摘要
当今,安全正逐渐取代性能成为网络应用中首要关注的问题。而无线传感器网络在环境、后勤、工程、卫生和军事上的应用变得越来越普遍,使得无线传感器网络的安全问题成为一个重要的研究课题。本文研讨了无线传感器网络和其他类似网络(如AdHoc)的主要差别,并讨论如何根据这些差异进行有效的入侵检测。此外,还对本领域的研究状况进行了调查,并概述了未来研究的主要方向。
出处
《科技信息》
2009年第10期179-180,共2页
Science & Technology Information
参考文献8
-
1W.Du,L.Fang,P.Ning.Lad:Localization anomaly detection for wireless sensor network[sC][].th IEEE International Parallel and Distribut-ed Processing Symposium.2005
-
2V.Mittal,G.Vigna.Sensor-based intrusion detection for in-tra-domain distance-vector routing[].ACM Conference on Computer and Communications Security.2002
-
3A.Agah,S.K.Das,K.Basu.A non-cooperative game approach for intrusion detection in sensor networks[].Third IEEE International Symposium on Network Computing and Applications.2004
-
4A P R Silva,M H T Martins,B P S Rocha, et al.Decentralized intrusion detection in wireless sensor networks[].Proceedings of the st ACM international workshop on Quality of service & security in wireless and mobile networks.2005
-
5Onat I,Miri A.An Intrusion Detection Systemfor Wireless Sensor Networks[].Proc ofIEEEInternational Con-ference on Wireless and Mobile ComputingNetworking and Communications.2005
-
6Doumit S,,Agrawal DP.Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks[].MILCOM —IEEE Military Communications Conf.2003
-
7Christopher Kr ugel and Thomas Toth.Applying mobile agent technology to intrusion detection[]..2001
-
8Kachirski O,Guha R.Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks[].Proceedings of the th Hawaii International Conference on System Sciences(HICSS’ ).2002
同被引文献6
-
1I. F. Akyildiz, S, Weilian. Y, Sankarasubramaniam and E.Cayirci. A Survey On Sensor Networks. Communications Magazine,IEEE. 2002, 40(8): 102-114.
-
2A. S. K. Pathan, L. Hyung-Woo and S. H. Choong. Security inWireless Sensor Networks: Issues and Challenges. Advanced Com-munication Technology, 2006 ICACT 2006 The 8th InternationalConference, 2006 2006:6-1048.
-
3Tanya Roosta. Taxonomy of Security Attacks in Sensor Net-works and Countermeasures. The First IEEE International Confer-ence on System Integration and Reliability Improvements, Decem-ber, 2006.
-
4成峰.走向应用的无线传感器网络技术.2009.
-
5Da Silva. Decentralized Intrusion Detection in WSNs. In: Proc.of the 1st ACM Int.
-
6卞永钊,于海斌,王军.一种无线传感器网络入侵检测模型[J].微计算机信息,2010,26(12):12-14. 被引量:1
-
1新形态 新标准:索尼VAIO Fit multi-flip^TM PC[J].科技新时代,2014(1):108-109.
-
2姚雯.全能P45称霸千元技嘉EP45-UD3上市[J].电脑爱好者,2009(11):112-112.
-
3岁丰.Windows NT或Unix?[J].管理观察,1996,0(2):45-45.
-
4交换机与集线器的差别[J].电脑自做,2004(11):61-61.
-
5熊伟.Java与C++的比较[J].新课程学习(中),2009,0(4):9-10.
-
6杨金奇,刘学军.LonWorks在电力系统中的应用[J].工业控制计算机,2002,15(5):21-22.
-
7陆慧娟,曹贞.基于Linux的企业Webmail系统[J].微机发展,2004,14(5):19-21. 被引量:1
-
8刘劼.数字图书馆中的文档图像检索技术概述[J].科技创新导报,2009,6(15):193-193.
-
9吴明珠,何书鸾.计算机技术及信息技术联用探讨[J].电子制作,2013,21(9X):125-125. 被引量:2
-
10胡钢.谈ORACLE7与版本6的主要差别[J].数据,1995,0(12):20-21.