期刊文献+

无线传感器网络中一种基于接收功率异常的入侵检测算法 被引量:6

Intrusion Detection Algorithm Based on Reception Power Anomaly in Wireless Sensor Networks
下载PDF
导出
摘要 虽然静态传感器节点计算能力和通信能力较差,但是它们具有自己独特的特征,可以获取比较稳定的临域节点信息。利用这个特征可以检测网络异常情况以及临域节点的通信行为,为传感器网络提供安全保障。为了使传感器节点能够检测出入侵者,需要先建立一种简单的基于临域节点的动态统计模型,然后用一种低复杂度的检测算法监测已接收到的数据包的接收功率。首先介绍了一种基于无线传感器网络安全的入侵检测算法,然后介绍了一种基于该算法的节点协作检测技术,节点协作指的是对攻击的联合确认,以及邻居节点共同反抗入侵者的协作行为。 Abstract Although static sensor nodes have low computation and communication capabilities, but they have specific properties, and can acquire stable neighborhood information, which can be used for detection of anomalies in networking and behaviors of the neighbor nodes, to provide security for wireless sensor network. To make a sensor node capable of detecting an intruder, a simple dynamic statistical model of the neighboring nodes is needed to build, with a low-com- plexity detection algorithm to monitor received packet power levels. A detection algorithm based on security scheme for wireless sensor networks was introduced, and then a novel node cooperative detection technology based on this detection algorithm, which refers to affirm and stand against intrusion together, was proposed.
出处 《计算机科学》 CSCD 北大核心 2009年第3期34-37,共4页 Computer Science
基金 国家985工程项目(基于网格的高性能计算与复杂系统仿真平台建设)资助
关键词 无线传感器网络 接收功率异常 入侵检测算法仿真 节点协作检测技术 Wireless sensor networks, Reception power anomaly, Intrusion detection, Algorithm simulation, Node cooperative detection technology
  • 相关文献

参考文献15

  • 1Chee Y, Rabaey J, Niknejad A. A class A/B low power amplifier for wireless sensor networks[C]//Proceedings of the 2004 International Symposium on Circuits and Systems. 2004, 4: 409- 412
  • 2Karlof C , Wagner D. Secure routing in wireless sensor net - works:Attacks and countermeasures[C] // Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications. May 2003:113-127
  • 3Huang Y A , Lee W. A cooperative intrusion detection system for ad hoc networks[C]//Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM Press, 2003:135-147
  • 4Vigna G, Gwalani S, Srinivasan K, et al. An intrusion detection tool for AODV-based ad hoc wireless networks[C]///Proceedings of the 20th Annual Computer Security Applications Conference. 2004 : 16-27
  • 5覃伯平,周贤伟,杨军.无线传感器网络路由协议的攻击检测模型[J].计算机工程,2007,33(2):117-119. 被引量:3
  • 6Xu Y, Heidemann J, Estrin D. Geography-informed Energy Conservation for Ad-hoc Routing[C]//Proc. of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking. 2001 : 70-84
  • 7Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks[J]. Communications of the ACM, 2005,47 (6)
  • 8Lamport L,Shostak R, Pease M. The Byzantine Generals Problem[J]. ACM Transaction Programming Languages and Systems, 1982,4(3) : 382-401
  • 9裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 10Chan H , Perrig A , Song D. Random Key Predistribution Sch emes for Sensor Networks[C]//IEEE Symposium on Research in Security and Privacy. May 2003

二级参考文献80

共引文献105

同被引文献70

引证文献6

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部