For the next stage, it must be solved that what correct actions should be taken at different layers when a legal node is attacked by multiple malicious nodes.
该方案还处于研究起步阶段,下一步还需要明确各层的正确行为,以及出现多个恶意节点对某个合法节点诬陷时所应采取的行动。
Sensor node localization is a fundamental technique in WSN. However, unsupervised sensor nodes are susceptible to the from malicious nodes and captured nodes due to its inherent openness.
无线传感器网络中很多应用都依赖于节点的坐标位置,所以节点定位技术是传感器网络领域中一项非常重要的基础技术。
Transaction time factors, transaction scales, and transactions number are introduced to calculate the trust value. Penalty item is used to limit node to provide malicious service.
引入了交易时间和交易规模、交易次数等因素来进行信任值的计算,利用惩罚项来限制交易节点提供恶意服务。
In addition, the succeeded masquerader detection algorithm is proposed in this scheme. In this algorithm, the sink node monitors and examines the malicious region.
该方案也提出了成功假冒攻击源测定算法,其中采用了汇聚节点监控排查恶意区域、普通节点认证转发报警消息机制。
To reduce false alarm rate, the cluster head carries out second diagnosis mechanisms for malicious after the monitor node found out it.
为了减小误检率,巡查节点检测出信誉度为零的恶意节点后,需要簇头节点对其进行二次诊断。
To reduce false alarm rate, the cluster head carries out second diagnosis mechanisms for malicious after the monitor node found out it.
为了减小误检率,巡查节点检测出信誉度为零的恶意节点后,需要簇头节点对其进行二次诊断。
应用推荐