• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种面向战术无线传感器网络的分步式混合信任评估方案。

A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks.

机构信息

Department of Computer Engineering, Ajou University, Suwon 16499, Korea.

出版信息

Sensors (Basel). 2020 Feb 18;20(4):1108. doi: 10.3390/s20041108.

DOI:10.3390/s20041108
PMID:32085600
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7070555/
Abstract

In tactical wireless sensor networks, tactical sensors are increasingly expected to be exploited for information collection in battlefields or dangerous areas on behalf of soldiers. The main function of these networks is to use sensors to measure radiation, nuclear, and biochemical values for the safety of allies and also to monitor and carry out reconnaissance of enemies. These tactical sensors require a network traffic flow that sends various types of measured information to the gateway, which needs high reliability. To ensure reliability, it must be able to detect malicious nodes that perform packet-dropping attacks to disrupt the network traffic flow, and energy-constrained sensors require energy-efficient methods to detect them. Therefore, in this paper, we propose a stepwise and hybrid trust evaluation scheme for locating malicious nodes that perform packet-dropping attacks in a tree-based network. Sensors send a query to the gateway by observing the traffic patterns of their child nodes. Moreover, depending on the situation, the gateway detects malicious nodes by choosing between gateway-assisted trust evaluation and gateway-independent trust evaluation. We implemented and evaluated the proposed scheme with the OPNET simulator, and the results showed that a higher packet delivery ratio can be achieved with significantly lower energy consumption.

摘要

在战术无线传感器网络中,战术传感器越来越多地被期望代表士兵在战场上或危险区域进行信息收集。这些网络的主要功能是利用传感器测量辐射、核和生化值,以确保盟友的安全,同时监测和对敌人进行侦察。这些战术传感器需要一种网络流量,将各种类型的测量信息发送到网关,这需要高可靠性。为了确保可靠性,它必须能够检测到执行丢包攻击的恶意节点,以破坏网络流量,而能量受限的传感器需要节能的方法来检测它们。因此,在本文中,我们提出了一种基于树状网络的逐步式混合信任评估方案,用于定位执行丢包攻击的恶意节点。传感器通过观察其子节点的流量模式向网关发送查询。此外,根据情况,网关通过选择网关辅助信任评估和网关独立信任评估来检测恶意节点。我们使用 OPNET 模拟器实现和评估了所提出的方案,结果表明,在显著降低能耗的同时,可以实现更高的分组投递率。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/0a5371e641b8/sensors-20-01108-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/38a1e4ae748e/sensors-20-01108-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/4822cbb891ed/sensors-20-01108-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/12f788e920e4/sensors-20-01108-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/163f800a572f/sensors-20-01108-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/3f33fe045b35/sensors-20-01108-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/543055abe524/sensors-20-01108-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/3024f7f32b38/sensors-20-01108-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/d70d16ab2e26/sensors-20-01108-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/d0c39ef12374/sensors-20-01108-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/5a440a22d7e3/sensors-20-01108-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/0a5371e641b8/sensors-20-01108-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/38a1e4ae748e/sensors-20-01108-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/4822cbb891ed/sensors-20-01108-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/12f788e920e4/sensors-20-01108-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/163f800a572f/sensors-20-01108-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/3f33fe045b35/sensors-20-01108-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/543055abe524/sensors-20-01108-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/3024f7f32b38/sensors-20-01108-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/d70d16ab2e26/sensors-20-01108-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/d0c39ef12374/sensors-20-01108-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/5a440a22d7e3/sensors-20-01108-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/59fe/7070555/0a5371e641b8/sensors-20-01108-g012.jpg

相似文献

1
A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks.一种面向战术无线传感器网络的分步式混合信任评估方案。
Sensors (Basel). 2020 Feb 18;20(4):1108. doi: 10.3390/s20041108.
2
Trust Based Multipath QoS Routing Protocol for Mission-Critical Data Transmission in Tactical Ad-Hoc Networks.战术自组织网络中用于关键任务数据传输的基于信任的多路径QoS路由协议
Sensors (Basel). 2020 Jun 11;20(11):3330. doi: 10.3390/s20113330.
3
Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks.基于区块链的无线传感器网络安全路由和信任管理。
Sensors (Basel). 2022 Jan 6;22(2):411. doi: 10.3390/s22020411.
4
Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks.用于关键任务无线传感器网络的基于信任的带Q学习的智能路由协议
Sensors (Basel). 2022 May 24;22(11):3975. doi: 10.3390/s22113975.
5
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks.无线传感器网络中针对内部人员分组丢弃攻击的混合信任模型。
Sensors (Basel). 2023 Apr 30;23(9):4407. doi: 10.3390/s23094407.
6
A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks.一种基于信任的安全路由方案,采用回溯方法用于能量收集无线传感器网络。
Sensors (Basel). 2018 Mar 1;18(3):751. doi: 10.3390/s18030751.
7
Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.基于交叉验证的分簇无线传感器网络快速、节省资源且抗协作攻击的可信计算方案。
Sensors (Basel). 2020 Mar 12;20(6):1592. doi: 10.3390/s20061592.
8
Information-Aware Secure Routing in Wireless Sensor Networks.信息感知的无线传感器网络安全路由
Sensors (Basel). 2019 Dec 26;20(1):165. doi: 10.3390/s20010165.
9
Traffic Priority Based Channel Assignment Technique for Critical Data Transmission in Wireless Body Area Network.基于流量优先级的无线体域网关键数据传输信道分配技术。
J Med Syst. 2018 Sep 20;42(11):206. doi: 10.1007/s10916-018-1054-y.
10
A robust trust establishment scheme for wireless sensor networks.一种适用于无线传感器网络的强大信任建立方案。
Sensors (Basel). 2015 Mar 23;15(3):7040-61. doi: 10.3390/s150307040.

引用本文的文献

1
Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions.车联网中的安全与信任管理:挑战与机器学习解决方案
Sensors (Basel). 2024 Jan 8;24(2):368. doi: 10.3390/s24020368.
2
Effectiveness Evaluation Method of Application of Mobile Communication System Based on Factor Analysis.基于因子分析的移动通信系统应用效果评估方法。
Sensors (Basel). 2021 Aug 10;21(16):5414. doi: 10.3390/s21165414.
3
Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things.传感器网络和物联网的安全性、隐私性和可信度。

本文引用的文献

1
A Study of LoRa: Long Range & Low Power Networks for the Internet of Things.LoRa研究:用于物联网的远距离低功耗网络
Sensors (Basel). 2016 Sep 9;16(9):1466. doi: 10.3390/s16091466.
2
CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.CENTERA:一种用于无线传感器网络的基于信任的集中式高效路由协议,具备认证功能。
Sensors (Basel). 2015 Feb 2;15(2):3299-333. doi: 10.3390/s150203299.
Sensors (Basel). 2020 Jul 10;20(14):3846. doi: 10.3390/s20143846.