[1] 陈雪雁, 章志明, 杨伟, 等. 轻量级的无线传感器网络选择性转发攻击检测[J]. 计算机科学与探索, 2022, 16(4): 865-876.
CHEN X Y, ZHANG Z M, YANG W, et al. Lightweight selective forwarding attack detection for wireless sensor networks[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(4): 865-876.
[2] HUANG X Y, WU Y M. Identify selective forwarding at-tacks using danger model: promote the detection accuracy in wireless sensor networks[J]. IEEE Sensors Journal, 2022, 22(10): 9997-10008.
[3] 尹荣荣, 张文元, 杨绸绸, 等. 一种基于多跳确认和信任评估的选择性转发攻击检测方法[J]. 控制与决策, 2020, 35(4): 949-955.
YIN R R, ZHANG W Y, YANG C C, et al. A selective forwarding attacks detection approach based on multi-hop acknowledgment and trust evaluation[J]. Control and Decision, 2020, 35(4): 949-955.
[4] HAI T H, HUH E N. Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge[C]//Proceedings of the 2008 7th IEEE International Symposium on Network Computing and Applications, Cambridge, 2008: 325-331,
[5] YU H, WU Y, WANG H. Detection of insider selective forwarding attack based on monitor node and trust mechanism in WSN[J]. Wireless Sensor Network, 2014, 6(11): 237-248.
[6] FU H, LIU Y, DONG Z, WU Y. A data clustering algorithm for detecting selective forwarding attack in cluster-based wireless sensor networks[J]. Sensors, 2019, 20(1): 23.
[7] LIU A F, DONG M X, OTA K R, et al. PHACK: an effi-cient scheme for selective forwarding attack detection in WSN[J]. Sensors, 2015, 15(12): 30942-30963.
[8] ZHANG Q, ZHANG W Z. Accurate detection of selective forwarding attack in wireless sensor networks[J]. Interna-tional Journal of Distributed Sensor Networks, 2019, 15(1): 1-8.
[9] 马吉, 杜永文, 夏金棕. 基于独立监督网络的选择性转发攻击检测[J]. 传感技术学报, 2022, 35(4): 538-544.
MA J, DU Y W, XIA J Z. Selective forwarding attack detection based on independent monitoring network[J]. Chinese Journal of Sensors and Actuators, 2022, 35(4): 538-544.
[10] ROLES A, ELAARAG H. Coexistence with malicious and selfish nodes in wireless ad hoc networks: a Bayesian game approach[J]. Journal of Algorithms & Computational Technology, 2017, 11(4): 353-365.
[11] KHAN T, SINGH K, HASAN M H, et al. ETERS: a comprehensive energy aware trust-based efficient routing scheme for adversarial WSN[J]. Future Generation Computer Systems, 2021, 125: 921-943.
[12] DING J Z, WANG H Z, WU Y M. The detection scheme against selective forwarding of smart malicious nodes with reinforcement learning in wireless sensor networks[J]. IEEE Sensors Journal, 2022, 22(13): 13696-13706.
[13] DING J Z, ZHANG H T, GUO Z X, et al. The DPC-based scheme for detecting selective forwarding in clustered wireless sensor networks[J]. IEEE Access, 2021, 9: 20954-20967.
[14] 尹荣荣, 张文元, 杨绸绸, 等. 基于简化云与K/N投票的选择性转发攻击检测方法[J]. 电子与信息学报, 2020, 42(12): 2841-2848.
YIN R R, ZHANG W Y, YANG C C, et al. A selective forwarding attack detection method based on simplified cloud and K/N voting model[J]. Journal of Electronics and Information Technology, 2020, 42(12): 2841-2848.
[15] LIAO H, DING S. Mixed and continuous strategy monitor-forward game based selective forwarding solution in WSN[J]. International Journal of Distributed Sensor Networks, 2015, 11(11): 359780.
[16] LI Y T, WU Y M. Combine clustering with game to resist selective forwarding in wireless sensor networks[J]. IEEE Access, 2020, 8: 138382-138395.
[17] 巩俊辉, 胡晓辉, 杜永文. 基于演化博弈的最优防御策略选取研究[J]. 计算机工程与应用, 2021, 57(13): 116-123.
GONG J H, HU X H, DU Y W. Research on selection of optimal defense strategy based on evolutionary game[J]. Computer Engineering and Applications, 2021, 57(13): 116-123. |