欺骗攻击
计算机科学
无线传感器网络
算法
可靠性(半导体)
节点(物理)
熵(时间箭头)
计算机网络
实时计算
托普西斯
工程类
功率(物理)
物理
结构工程
量子力学
运筹学
作者
Kai Fang,Tingting Wang,Xiaolong Zhou,Yaping Ren,Hongfei Guo,Jianqing Li
出处
期刊:IEEE Transactions on Industrial Informatics
[Institute of Electrical and Electronics Engineers]
日期:2022-02-01
卷期号:18 (2): 1322-1332
被引量:22
标识
DOI:10.1109/tii.2021.3076770
摘要
Selecting reliable beacon nodes plays a significant role in relocalizing unknown nodes in a wireless sensor network. When the position of a beacon node is drifted or is spoofed, it becomes an unreliable beacon node, which would lead to a large relocalization deviation of unknown nodes in its neighbor. However, when selecting reliable beacon nodes, most relocalization algorithms only screen either drifting beacon nodes or malicious beacon nodes whose position is drifted or spoofed. This article proposes an algorithm that can simultaneously screen drifting beacon nodes and malicious beacon nodes. The algorithm is divided into four steps. First, three indicators are introduced, where two are for describing position drifting and one is for describing position spoofing. Second, the entropy method is used to weight the contributions of three indicators. Third, a technique for order preference by similarity to an ideal solution is used to construct a reliability evaluation model. Finally, using the reliability evaluation model select reliable beacon nodes. Experimental results illustrate that the detection accuracy of drifting beacon nodes and malicious beacon nodes of the proposed algorithm is 7.5% and 8.2% higher than that of the state-of-the-art algorithms, respectively.
科研通智能强力驱动
Strongly Powered by AbleSci AI