计算机应用 ›› 2013, Vol. 33 ›› Issue (08): 2218-2221.

• 信息安全 • 上一篇    下一篇

基于评价相似度对WSN声誉系统合谋攻击的检测机制

王勇,袁巢燕,唐 靖,胡良梁   

  1. 重庆理工大学 计算机科学与工程学院,重庆 400054
  • 收稿日期:2013-01-22 修回日期:2013-03-07 出版日期:2013-08-01 发布日期:2013-09-11
  • 通讯作者: 王勇
  • 作者简介:王勇(1974-),男,重庆人,副教授,博士,主要研究方向:物联网、嵌入式系统;
    袁巢燕(1987-),女,安徽合肥人,硕士研究生,主要研究方向:无线传感器网络、嵌入式系统;
    唐靖(1988-),女,湖南永州人,硕士研究生,主要研究方向:无线传感器网络、嵌入式系统;
    胡良梁(1987-),男,湖南娄底人,硕士研究生,主要研究方向:无线传感器网络、嵌入式系统。
  • 基金资助:

    重庆市自然科学基金资助项目;重庆理工大学研究生创新基金资助项目

Colluding clique detector based on evaluation similarity in WSN reputation system mechanism

WANG Yong,YUAN Chaoyan,TANG Jing,HU Liangliang   

  1. College of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, China
  • Received:2013-01-22 Revised:2013-03-07 Online:2013-09-11 Published:2013-08-01
  • Contact: WANG Yong

摘要: 针对无线传感器网络(WSN)声誉系统中可能存在的多个恶意节点合谋攻击网络节点,并影响其准确定位等安全问题,提出了恶意推荐(BS)合谋攻击团及其检测机制(BSCD),并给出了该机制的实现方法。该机制通过对推荐节点进行异常检测,分析推荐节点间的评价行为相似度,有效检测出存在的合谋攻击团,从而降低其对声誉系统的破坏和影响。仿真实验表明,BSCD在检测和抵制BS合谋攻击团方面效果显著,有效提高了声誉系统中恶意节点检测率和整个系统抵抗恶意节点破坏的能力。

关键词: 无线传感器网络, 声誉系统, 合谋攻击, 恶意节点, 评价相似度

Abstract: Bad Mouthing and Self-Promoting (BS) collusion attack group and its detection mechanism, called BSCD, were proposed to resolve the security issues of the multiple malicious node collusion attack network nodes and affect their accurate positioning in the Wireless Sensor Network (WSN) reputation system. And the implementation method of the mechanism was given. It detected the abnormal recommended node, analyzed the evaluation behavior similarity between recommended nodes, and effectively detected the existence of collusion attack group, thereby reduced its damage and impact on the reputation of the system. The simulation results show that, BSCD has significant effect on the detection and resisting BS collusion attack group, effectively improves the malicious node detection rate in the reputation system and the capacity of the entire system to resist malicious node.

Key words: Wireless Sensor Network (WSN), reputation system, collusion attack, malicious node, evaluation similarity

中图分类号: