期刊文献+

基于分组的无线传感器网络入侵检测方案 被引量:2

A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks
下载PDF
导出
摘要 为了有效地检测无线传感器网络所面临的各种恶意攻击,提出了一种轻量、高效、灵活的分组入侵检测方案。在该方案中,整个传感器网络被划分成若干物理位置临近、具有相似观测结果的分组,组内各传感器节点同时观测其它节点的多个属性,以便精确地检测各种攻击行为。实验结果表明,与传感器网络中现有的入侵检测方案相比,本方案具有较低的误报率和较高的检测精度,同时消耗更少的能量。 In order to detect various kinds of malicious attacks in wireless sensor networks, we proposed a group based intrusion detection scheme which meets the efficient, lightweight and flexible property in this paper. The sensor networks are partitioned into many groups in which the sensors in each group are physically close to each other and equipped with the same sensing capability. Our intrusion detection algorithm takes into consideration of multiple attributes of the sensor nodes simultaneously to detect malicious attackers precisely. We show through experiments with real data that our algorithm can decrease the false alarm rate and increase the detection accuracy rate compared with existing intrusion detection schemes while lowering the power consumption.
作者 王颖 李国瑞
出处 《传感技术学报》 CAS CSCD 北大核心 2009年第6期878-882,共5页 Chinese Journal of Sensors and Actuators
基金 北京市教育委员会科技发展基金项目资助(KZ200610005003)
关键词 无线传感器网络 安全 入侵检测 分组算法 wireless sensor networks security intrusion detection scheme grouping algorithm
  • 相关文献

参考文献9

  • 1Akyildiz I, Su W, Sankarasubramaniam Y. Wireless Sensor Networks: a Survey[J]. Computer Networks, 2002, 38(4) 393-422.
  • 2Doumit S, Agrawal D. Self-Organized Criticality & Stochastic Learning Based Intrusion Detection System for Wireless Sensot Network[C]// IEEE Military Communications Conference, Monterey, CA, USA, 2003: 609-614.
  • 3Su W, Chang K, Kuo Y. eHIP: An energy-efficient Hybrid Intrusion Prohibition System for Cluster-Based Wireless Sensor Networks[J]. Computer Networks, 2007, 51(4): 1151- 1168.
  • 4Agah A, Das S, Basu K. Intrusion Detection in Sensor Networks: a Non-cooperative Game Approach[C]//IEEE International Symposium on Network Computing and Applications Los Alamitos, CA, USA, 2004:343-346.
  • 5Silva A, Martins M, Rocha B. Decentralized Intrusion Detection in Wireless Sensor Networks[C]// ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Montreal, QB, Canada, 2005:16-23.
  • 6Liu F, Cheng X, Chen D. Insider Attacker Detection in Wireless Sensor Networks[C]//IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007: 1937-1945.
  • 7Meka A, Singh A. Distributed Spatial Clustering in Sensor Networks[J]. Lecture Notes in Computer Science, 2006, 3896 : 980-1000.
  • 8Maronna R, Martin R, Yohai V. Robust Statistics: Theory and Methods[M]. Wiley Publisher. 2006: 175-227.
  • 9Hodge V, Austin J. A Survey of Outlier Detection Methodologies[J]. Artificial Intelligence Review, 2004, 22 (2):85-126.

同被引文献21

  • 1夏克寒,许化龙,张朴睿.粒子滤波的关键技术及应用[J].电光与控制,2005,12(6):1-4. 被引量:34
  • 2方正,佟国峰,徐心和.粒子群优化粒子滤波方法[J].控制与决策,2007,22(3):273-277. 被引量:95
  • 3Akyildiz I F,Su W,Sankarasubramaniam Y,et al.Wireless SensorNetwork:A Survey on Sensor Network[J].IEEE CommunicationsMagazine,2002,40(8):102-114.
  • 4Denning D.EAn Intrusion Detection Model.IEEE Transactions onSoftware Engineering[J].1987,13(2):222-232.
  • 5Lee W,Stolfo S J,Mok K W.Adaptive Intrusion Detection:A DataMining Approach.Artificial Intelligence Review[J].2002,14:533-567.
  • 6Li Guorui.A Distributed Intrusion Detection Scheme for WirelessSensor Networks[J].IEEE DOI10.1109/ICDCS.Workshops.2008.191545-0678/08:310-314.
  • 7Downard I.Simulating Sensor Networks in NS-2[J].TechnicalReport NRL/FR/5522-04-10073,Naval Research Laboratory,Washington,D.C.U.S.A.,May 2004.1-5.
  • 8Heinzelman W B,Chndrakasan A P,Balakrishnan H.An Applica-tion-Specific Protocol Architecture for Wireless Microsensor Net-works[J].IEEE Transaction on Wireless Coinmunications,2002,1(4):660-670.
  • 9Yan K Q,Wang S C,Liu C W.A Hybrid Intrusion Detection System ofCluster-based Wireless Sensor Networks[C]//Proceedings of the In-ternational Multi Conference of Engineers and Computer Scientists,2009,1:978-986.
  • 10陈俊丽 焦李成.支撑矢量机的分类机理研究[J].西安电子科技大学学报,2000,27:106-110.

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部