An Improved K-Means Algorithm Based on Density in the Selfish Behavior Detection

Article Preview

Abstract:

Aiming at selfish nodes in wireless sensor network (WSN) competition Shared channel unfair use of channel resources, for the purpose of selfish node Detection, puts forward an Improved Clustering Method (Improved Density-based Clustering Detection Method, ID-BCDM).With an average transmission delay, average throughput of node link sequence and collision probability of network performance characteristics, add the density function, improved K-means algorithm was carried out on the characteristics of sequence analysis and clustering. The simulation test results show that the ID-BCDM on three dimensional feature space has good clustering effect, also able to complete detection of single and multiple selfish node.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1030-1032)

Pages:

1642-1645

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] SU Hang, ZHANG Xi, Modeling throughput gain of network coding in multi-channel multi-radio wireless ad hoc networks [J]. Selected Areas in Communications, IEEE Journal on 2009, 27 (5) : 593-605.

DOI: 10.1109/jsac.2009.090603

Google Scholar

[2] Cui Li ; Ju Hailing , Miao Yong, Li Tianpu , Wireless sensor network research progress [J] Computer Research and Development , 2005 ( 1 ) : 163 -174 .

Google Scholar

[3] Kyasanur P and Vaidya N H. Selfish MAC Layer Misbehavior in Wireless Networks [J] IEEE Transactions on Mobile Computing (1536-1233), 2005, 4 (5):. 502-516.

DOI: 10.1109/tmc.2005.71

Google Scholar

[4] Gunasekaran R, Uthariaraj VR, Yamini U, et al. A Distributed Mechanism for Handing of Adaptive / Intelligent Selfish Misbehavior at MAC Layer in Mobile Ad Hoc Networks [J]. Journal of Computer Science and Technology (1000-9000) ( print), 2009, 24 (3) : 472-481.

DOI: 10.1007/s11390-009-9238-z

Google Scholar

[5] Raya M, Aad I, Hubaux J, Fawal A. DOMINO:. Detecting MAC Layer Greedy Behavior in IEEE 802. 11 Hotspots [J] IEEE Transactions on Mobile Computing, 2006. 5 (12): 1-11.

DOI: 10.1109/tmc.2006.183

Google Scholar

[6] Liu Chun-feng, Shu Yan-tai, Yang Oliver, et al . Detection of Selfish Behavior in Wireless Ad Hoc Networks Based on CUSUM Algorithm [J]. Transactions of Tianjin University (1006-4982) (print), 2010, 16 (2): 104-108.

DOI: 10.1007/s12209-010-0018-1

Google Scholar

[7] LAN / MAN Standards Committee of the IEEE Computer Society. Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks [K] USA: IEEE, (2003).

DOI: 10.1109/ieeestd.2003.94389

Google Scholar

[8] Chen B, Mao J, Guo N, etal. An Incentive Detection Mechanism for Cooperation of Nodes Selfish Behavior in Wireless Sensor Networks, The 25th Chinese Control and Decision Conference, 2013: 4021-4024.

DOI: 10.1109/ccdc.2013.6561653

Google Scholar

[9] Zhu data mining [M] Hefei: China Science and Technology University Press, 2002: 138 -139.

Google Scholar

[10] Aiguo Li, sunny library of data mining theory, algorithms and applications [M], Xi'an: Xi'an University of Electronic Science and Technology Press, 2012: 124 -125.

Google Scholar

[11] Bo Chen. IEEE 802. 15. 4 wireless sensor network nodes selfish behavior of [D]. ​​Kunming University of Technology, 2013.

Google Scholar

[12] RADOSAVAC S, BARAS JS, KOUTSOPOULOS IA framework for MAC protocol misbehavior detection in wireless networks [C] / / in Proceedings of the 4th ACM Workshop on wireless Security Cologne, Germany:. ACM press, 2005: 33-42.

DOI: 10.1145/1080793.1080801

Google Scholar

[13] Jiao Yongjie, simulation of wireless sensor networks selfish node detection [J]. Computer Simulation, 2010 (11): 140- 143.

Google Scholar