期刊文献+

无线传感器网络内部攻击检测方法研究 被引量:4

Research on Detection Methods for Insidious Attack of Wireless Sensor Networks
下载PDF
导出
摘要 随着无线传感器网络软硬件技术的发展,内部攻击逐渐成为无线传感器网络面临的主要安全威胁之一。综述了内部攻击检测技术的研究,根据攻击检测的对象将检测方法分为攻击行为检测、攻击节点检测和复件攻击检测,并指出了检测悖论、数目占优和中心模式等作为这些检测方法的安全假设制约了方法的性能。同时,概述了现有的关于移动无线传感器网络的攻击检测方法以及移动节点的加入给无线传感器网络解决内部攻击问题带来的变化,在此基础上,讨论了移动节点给内部攻击检测带来的机遇与挑战,指出了相关研究的未来发展方向。 Insidious attack becomes more and more important to the security question of wireless sensor network with the developments of its hardware and software.A comprehensive survey on the detection methods for this attack was presented in this paper.Firstly,these methods were introduced in 3 classes:detection on attack behaviors,compromised nodes and replica nodes.Then it was pointed out that the detection assumption of pre-known attack behavior,outnumbered benign nodes or absolutely secure sink or base station bottlenecks the application of these methods.Furthermore,the issues about attack detection in the mobile wireless sensor networks were introduced,and then the challenges and advantages about mobile nodes over the attack detection for wireless sensor network were discussed.Finally,the possible developments of methods for detecting insidious attack were presented.
出处 《计算机科学》 CSCD 北大核心 2011年第4期97-99,129,共4页 Computer Science
基金 国家自然科学基金项目(60703115) 国家社科基金项目(09CTJ006)资助
关键词 无线传感器网络 内部攻击 移动节点 攻击检测 Wireless sensor networks Insidious attack Mobile nodes Attack detection
  • 相关文献

参考文献10

二级参考文献155

共引文献177

同被引文献42

  • 1方震,赵湛,郭鹏,张玉国.基于RSSI测距分析[J].传感技术学报,2007,20(11):2526-2530. 被引量:265
  • 2刘明,龚海刚,毛莺池,陈力军,谢立.高效节能的传感器网络数据收集和聚合协议[J].软件学报,2005,16(12):2106-2116. 被引量:65
  • 3任秀丽,于海斌.ZigBee无线通信协议实现技术的研究[J].计算机工程与应用,2007,43(6):143-145. 被引量:119
  • 4Buttyan L, Hubaux J P. Security and cooperation in wireless networks[M]. UK: Cambridge University Press, 2007.
  • 5Cayirei E. Data aggregation and dilution by modulus addressing in wireless sensor networks[J]. IEEE Communications Letters, 2003, 7(8): 355-358.
  • 6Yang Y, Wang X, Zhu S, et al. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information and System Security, 2008, 11(4): 1-43.
  • 7Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution, and routing adaptation[J]. IEEE Transactions on Mobile Computing, 2006, 5(10): 1417-1431.
  • 8Shu Q R, Jong S P. Density mining based resilient data aggregation for wireless sensor networks[C]//Fourth International Conference on Networked Computing and Advanced Information Management. USA: IEEE Iqnrnnntr nitv 2flfIR" 9/1-9.
  • 9Karlof C, Wanger D. Secure routing in wireless sensor networks: attacks and counter measures[J]. Elsevier's Ad Hoc Networks Journal, 2003, 1(2-3): 293-315.
  • 10Perrig A, Szewczyk R, Wen V, et al. Security protocols for sensor network[J]. Wireless Networks, 2002, 8(5), 521-534.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部