期刊文献+

一种基于MA的无线传感器网络IDS模型研究 被引量:2

A Mobile Agent-Based IDS for Wireless Sensor Networks
下载PDF
导出
摘要 本文针对分簇式无线传感器网络的特点,将入侵检测技术与移动Agent技术相结合,提出一种基于MA的无线传感器网络入侵检测方案,采用多个Agent模块分布协作,运用一种基于聚类的入侵检测算法,从而达到提高无线传感器网络的安全性、可靠性,降低入侵检测能量消耗的目的。 According to the characteristics of wireless sensor networks, with the intrusion detection technology combined with the mobile agent technology, we propose a mobile agent-based wireless sensor network intrusion detection scheme, with several agent blocks in cooperation and distribution, using a clustering-based intrusion detection algorithm, in order to im- prove the security and reliability of wireless sensor networks, and lower the power consumption of intrusion detection.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第5期18-20,25,共4页 Computer Engineering & Science
基金 安徽省高等学校省级优秀青年人才基金资助项目(2009SQRZ177) 安徽省高校省级自然科学研究资助项目(KJ2009B145Z)
关键词 网络安全 无线传感器网络 入侵检测 MA network security wireless sensor network intrusion detection mobile Agent
  • 相关文献

参考文献12

  • 1裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:94
  • 2Rajasegarar S, Leckie C, Palaniswami M, et al. Distributed Anomaly Detection in Wireless Sensor Networks[C]//Proc of the 10th IEEE Singapore Int'l Conf on Communication System, 2006 : 1-5.
  • 3俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 4DU Wen Liang, FANG Lei, PENG Ning. LAD: Localization Anomaly Detection for Wireless Sensor Networks[J]. Journal of Parallel and Distributed Computing, 2006, 66 ( 7 ) : 874- 886.
  • 5Cagalj M, Capkun S, Hubaux J. Wormhole-Based Anti-Jamming Techniques in Sensor Networks [J]. IEEE Trans on Mobile Computing, 2007,6(1) : 100-114.
  • 6Su W T, Chang K M, Kuo Y H. eHIP:An Energy Efficient Hybrid Intrusion Prohibition System for Cluster-Based Wireless Sensor Networks [J]. Computer Networks, 2007, 51 (4) : 1151-1168.
  • 7Hsieh M Y, Huang Y M, Chao H C. Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks[J]. Computer Communications, 2007,30(11-12): 2385-2400.
  • 8XIAO Bin, YU Bo, GAO Chuan shan. CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks[J]. Journal of Parallel and Distributed Computing, 2007,67 ( 11 ): 1218- 1230.
  • 9ZHANG Yan chao, LIU Wei, LOU Wen jing, et al. Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24(2):247-260.
  • 10Agah A,Das S K. Preventing DoS Attacks in Wireless Sen sor Networks: A Repeated Game Theory Approach[J]. In ternational Journal of Network Security, 2007, 5 (2) : 145-153.

二级参考文献78

共引文献119

同被引文献16

  • 1Rajasegarar S,Leckie C,Palaniswami M,et a1.Distributed anom-aly detection in wireless sensor networks[C]//Proc of the10th IEEE Singapore Int’l Conf on Communication System,2006:1-5.
  • 2Krontiris I,Benenson Z,Giannetsos T,et al.Cooperative intrusion detection in wireless sensor networks[C]//LNCS5432:EWSN2009,2009:263-278.
  • 3Abduvaliyev A,Lee S Y,Lee Y K.Energy efficient hybrid intru-sion detection system for wireless sensor networks[C]//Interna-tional Conference on Electronics and Information Engineering,2010,2:25-29.
  • 4Roman R,Zhou Jianying,Lopez J.Applying intrusion detection systems to wireless sensor networks[C]//Consumer Communica-tions and Networking Conference,2006,1:640-644.
  • 5Crossbow Technology,Inc.MICA2,wireless measurement sys-tem[EB/OL].http://www.xbow.com.
  • 6Onat I,Miri A.An intrusion detection system for wireless sensor networks[C]//IEEE International Conference on Wireless and Mo-bile Computing,Networking and Communications,2005.
  • 7Banerjee S,Grosan C,Abraham A.IDEAS:intrusion detection based on emotional ants for sensors[C]//The5th International Confer-ence on Intelligent Systems Design and Applications,2005.
  • 8Techateerawat P,Jennings A.Energy efficiency of intrusion de-tection systems in wireless sensor networks[C]//IEEE/WIC/ACM International Conference on Web Intelligence and International Agent Technology Workshops,2006.
  • 9Loo C E,Ng M Y,Leckie C,et al.Intrusion detection for rout-ing attacks in sensor networks[J].International Journal of Distrib-uted Sensor Networks,2006,2(4):313-332.
  • 10Agah A,Basu K,Das S K.Security enforcement in wireless sen-sor networks:a framework based on non-cooperative games[J].Pervasive and Mobile Computing,2006,2(2):137-158.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部