Security Detection Method for Clustering Wireless Sensor Networks Based on Markov Chain

被引:0
|
作者
Dong, Na [1 ]
Chen, Ze [1 ]
Liu, Weina [1 ]
Hou, Botao [1 ]
机构
[1] Power Grid Technology Center, State Grid Hebei Electric Power Research Institute, Shijiazhuang,050000, China
来源
Engineering Intelligent Systems | 2022年 / 30卷 / 01期
关键词
Feature extraction - Markov processes - Network security - Phase space methods - Sensor nodes - Transmissions;
D O I
暂无
中图分类号
学科分类号
摘要
In order to improve the mining and intelligent analysis capability of the transmission information of clustered wireless sensor networks, a security detection method for transmission information of clustered wireless sensor networks based on Markov chain is proposed. This involves constructing a distributed sensing sequence sampling model of clustered wireless sensor network transmission information, reconstructing association rule feature quantities of clustered wireless sensor network transmission information obtained by sensing detection, establishing a Markov chain information mining model of clustered wireless sensor network transmission information, adopting a wireless sensor network information fusion tracking identification method, carrying out adaptive fusion and feature clustering of clustered wireless sensor network transmission information. Combined with the phase space reconstruction method, the discrete fusion processing of the transmission information of the clustered wireless sensor network is carried out, and the correlation spectrum feature extraction is carried out on the transmission information of the clustered wireless sensor network in the routing relay node, so that the safety detection of the transmission information of the clustered wireless sensor network is realized. The simulation results show that this method has higher accuracy, better security and a higher level of fusion for the transmission information detection of clustered wireless sensor networks as well as good security detection and feature analysis capabilities for clustered wireless sensor networks. © 2022 CRL Publishing. All rights reserved.
引用
收藏
页码:55 / 65
相关论文
共 50 条
  • [31] A Randomly Delayed Clustering Method for Wireless Sensor Networks
    Chen, Xiaobo
    Niu, Zhisheng
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 3353 - 3358
  • [32] A Method for Clustering and Cooperation in Wireless Multimedia Sensor Networks
    Alaei, Mohammad
    Barcelo-Ordinas, Jose M.
    [J]. SENSORS, 2010, 10 (04) : 3145 - 3169
  • [33] A Latent Variable Clustering Method for Wireless Sensor Networks
    Vasilev, Vladislav
    Iliev, Georgi
    Poulkov, Vladimir
    Mihovska, Albena
    [J]. 2016 50TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2016, : 1400 - 1405
  • [34] AN ENERGY EFFICIENT CLUSTERING METHOD FOR WIRELESS SENSOR NETWORKS
    Saeidmanesh, Mehdi
    Babaei, Ghasem
    Ferasat, Mohammad
    [J]. THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 879 - +
  • [35] A zone-based clustering method for ubiquitous robots based on wireless sensor networks
    Kim, Kyungmi
    Kim, Hyunsook
    Choi, Young
    Lee, Sukgyu
    Han, Kijun
    [J]. SMART SENSING AND CONTEXT, PROCEEDINGS, 2006, 4272 : 25 - +
  • [36] The distributed source coding method research based on clustering wireless sensor networks
    Chen, Jian
    Han, Xue
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (04) : 224 - 228
  • [37] Two types of a zone-based clustering method for wireless sensor networks
    Kim, Kyungmi
    Kim, Hyunsook
    Han, Kijun
    [J]. ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2007, 4481 : 347 - +
  • [38] A DISTRIBUTED FAULT RECOVERY METHOD IN CLUSTERING-BASED WIRELESS SENSOR NETWORKS
    Guan, Zhili
    Gao, Zhipeng
    Yang, Yang
    Li, Yukun
    Qiu, Xuesong
    [J]. PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, AIAI2010, 2010, : 269 - 273
  • [39] Data Clustering Method in Wireless Sensor Networks Based on Residual Energy Perception
    Yang, Xudong
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (06) : 85 - 97
  • [40] Malicious attack detection based on continuous Hidden Markov Models in Wireless sensor networks
    Moundounga, Anselme Russel Affane
    Satori, Hassan
    Boutazart, Youssef
    Abderrahim, Ezzine
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2023, 101