期刊文献+

基于规范的入侵检测技术在无线传感网中的研究

Specification-based intrusion detection for WSN
下载PDF
导出
摘要 探讨了无线传感网中的入侵检测技术,提出了设计传感网入侵检测系统时应遵守的一些基本原则,并以此为基础设计了一种简单有效的实施方案。该方案利用同一邻居关系节点间的分工协作和信息交流可以使网络恢复正常的运行状态。重点解决如何依据局部信息,通过分布式方案来实现对传感网的入侵行为的检测;通过定义简单的规则实现了对黑洞攻击和选择性转发攻击的检测。最后通过实验对方案的有效性进行了验证。 To study the problem of intrusion detection in WSN, this paper proposed some basic principles and a good scheme that could be applied to such networks. The collaboration and exchange of nodes in the same neighborhood could make the network back to its normal operational situation. Detection with localized and partial audit data was achieved by a distributed approach. The design was applied for the black-hole and selective forwarding attacks by defining appropriate rules. Finally, the effectiveness of this scheme was verity.
出处 《计算机应用研究》 CSCD 北大核心 2008年第10期3112-3115,共4页 Application Research of Computers
基金 上海市科委重大科技公关资助项目(05dz15004)
关键词 无线传感网 入侵检测 基于规范 监测者 wireless sensor networks(WSN) intrusion detection system(IDS) specification-based watchdog
  • 相关文献

参考文献9

  • 1DJENOURI D, KHELLADI L, BADACHE N, et al. A survey of security issues in mobile Ad hoc and sensor networks[ J]. IEEE Communications Surveys & Tutorials, 2005,7 (4) :2- 28.
  • 2SHI E, PERRIG A. Devising secure sensor networks [ J ]. IEEE Wireless Communications, 2004,11 (6) :38- 43.
  • 3LAZOS L, POOVENDRAN R. Serloc: vigorous localization for wireless sensor networks[J]. ACM Trans on Sensor Networks, 2005, 1 ( 1 ) :73-100.
  • 4GANERIWAL S, CAPKUN S, HAN C C, et al. Secure time synchronization service for wireless sensor network [ C ]//Proc of the 4th ACM Workshop on Wireless Security. New York:ACM Press, 2005: 97-106.
  • 5KARLOHAND C, WAGNER D. Secure route in sensor networks: attacks and countermeasures [ J ]. Ad hoc Networks Journal, 2003,1 (2-3) :293-315.
  • 6KACHIRSKI O, GUHA R, SCHWARTZ D,et al. Case-based proxies for packet-level intrusion detection in Ad hoc networks[ C ]//Proc of the 17th International Symposium on Computer and Information Sciences. Boca Raton, FL: CRC Press, 2002:315- 320.
  • 7MART S, GIULI T J, LAI K, et al. Mitigating route misbehavior in mobile Ad hoc networks[ C]//Proc of the 6th Annual International Conference on Mobile Computing and Networking. New York: ACM Press, 2000:255-265.
  • 8AXELSSON S. Intrusion detection system: a survey and taxonomy [ R ]. Goteborg, Sweden : Chalmers University of Technology, 2000.
  • 9DIMITRIOU T, KRONTIRIS I. Security in wireless sensor networks [ C ]//Proc of Security in Sensor Networks. Boca Raton, FL: CRC Press, 2006:275-290.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部