期刊文献+

无线传感网中的入侵检测关键技术研究 被引量:1

Research on Key Technology of IDS in Wireless Sensor Networks
下载PDF
导出
摘要 由于无线链路的弱点,节点缺少物理保护,拓扑的动态变化,缺乏集中的监控点等,使得无线传感器网络存在着更多的安全问题。入侵检测技术可作为第二道安全防线来弥补入侵预防技术的不足,是当前研究的热点问题之一。文章结合目前无线传感网IDS技术的发展现状,对入侵检测方法、IDS模型进行深入分析,并针对静态IDS模型存在的问题,提出了一种动态的IDS模型,在安全性、稳定性和健壮性方面都有所改进。 Security is one of the most critical problems of Wireless Sensor Networks(WSN),because of the vulnerability of wireless links,the absence of physical protection of nodes,dynamically changing topology and the lack of a centralized monitoring or management point.The intrusion detection approaches,as a second line of defence,can make up for deficiency of intrusion prevention approaches,and it is one of the hotspot problems in WSN.This paper analyzes current status of IDS,the methods and the models proposed on IDS in WSN.A dynamic model is proposed to improve the security,stability and robustness compared with static IDS models.
出处 《电脑与信息技术》 2007年第5期44-47,65,共5页 Computer and Information Technology
关键词 无线传感器网络 安全 入侵检测系统 WSN security IDS
  • 相关文献

参考文献13

  • 1谢冬青,冷健,熊伟.计算机网络安全技术教程[M].北京:机械工业出版社,2006.
  • 2Y.Zhang,W.Lee.Intrusion detection in wireless ad hoc networks[C].Proc.6th Int'l.Conf.Mobile Comp.Net(MobiCom 2000),Aug.2000,275-283.
  • 3郭小兵.无线移动Ad Hoc网络中的入侵检测技术[J].交通与计算机,2005,23(5):76-79. 被引量:2
  • 4刘力军,李卓伟.基于异常的无线移动网络入侵检测系统[J].计算机工程与应用,2006,42(14):165-168. 被引量:1
  • 5A Mishra,K.Nadkarni,A.Patcha.Intrusion Detection in Wireless Ad Hoc Networks[J].IEEE Wireless Communications,2004,11(1):48-60.
  • 6田俊峰,张喆,赵卫东.基于误用和异常技术相结合的入侵检测系统的设计与研究[J].电子与信息学报,2006,28(11):2162-2166. 被引量:23
  • 7Piya Techateerawat,Andrew Jennings.Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Network[C].IEEE WIC,2006:227-230.
  • 8S.Doumit.D.P.Agrawal.Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network[C].IEEE Military Communications Conference,2003,22(1):609-614.
  • 9C.-C.Su,K.-M.Chang,Y.-H.Kuo,M.-F.Horng.The new intrusion prevention and detection approaches for clustering-based senfor networks[C].IEEE Wireless Commuications and Networking Conference,Mar.2005,13-17.
  • 10A.Agah,S.Das.K.Basu,M.Asadi.Intrusion detection in sensor networks:A non-cooperative game approach[C].3rd IEEE Inter national Symposium on Network Computing and Applications,Boston,MA,Aug,2004,343-346.

二级参考文献21

  • 1Axelsson S.Intrusion detection systems:a taxomomy and survey.Tech.report no.99-15,Dept.of Comp.Eng.,Chalmers Univ.of Technology,Sweden,March,2003.20.
  • 2Mukherjee B.Heberlein L T,Levitt K N.Network intrusion detection.IEEE Network,May.,1994.28~42.
  • 3Paul Brutch,Calvin Ko.Challenges in intrusion detec-tion for wireless mobile Ad Hoc networks.Proceedings of the workshop on Security and Assurance in Ad Hoc Networks,Orlando,Ajn,2003.
  • 4Amitabh Mishra,Ketan Nadkarni,Animesh Patcha.Intrusion Detection in wireless Ad Hoc networks.IEEE Wireless Communications,Feb.,2004.48~60.
  • 5Zhang Y,Lee W.Intrusion detection in wireless Ad Hoc networks.6th Int'l.Conf.Mobile Comp.and Net.,Aug.,2000.275~283.
  • 6Zhang Y,Wenke Lee,Yian Huang.Intrusion detection techniques for mobile wireless networks.ACM J.Wireless Net.,Sept.,2003,9(5):45~56.
  • 7Oleg Kachirski,Ratan Guha.Effective intrusion detec-tion using multiple sensors in wireless Ad Hoc networks.IEEE HICSS,Hawaii,Jan.,2003.
  • 8Yian Huang,Wenke Lee.A cooperative intrusion de-tection system for Ad Hoc networks.Proceedings of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax,Virginia,2003.
  • 9P Albers.Security in Ad Hoc networks: a general intrusion detection architecture enhancing trust based approaches.1st Int'l.Wksp.Wireless Info.Sys.,Ciudad Real,Spain,Apr.,2002.3~6.
  • 10Y Huang et al.Cross-feature analysis for detecting ad-hoc routing anomalies[C].In:Proceedings of ICDCS,2003.

共引文献23

同被引文献10

  • 1曹晖,王青青,马义忠,罗平.基于动态贝叶斯博弈的攻击预测模型[J].计算机应用,2007,27(6):1545-1547. 被引量:13
  • 2Alpcan T,Bapr T.A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection[C]//Decision and Control, 2003 .Proceedings. 42 nd IEEE Conference on.
  • 3Agah,Das A,Basu S K,Asadi K.Intrusion detection in sensor networks:a non-cooperative game approach [ C ]//Network Computing and Applications, 2004.( NCA 2004 ). Third IEEE International Symposium on.
  • 4Patcha A, Park J M, A game theoretic formulation for intrusion detection in mobile ad hoc networks [ J ]. International Journal of Network Security, 2006, 2(2): 146-152.
  • 5Kachirski O,Guha R. Intrusion detection using mobile agents in wire-less Ad Hoc networks [C] // Proceedings of IEEE Workshop on Knowledge Media Networking,2002.
  • 6Balinski M L,CottleR W.Complementarity and Fixed Point Problems[M].North--Holland PublishingCompany: 1978.
  • 7Ahuja R, Bagrodia R, Gerla M. GloMoSim: A Scalable Simulation Environment for Wireless and Wired Network Systems [EB/OL].April,2004.
  • 8谢识予.经济博弈论[M].3版.上海:复旦大学出版社,2006.
  • 9蒋璐,朱参世,宁小娟.基于模糊评判法的入侵检测模型研究[J].微计算机信息,2008,24(15):88-89. 被引量:2
  • 10张瑞霞,王勇.一种基于数据挖掘的入侵检测模型[J].计算机与现代化,2003(5):58-61. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部