会议专题

False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks

  Wireless sensor networks are usually deployed in complex environments; an attacker can easily inject false data by capturing nodes,causing serious consequences.The main work of this paper is as follows.Firstly, the logical loop model is created based on the estimated value of the source events of every wireless sensor network node.Secondly, each node based on RSSI find neighbor nodes by establishing consistency loop model.Finally, the malicious node is determined by comparing the similarities and differences of the nodes between the two loop models.The simulation shows that this mechanism is effective to inhibit the infringement of malicious nodes to the network, and improve network security performance.

malicious node WSN Logical loop model Consistency loop model

Ping Li Limin Sun Wu Yang Qing Fang Jinyang Xie Kui Ma

Computer and Communication Engineering Institute, Changsha University of Science and Technology, Hun Computer and Communication Engineering Institute, Changsha University of Science and Technology, Hun Wuxi Internet of Things Industry Research Institute,Jiangsu, 214000, China

国际会议

4th international Conference,ICSI2013(第4届群体智能国际会议)

哈尔滨

英文

308-315

2013-06-12(万方平台首次上网日期,不代表论文的发表时间)