基于逻辑信任的事件学习与错误行为检测

Saneeha Ahmed, K. Tepe
{"title":"基于逻辑信任的事件学习与错误行为检测","authors":"Saneeha Ahmed, K. Tepe","doi":"10.1109/VTCFall.2016.7881961","DOIUrl":null,"url":null,"abstract":"The advancement in communication technologies has enabled ad hoc networks to collect large volumes of information. This information is vulnerable to various types of attacks amongst which false information dissemination and on-off attacks offer biggest threats to the networks. As the data in ad hoc networks depends on the events, it is necessary for any detection mechanism to first determine the true events. Then the information about these events can be used to judge the behavior of the senders. Therefore, in this work, the correct event is first learned using information from different sources including the observations of the receiver itself. This information is later used to learn the behavior of the senders. The learned behavior combined with the opinions of the neighbors about the sender allows the detection of malicious and honest nodes. In this work, a logistic trust model is used to combine the observed behavior and opinions. It is observed that logistic trust results in a high accuracy of over 99% and a low error of less than 1% even when the events are changing rapidly. It is also shown that the scheme can detect malicious majority and identify true events with high probability.","PeriodicalId":6484,"journal":{"name":"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Using Logistic Trust for Event Learning and Misbehaviour Detection\",\"authors\":\"Saneeha Ahmed, K. Tepe\",\"doi\":\"10.1109/VTCFall.2016.7881961\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The advancement in communication technologies has enabled ad hoc networks to collect large volumes of information. This information is vulnerable to various types of attacks amongst which false information dissemination and on-off attacks offer biggest threats to the networks. As the data in ad hoc networks depends on the events, it is necessary for any detection mechanism to first determine the true events. Then the information about these events can be used to judge the behavior of the senders. Therefore, in this work, the correct event is first learned using information from different sources including the observations of the receiver itself. This information is later used to learn the behavior of the senders. The learned behavior combined with the opinions of the neighbors about the sender allows the detection of malicious and honest nodes. In this work, a logistic trust model is used to combine the observed behavior and opinions. It is observed that logistic trust results in a high accuracy of over 99% and a low error of less than 1% even when the events are changing rapidly. It is also shown that the scheme can detect malicious majority and identify true events with high probability.\",\"PeriodicalId\":6484,\"journal\":{\"name\":\"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/VTCFall.2016.7881961\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VTCFall.2016.7881961","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

通信技术的进步使特设网络能够收集大量信息。这些信息容易受到各种类型的攻击,其中虚假信息传播和开关攻击是对网络的最大威胁。由于自组织网络中的数据依赖于事件,因此任何检测机制都必须首先确定真实的事件。然后,这些事件的信息可以用来判断发送者的行为。因此,在这项工作中,正确的事件首先是使用来自不同来源的信息来学习的,包括接收者自己的观察。这些信息随后用于了解发送者的行为。学习行为与邻居对发送者的看法相结合,允许检测恶意和诚实节点。在这项工作中,使用逻辑信任模型将观察到的行为和意见结合起来。观察到,即使在事件快速变化的情况下,逻辑信任也能产生超过99%的高准确率和小于1%的低误差。该方案能够检测出恶意多数,并以高概率识别出真实事件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Using Logistic Trust for Event Learning and Misbehaviour Detection
The advancement in communication technologies has enabled ad hoc networks to collect large volumes of information. This information is vulnerable to various types of attacks amongst which false information dissemination and on-off attacks offer biggest threats to the networks. As the data in ad hoc networks depends on the events, it is necessary for any detection mechanism to first determine the true events. Then the information about these events can be used to judge the behavior of the senders. Therefore, in this work, the correct event is first learned using information from different sources including the observations of the receiver itself. This information is later used to learn the behavior of the senders. The learned behavior combined with the opinions of the neighbors about the sender allows the detection of malicious and honest nodes. In this work, a logistic trust model is used to combine the observed behavior and opinions. It is observed that logistic trust results in a high accuracy of over 99% and a low error of less than 1% even when the events are changing rapidly. It is also shown that the scheme can detect malicious majority and identify true events with high probability.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Blind Signal Recognition Method of STBC Based on Multi-channel Convolutional Neural Network Welcome from the VTS President Beam Switching Solutions for Beam-Hopping Based LEO System Modeling Interference to Reuse Millimeter-wave Spectrum to In-Building Small Cells Toward 6G Interweave Shared-Use Model for Dynamic Spectrum Access in Millimeter-Wave Mobile Systems for 6G
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1