cubic Bezier curve with these values. By using tangent properties of Bezier curve, we finally trace out Sybil nodes from the suspected nodes and represent them both graphically and mathematically. We analyse the result of each step of the proposed method throug...
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Mobile Network Design and Innovation
International Journal of Mobile Network Design and Innovation Business, Management and Accounting-Management Information Systems
CiteScore
0.30
自引率
0.00%
发文量
0
期刊介绍: The IJMNDI addresses the state-of-the-art in computerisation for the deployment and operation of current and future wireless networks. Following the trend in many other engineering disciplines, intelligent and automatic computer software has become the critical factor for obtaining high performance network solutions that meet the objectives of both the network subscriber and operator. Characteristically, high performance and innovative techniques are required to address computationally intensive radio engineering planning problems while providing optimised solutions and knowledge which will enhance the deployment and operation of expensive wireless resources.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信