物聯(lián)網(wǎng)可信感知與識別關(guān)鍵技術(shù)研究
發(fā)布時(shí)間:2018-01-22 23:20
本文關(guān)鍵詞: 物聯(lián)網(wǎng) 無線傳感器網(wǎng)絡(luò) 可信感知 惡意節(jié)點(diǎn) 虛假數(shù)據(jù)攻擊 出處:《長沙理工大學(xué)》2014年碩士論文 論文類型:學(xué)位論文
【摘要】:近年來,物聯(lián)網(wǎng)受到各界廣泛的關(guān)注,作為一種新型的泛在網(wǎng)絡(luò),物聯(lián)網(wǎng)感知層相比于其他網(wǎng)絡(luò),對物理世界具有更深層次、更廣范圍的接觸的特點(diǎn)。因此,感知獲得的數(shù)據(jù)具有“異構(gòu)、實(shí)時(shí)、分布、海量”的特點(diǎn)。通過無線傳感器獲取數(shù)據(jù)技術(shù)是物聯(lián)網(wǎng)感知層所采用的關(guān)鍵技術(shù)之一。感知數(shù)據(jù)的可靠性、有效性、安全性及穩(wěn)定性是物聯(lián)網(wǎng)感知層領(lǐng)域的研究熱點(diǎn)和難點(diǎn)。本文在總體介紹物聯(lián)網(wǎng)的發(fā)展背景、相關(guān)理論及應(yīng)用的基礎(chǔ)上,從物聯(lián)網(wǎng)可信感知技術(shù)入手,介紹了無線傳感器網(wǎng)絡(luò)的特點(diǎn),并將無線傳感器網(wǎng)絡(luò)與傳統(tǒng)網(wǎng)絡(luò)進(jìn)行對比,分析無線傳感器網(wǎng)絡(luò)安全問題的特點(diǎn)以及目前常見的安全防御思想;同時(shí),重點(diǎn)介紹了無線傳感器網(wǎng)絡(luò)易遭受的攻擊類型,對目前業(yè)界提出的經(jīng)典算法進(jìn)行了總結(jié)與歸納,并對這些經(jīng)典算法的優(yōu)點(diǎn)與不足進(jìn)行了分析。針對Hur算法容納度低、所需先驗(yàn)知識多,提出對特征節(jié)點(diǎn)分析的惡意節(jié)點(diǎn)檢測算法(DAFNA)。該算法首先對事件源的能量值估計(jì),且在此過程中過濾保留良性特征節(jié)點(diǎn);然后以特征節(jié)點(diǎn)為參照建立坐標(biāo)系,通過分析待檢測節(jié)點(diǎn)與事件源的距離計(jì)算值與距離感知值之間的差異,進(jìn)行惡意節(jié)點(diǎn)的判斷;最后通過仿真實(shí)驗(yàn),對該算法性能進(jìn)行分析,并與Hur算法對比,得出DAFNA算法所需先驗(yàn)知識少,惡意節(jié)點(diǎn)容納度比Hur算法更好。此外,本文針對虛假數(shù)據(jù)攻擊還提出基于三角形內(nèi)點(diǎn)幾何性質(zhì)的判斷算法。首先將感知節(jié)點(diǎn)排序成能量值序列,并由判斷節(jié)點(diǎn)的后續(xù)點(diǎn)對構(gòu)造一系列三角形的集合;然后分別提取出各三角形內(nèi)點(diǎn)能量感知最小值,重新構(gòu)成集合,另外提出可信度函數(shù),根據(jù)三角形內(nèi)點(diǎn)性質(zhì)與可信度函數(shù)提出對提供偏小值的惡意節(jié)點(diǎn)判斷依據(jù),同時(shí),通過分析三角形內(nèi)點(diǎn)能量感知最小值集合,根據(jù)三角形內(nèi)點(diǎn)性質(zhì),也能得到對提供偏大值的惡意節(jié)點(diǎn)判斷依據(jù);最后,通過仿真實(shí)驗(yàn),對該算法進(jìn)行性能分析。
[Abstract]:In recent years, the Internet of things has received extensive attention from all walks of life. As a new type of ubiquitous network, the perception layer of the Internet of things has the characteristics of deeper and wider contact to the physical world than other networks. Perceptual data has the characteristics of "heterogeneous, real-time, distributed and massive". Data acquisition through wireless sensors is one of the key technologies used in the perception layer of the Internet of things. The reliability and effectiveness of perceptual data. Security and stability are the hot and difficult points in the field of Internet of things perception layer. This paper introduces the background of the development of the Internet of things, related theories and applications, and starts with the trusted perception technology of the Internet of things. This paper introduces the characteristics of wireless sensor networks, compares wireless sensor networks with traditional networks, analyzes the characteristics of security problems in wireless sensor networks and the current common security defense ideas. At the same time, the emphasis is placed on the types of attacks that wireless sensor networks are vulnerable to, and the classical algorithms proposed by the industry are summarized and summarized. The advantages and disadvantages of these classical algorithms are analyzed. Aiming at the low capacity of Hur algorithm, the prior knowledge is much needed. A malicious node detection algorithm for feature node analysis is proposed. Firstly, the energy value of event source is estimated, and the benign feature nodes are filtered and retained in the process. Then using the characteristic node as reference to establish the coordinate system, by analyzing the difference between the distance calculation value and the distance perception value between the detected node and the event source, the malicious node can be judged. Finally, through the simulation experiment, the performance of the algorithm is analyzed, and compared with the Hur algorithm, it is concluded that the DAFNA algorithm requires less prior knowledge, and the tolerance of malicious nodes is better than that of the Hur algorithm. In this paper, a judgment algorithm based on geometric properties of interior points of a triangle is proposed for false data attacks. Firstly, the perceptual nodes are sorted into a sequence of energy values, and a series of triangles are constructed by the subsequent points of the judgment nodes. Then, the minimum energy perception of each triangle is extracted, and the set is reconstituted, and the credibility function is proposed. According to the properties of interior points and credibility function of triangles, the judgment basis of malicious nodes providing smaller values is put forward. At the same time, by analyzing the set of minimum values of energy perception in triangles, and according to the properties of interior points of triangles. We can also get the judgment basis of the malicious node which provides the larger value; Finally, the performance of the algorithm is analyzed by simulation experiments.
【學(xué)位授予單位】:長沙理工大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP391.44;TN929.5
【參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 任豐原,黃海寧,林闖;無線傳感器網(wǎng)絡(luò)[J];軟件學(xué)報(bào);2003年07期
2 王立平;席曉鵬;趙進(jìn);;基于RFID技術(shù)的高速公路不停車收費(fèi)系統(tǒng)[J];現(xiàn)代電子技術(shù);2012年03期
,本文編號:1456010
本文鏈接:http://www.sikaile.net/kejilunwen/wltx/1456010.html
最近更新
教材專著