期刊文献+

基于D-S证据理论的无线传感器网络MAC层安全研究 被引量:2

Research on MAC security based on D-S evidence theory in wireless sensor networks
下载PDF
导出
摘要 研究了无线传感器网络MAC层安全问题,分析了现有无线传感器网络MAC层协议安全体系的不足之处,针对无线传感器网络遭到非法入侵的情况,提出了一个基于D-S证据理论的MAC层入侵检测机制。该机制利用碰撞率、数据包平均等待时间、RTS包到达率以及邻居节点的报警作为证据,对网络的状态进行实时的分析检测,根据网络的状态作出响应。该算法能够应用于现有的MAC协议如S-MAC、IEEE 802.15.4中,仿真结果表明,该算法能够较好地抵御针对MAC层的攻击,保证网络的安全运行。 This paper considered the security problem at MAC layer in wireless sensor networks, analyzed the security defects in current works on MAC protocols, and then presented a intrusion detection system (IDS) on MAC layer based on D-S evidence theory for the condition that current security system was broken down. In the IDS, selected the collision ratio, data packet' s waiting time, RTS packets arrival ratio and the other nodes' alarms as evidences to detect the attacks such as collision attack, unfairness attack and exhaustion attack. This IDS can be used in S-MAC, IEEE 820.15.4 directly. To evaluate the performance of the system, analyzed the IDS with NS-2, the results show that the IDS can defense attacks on MAC layer, and guarantee the wireless sensor networks work well.
出处 《计算机应用研究》 CSCD 北大核心 2009年第1期330-333,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60702037) 国家教育部博士点学科基金资助项目(20030056007) 中国博士后科学基金资助项目(2006040018) 河南科技大学博士科研启动基金资助
关键词 介质访问控制层协议 安全 D-S证据理论 无线传感器网络 入侵检测 MAC layer security D-S evidence theory wireless sensor networks intrusion detection system
  • 相关文献

参考文献12

  • 1AKYILDIZ I F,SU Wei-lian,SUBR-MANIAM Y S,et al. A survey on sensor networks [ J]. IEEE Communications Magazine, 2002,40 (8) :102-114.
  • 2孙雨耕,张静,孙永进,房朝晖.无线自组传感器网络[J].传感技术学报,2004,17(2):331-335. 被引量:89
  • 3YE W, HEIDEMANN J, ESTRIN D. An energy-efficient MAC protocol for wireless sensor networks [ C ]//Proc of INFOCOM. New York, IEEE Press ,2002 : 1567-1576.
  • 4DAM T van, LANGENDOEN K. An adaptive energy-efficient MAC protocol for wireless sensor networks [ C ]//Proc of the 1 st Int' l Conf on Embedded Networked Sensor Systems (SenSys). New York:ACM Press ,2003 : 171-180.
  • 5JAMIESON K, BALAKRISHNAN H, TAY Y C. Sift : an MAC protocol for event-driven wireless sensor networks, MIT-LCS-TR-894 [ R ]. Massachusetts:MIT Lab for Computer Science,2003.
  • 6FIEINZELMAN W R, CHANDRAKASAN A, BALAKRISHNAN It. An application-specific protocol architecture for wireless microsensor networks [ J ]. IEEE Trans on Wireless Communications, 2002, 1 (4) :660-670.
  • 7RAJENDRAN V,OBRACZKA K, GARCIA -LUNA-ACEVES J J. Energy-efficient, collision-free medium access control for wireless sensor networks[ C ]//Proc of ACM SenSys. New York: ACM Press,2003: 181-192.
  • 8IEEE Computer Society LAN/MAN Standards Committee. IEEE 802. 15. 4, Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks [S].2006.
  • 9IEEE Computer Society LAN/MAN Standards Committee. IEEE std 802. 11-1999, Wireless LAN medium access control (MAC)and physical layer(PHY) specifications[ S]. 1999.
  • 10REN Qing-chun, LIANG Qi-lian. Secure media access control ( MAC ) in wireless sensor networks:intrusion detections and [C]//Proc of the 15th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. 2004:3025-3029.

二级参考文献31

  • 1Craig Ulmer. Wireless Sensor Networks.http://users.ece.gatech.edu/-grimace/research/sensorsimii/wireless-sensor-networks.ppt.
  • 2Chris Savarese, Robust Positioning Algorithms for Distribured Ad-Hoc Wireless Sensor Networks[D].master thesis of University of California at Berkeley 2002.
  • 3Bulusu N, Heidemann J, Bychkovskiy V,and Estrin D, Density-Adaptive Beacon Placement Algorithms for localization in ad-hoc wireless networks[J].In: IEEE Infocom 2002,New York, NY, June 2002.
  • 4Soheil Ghiasi,Ankur srivastava,Xiaojian Yang,and Majid Sarrafzadeh,Optimal Energy Aware Clustering in Sensor Networks[J]. Sensors, 2002,2,258-269.
  • 5heinzelman W R, Kulik J, Balakrishnan H. Adaptive protocols for information dissemination in wireless sensor networks[C]. In:Proceedings of the ACM MobiCom'99, Seattle, Washington,1999 pp.174-185.
  • 6Leonidas J.Guibas, Sensing.Tracking, and Reasoning with Relations[J]. IEEE signal processing magazine,2002,3:73-85.
  • 7Dan Li,Kerry D,Wong, Yu Hen Hu, and Akbar M.Sayeed, Detection Classification,and tracking of Targets[J]. IEEE signal processing magazine,2002,3:17-29.
  • 8Maurice Chu, Horst Haussecker, and Feng Zhao, Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks[R]. Xerox Palo Alto Research Center Technical Report May 2001:2001-10113.
  • 9Hill J, Szewczyk R, Woo A, Hollar S, Culler D, and Pister K. System architecture directions for networked sensors[C]. In:Proceedings of the 9th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Nov.2000
  • 10Tiny O S. An operating system for Networked Sensors. http://webs.cs.berkeley.edu/tos/

共引文献156

同被引文献12

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部