An identification method of malicious nodes in wireless communication based on dynamic reputation algorithm

被引:0
|
作者
Chen J. [1 ]
机构
[1] Puyang Vocational and Technical College, Henan, Puyang
关键词
Dynamic reputation algorithm; Identification; Malicious nodes in wireless communication;
D O I
10.1504/IJICT.2021.118573
中图分类号
学科分类号
摘要
Due to the complex internal structure of wireless communication network, the traditional methods for malicious node identification are relatively single, which leads to a large number of security risks in the network environment. This paper proposes a method of identifying malicious nodes in wireless communication based on dynamic reputation algorithm. A model of WSN wireless communication malicious node identification based on routing protocol reputation mechanism is established. The network is divided into clusters to determine the transmission path of network packets. Send the packet to the sink node and analyse it, calculate the node number and reputation value in the packet and compare with the threshold value to realise the identification of malicious nodes in wireless communication. The simulation results show that the proposed method can complete the identification of malicious nodes in wireless communication with high accuracy, and it takes less time and has better recognition performance. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:343 / 355
页数:12
相关论文
共 50 条
  • [1] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    [J]. 2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [2] Repeated Game Based Localization Algorithm for Wireless Sensor Networks with Malicious Beacon Nodes
    Yu, Ning
    Wan, Jiangwen
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2015, 25 (1-2) : 45 - 68
  • [3] DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM
    Akbani, Rehan
    Korkmaz, Turgay
    Raju, G. V. S.
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 2238 - 2244
  • [4] Detection of malicious rank attack nodes in communication network based on windowed frequency shift algorithm
    Yang, Hao
    Xia, Yibo
    Cai, Wen
    Xie, Xin
    [J]. INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (02) : 203 - 219
  • [5] A Wireless Communication Method with Dynamic Adding Nodes for the Underground Search and Rescue Robot
    焦国太
    王峰
    秦栋泽
    [J]. Journal of Measurement Science and Instrumentation, 2010, 1 (03) : 212 - 216
  • [6] Malicious Node Identification Method Based on Intelligent Algorithm for Edge Computing
    Chen, Jie
    Xu, Ai-dong
    Wen, Hong
    Liu, Wen-jie
    Jiang, Yi-xin
    Li, Peng
    Li, Yu-shan
    [J]. 2019 INTERNATIONAL CONFERENCE ON ENERGY, POWER, ENVIRONMENT AND COMPUTER APPLICATION (ICEPECA 2019), 2019, 334 : 363 - 367
  • [7] Nodes scheduling algorithm based on dynamic cluster in wireless sensor network
    Guo Q.
    Cui Y.-Q.
    Wang Y.
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2022, 52 (06): : 1466 - 1476
  • [8] D-S based Fusion Method for Against Malicious Nodes in Wireless Sensor Networks
    Tian, Qiao
    Qin, Pengwan
    Wang, Meiyu
    Liu, Yang
    [J]. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 520 - 525
  • [9] A Global Reputation Estimation and Analysis Technique for Detection of Malicious Nodes in a Post-Disaster Communication Environment
    Basu, Souvik
    Roy, Siuli
    [J]. 2014 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2014, : 179 - 185
  • [10] Selection of Optimistic Nodes for Reputation Based Routing in Wireless Networks
    Thirunavukkarasu, V
    Kumar, A. Senthil
    Josephine, D. C. Jullie
    Arasu, T. Pooja
    [J]. 2020 7TH IEEE INTERNATIONAL CONFERENCE ON SMART STRUCTURES AND SYSTEMS (ICSSS 2020), 2020, : 494 - 498