无线传感器网络中基于模糊分簇的入侵检测算法
Fuzzy Clustering Based Intrusion Detection Algorithm in Wireless Sensor Networks
DOI: 10.12677/CSA.2017.76070, PDF, HTML, XML, 下载: 1,507  浏览: 6,874  国家自然科学基金支持
作者: 赵晓勇, 冉军德, 陈荣勇:国网重庆市电力公司检修分公司,重庆;郭松涛*:西南大学电子信息工程学院,重庆
关键词: 无线传感器网络模糊分簇克隆复制攻击入侵探测错失探测概率Wireless Sensor Networks Fuzzy Clustering Clone Attack Intrusion Detection Missing Detection Probability
摘要: 当无线传感器节点被应用到输电线路检测等领域时,由于其自身的计算能力有限、传输环境的开放性等因素,通常容易遭受到攻击。攻击节点通过捕获无线传感器网中的正常节点来获得节点中的有用信息(包括节点位置、密钥、节点身份)并加以复制构成一个能发起各种内部攻击的克隆节点,从而获取网络内部更为机密的信息。为了解决这类问题,我们提出了基于探测克隆节点存在的入侵检测算法(IDA)。在这种算法中,首先,我们提出基于加权变异系数的模糊均值分簇算法并对监测网络进行分簇。然后,我们选择功耗较小的节点作为监测节点(Witness node),这些监测节点在簇内全覆盖地监测数据传输节点和簇头节点是否被克隆。在监测数据传输节点时,通过分析错失探测概率和有效吞吐量来确定簇内的数据传输节点是否被克隆。在检测簇头节点时,通过设置合适的报警阈值来确定簇头节点是否被克隆。仿真结果表明所提出的入侵检测算法在选择合适的编码函数时,错误探测概率会减小50%以上,网络平均能耗降低20%。
Abstract: When wireless sensor nodes are applied to the transmission line testing or other areas, they are often easily attacked due to the limited computation capability and the open data transmission environment. Attack nodes can obtain the useful information of nodes (including node location, secret key, and node identity) by capturing the normal nodes in the network, and then copy the information to become clone nodes that can take various internal attacks so that they can obtain more secure information. To solve the problem, we propose an intrusion detection algorithm  (IDA) based on detecting the existence of clone nodes. In this algorithm, firstly, we propose the weighted variation coefficient based fuzzy mean clustering algorithm and cluster the networks by the proposed clustering algorithm. Secondly, we choose some nodes with less energy consumption as witness nodes. The witness nodes will monitor the whole network to determine whether the data transmission nodes and the cluster head nodes are replicated. Then, when the witness nodes monitor the data transmission nodes, IDA algorithm will determine whether the data transmission nodes are cloned within the cluster by analyzing the miss detection probability and the effective throughput. In the monitoring of cluster head nodes, IDA algorithm will determine whether the cluster head nodes are replicated by setting the alarm threshold. The simulation results show that our IDA algorithm will decrease the miss detection probability greatly to 50% and reduce the average energy consumption to 20% by choosing appropriate coding function.
文章引用:赵晓勇, 冉军德, 陈荣勇, 夏远灿, 郭松涛. 无线传感器网络中基于模糊分簇的入侵检测算法[J]. 计算机科学与应用, 2017, 7(6): 590-602. https://doi.org/10.12677/CSA.2017.76070

参考文献

[1] 王殊, 阎毓杰, 胡富平, 等. 无线传感器网络的理论及应用[M]. 北京: 北京航空航天大学出版社, 2007.
[2] Fekete, S.P., Kroller, A., Pfisterer, D., et al. (2004) Locating and Bypassing Routing Holes in Sensor Networks. Proceedings of International Workshop on Algorithmic Aspects of Wireless Sensor Networks.
[3] 郎为民, 杨德鹏, 李虎生. 智能电网WCSN安全体系架构研究[J]. 信息网络安全, 2012(4): 19-22.
[4] Wang, Y., Lin, W. and Zhang, T. (2010) Study on Security of Wireless Sensor Networks in Smart Grid. Proceedings of 2010 International Conference on Power System Technology, Hangzhou, 24-28 October 2010, 267-273.
https://doi.org/10.1109/POWERCON.2010.5666729
[5] Zouridaki, C., Mark, B.L., Hejmo, M. and Thomas, R.K. (2005) A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, 7 November 2005, 1-10.
https://doi.org/10.1145/1102219.1102222
[6] Choi, H., Zhu, S. and La Porta, T.F. (2007) SET: Detecting Node Clones in Sensor Networks. 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Nice, 17-21 September 2007, 341-350.
https://doi.org/10.1109/SECCOM.2007.4550353
[7] Parno, B., Perrig, A. and Gligor, V. (2005) Distributed Detection of Node Replication Attacks in Sensor Networks. 2005 IEEE Symposium on Security and Privacy, 8-11 May 2005, 49-63.
https://doi.org/10.1109/SP.2005.8
[8] Yu, C.M., Lu, C.S. and Kuo, S.Y. (2016) Compressed Sensing-Based Clone Identification in Sensor Networks. IEEE Transactions on Wireless Communications, 15, 3071-3084.
https://doi.org/10.1109/TWC.2016.2516021
[9] Khan, W.Z., Aalsalem, M.Y., Saad, N.M., Xaing, Y. and Luan, T.H. (2014) Detecting Replicated Nodes in Wireless Sensor Networks Using Random Walks and Network Division. 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, 6-9 April 2014, 2623-2628.
https://doi.org/10.1109/WCNC.2014.6952822
[10] Ho, Y.S., Ma, R.L., Sung, C.E., Tsai, I.C., Kang, L.W. and Yu, C.M. (2015) Deterministic Detection of Node Replication Attacks in Sensor Networks. 2015 IEEE International Conference on Consumer Electronics, Taipei, 6-8 June 2015, 468-469.
https://doi.org/10.1109/ICCE-TW.2015.7217002
[11] Cheng, G., Guo, S., Yang, Y. and Wang, F. (2015) Replication Attack Detection with Monitor Nodes in Clustered Wireless Sensor Networks. 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, 14-16 December 2015, 1-8.
https://doi.org/10.1109/pccc.2015.7410341
[12] 楼晓俊, 李隽颖, 刘海涛. 距离修正的模糊C均值聚类算法[J]. 计算机应用, 2012, 32(3): 646-648.
[13] 齐淼, 张化祥. 改进的模糊C均值聚类算法研究[J]. 计算机工程与应用, 2009, 45(20): 133-135.
[14] 罗会兰, 危辉. 一种基于聚类集成技术的混合型数据聚类算法[J]. 计算机科学, 2010, 37(11): 234-238.
[15] Jing, L., Ng, M.K. and Huang, J.Z. (2007) An Entropy Weighting k-Means Algorithm for Subspace Clustering of High-Dimensional Sparse Data. IEEE Transactions on Knowledge and Data Engineering, 19, 1026-1041.
https://doi.org/10.1109/TKDE.2007.1048
[16] Balli, H., Yan, X. and Zhang, Z. (2009) On Randomized Linear Network Codes and Their Error Correction Capabilities. IEEE Transactions on Information Theory, 55, 3148-3160.
https://doi.org/10.1109/TIT.2009.2018173
[17] Ngai, C.K., Yeung, R.W. and Zhang, Z. (2011) Network Generalized Hamming Weight. IEEE Transactions on Information Theory, 57, 1136-1143.
https://doi.org/10.1109/TIT.2010.2095233