期刊文献+

无线传感器网络中的新型入侵轨迹算法 被引量:2

Novel Attacking Locomotion Trajectory in Wireless Sensor Networks
下载PDF
导出
摘要 在无线传感器网络中,通过为进攻的入侵者寻找入侵轨迹来实现栅栏覆盖控制是比较有效的方法。在兼顾安全性能和时效性能,并且无需全网拓扑信息的支持的前提下,提出一种新型的入侵轨迹算法:SS(Security&Speed)算法。该算法形成的轨迹能动态地反映入侵者对上述两种性能的需求差异。和传统的Worst-coverage方法相比,该模型对网络中节点密度的变化有更低的敏感性,计算复杂度降低的同时仍能较好地接近理想结果。 Searching the attacking locomotion trajectory is a valid method for the barrier-coverage control in wireless sensor networks. Without any information of topology, an algorithm called as SS(Security & Speed)algorithm, is presented to build attacking locomotion trajectory. This trajectory can image the different of above two demands. Compared with the traditional worst-coverage algorithm, the proposed SS algorithm can match the results of the optimal more closely and has smaller complexity than the optimal approach.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第3期21-23,61,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60672107)
关键词 无线传感器网络 覆盖控制 栅栏覆盖 wireless sensor networks coverage control barrier-coverage
  • 相关文献

参考文献11

  • 1Akyildiz I F, Sankarasubramaniam Y, Cayircl E. A Survey on Sensor Networks[J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
  • 2任彦,张思东,张宏科.无线传感器网络中覆盖控制理论与算法[J].软件学报,2006,17(3):422-433. 被引量:156
  • 3Meguerdichian S, Koushanfar F, Potkonjak M, et al. Coverage Problems in Wireless Ad-hoc Sensor Networks[C]//Proc. of IEEE INFORCOM'01. [S. l.]: IEEE Press, 2001.
  • 4Meguerdichian S, Koushanfar F, Potkonjak M, et al. Worst and Best-case Coverage in Sensor Networks[J]. IEEE Trans. on Mobile Computing, 2005, 4(1): 84-92.
  • 5Veltri G, Potkonjak M. Minimal and Maximal Exposure Path Algorithms for Wireless Embedded Sensor Networks[C]//Proc. of the 1st International Conference on Embedded Networked Sensor Systems. Los Angeles,California, USA: [s. n.], 2003.
  • 6Corts J, Martnez S, Karatas T, et al. Coverage Control for Mobile Sensing Networks[J]. IEEE Trans. on Robotics and Automation, 2004, 20(2): 243-255.
  • 7Li Xiangyang, Wan PengJun, Frieder O., Coverage in Wireless Ad-hoc Sensor Networks[J]. IEEE Trans. on Computers, 2003, 52(6): 115-121.
  • 8Zhang Honghai, Jennifer C Hou. Maintaining Sensing Coverage and Connectivity in Large Sensor Networks[J]. Wireless Ad-hoc and Sensor Networks: An International Journal, 2005, 1(1/2): 89-124.
  • 9Tian Di, Georganas N D. Connectivity Maintenance and Coverage Preservation in Wireless Sensor Networks[C]//Proc. of Conference on Electrical and Computer Engineering. Canadian: [s. n.], 2004.
  • 10Meguerdichian S, Koushanfar F. Exposure in Wireless Ad-hoc Sensor Networks[C]//Proc. of ACM International Conference on Mobile Computing and Networking. Rome, Italy: [s. n.], 2001.

二级参考文献1

共引文献155

同被引文献13

  • 1俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:24
  • 2解争龙.基于无线Ad Hoc网络的入侵检测系统体系结构研究[J].微电子学与计算机,2007,24(5):103-105. 被引量:3
  • 3Rajasegarar S, Leckie C, Palaniswami M, et al. Distributed Anomaly Detection in Wireless Sensor Networks[C]//Proc of the 10th IEEE Singapore Int'l Conf on Communication System, 2006 : 1-5.
  • 4DU Wen Liang, FANG Lei, PENG Ning. LAD: Localization Anomaly Detection for Wireless Sensor Networks[J]. Journal of Parallel and Distributed Computing, 2006, 66 ( 7 ) : 874- 886.
  • 5Cagalj M, Capkun S, Hubaux J. Wormhole-Based Anti-Jamming Techniques in Sensor Networks [J]. IEEE Trans on Mobile Computing, 2007,6(1) : 100-114.
  • 6Su W T, Chang K M, Kuo Y H. eHIP:An Energy Efficient Hybrid Intrusion Prohibition System for Cluster-Based Wireless Sensor Networks [J]. Computer Networks, 2007, 51 (4) : 1151-1168.
  • 7Hsieh M Y, Huang Y M, Chao H C. Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks[J]. Computer Communications, 2007,30(11-12): 2385-2400.
  • 8XIAO Bin, YU Bo, GAO Chuan shan. CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks[J]. Journal of Parallel and Distributed Computing, 2007,67 ( 11 ): 1218- 1230.
  • 9ZHANG Yan chao, LIU Wei, LOU Wen jing, et al. Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24(2):247-260.
  • 10Agah A,Das S K. Preventing DoS Attacks in Wireless Sen sor Networks: A Repeated Game Theory Approach[J]. In ternational Journal of Network Security, 2007, 5 (2) : 145-153.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部