期刊文献+

无线传感器网络中一种基于能效的入侵检测算法-3N算法研究 被引量:1

Reaserch on Energy-Efficiency Intrusion Detection Algorithm(3N Algorithm) in Wireless Sensor Networks
下载PDF
导出
摘要 识别异常行为是无线传感器网络进行入侵检测的一项重要任务,当识别异常时应使网络的通信开销和能量消耗达到最小.文中提出了一种基于分簇的分布式异常检测算法-3N算法.首先对传感器的测量值进行分簇,再向其它节点传送分簇信息之前对簇进行融合.仿真结果表明,这种分布式方法与集中式方法的检测精度相当,但通信开销大大减少. Identifying misbehaviors is an important task for intrusion detection in wireless sensor networks. The communication overhead and energy consumption should reach the minimum value to the greatest extent in the network when identifying misbehaviors. Our approach to this problem is based on a distributed, cluster-based anomaly detection algorithm, namely 3N algorithm. We minimize the communication overhead by clustering the sensor measurements and merging clusters before sending a description of the clusters to the other nodes. Results show that distributed scheme achieves comparable accuracy compared to a centralized scheme with a significant reduction in communication overhead.
出处 《微电子学与计算机》 CSCD 北大核心 2010年第4期153-157,161,共6页 Microelectronics & Computer
基金 国家"九八五"工程项目
关键词 分布式入侵检测 集中式入侵检测 能效 分簇 合并 融合 仿真 distributed intrusion detection centralized intrusion detection energy-efficiency clustering combination merge simulation
  • 相关文献

参考文献9

  • 1Silva A P da, Martins M. Decentralized intrusion detection iq wireless sensor networks [ C ]// ACM international Workshop on Quality of Service and Security in Wireless and Mobile Networks. Washington, 2005 : 16 - 23.
  • 2Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. CACM, 2004(47) :53- 57.
  • 3Roman R, Zhou J, Lopez J. On the security of wireless sensor networks[ C]//Proceedings of 2005 ICCSA Workshop on Internet Communications Security. Berlin: Springer, LNCS 3482, 2005:681 - 690.
  • 4Szewczyk R, Mainwaring A, Polastre J, et al. An analysis of a large scale habitat monitoring application[ C]//International conference on Embedded networked sensor systems. Baltimore, Maryland, ACM Press, 2004: 214- 226.
  • 5Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami, et al. Distributed anomaly detection in wireless sensor networks[ C]// Communication systems, ICCS 200. 10th IEEE Singapore International Conference. Singapore, 2006 : 1 - 5.
  • 6Raghunathan V, Schurgers C, Park S, et al. Energyaware wireless microsensor networks[J ]. IEEE Signal Processing Magazine, 2002:110- 113.
  • 7周贤伟,王培,覃伯平,申吉红.一种无线传感器网络异常检测技术研究[J].传感技术学报,2007,20(8):1870-1874. 被引量:13
  • 8Chan P K, Mahoney M V, Arshad M H. Learning rules and clusters for anomaly detection in network traffic[C]// Managing Cyber Threats: Issues, Approaches and Challenges. Berlin- Springer, 2005:81-99.
  • 9Chatzigiannakis I, Nikoletseas S, Strikes A. Experimental evaluation of the performance of multi - hop wireless sensor networks[ C]//Proc. 5th IEEE Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP' 06). Greece, 2006 : 579 - 582.

二级参考文献12

  • 1邓聚龙.灰色理论基础[M].武汉:华中科技大学出版社,2002..
  • 2Akyildiz I F,Su W,Sankarasubramaniam Y,and Cayirci E.Wireless Sensor Networks:a Survey[J].Computer Networks,Elsevier Science,2002,38(4):393-442.
  • 3Fei Hu,Neeraj K.Sharma.Security Considerations in Ad Hoc Sensor Networks[J].Ad Hoc Networks,2005,(3):69-89.
  • 4Chris Karlof,David Wagner.Secure Routing in Wireless sensor Networks:Attacks and Countermeasures[C]//First IEEE International Workshop on Sensor Network Protocols and Applications,2003.5.
  • 5Adrian Perrig,John Stankovic,David Wanger.Security in Wireless Sensor Networks[J].Communications of the ACM,2004,47(6):53-57.
  • 6Yongguang Zhang,Wenke Lee.Intrusion Detection in Wireless Ad Hoc Networks[C]//Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom'2000),Boston,MA,2000:275-283.
  • 7Chien Chung Su,Ko Ming Chang,Yau Hwang Kuo.The New Intrusion Prevention and Detection Approaches for Clustering-Based Sensor Networks[J].IEEE Communications So ciety/WCNC 2005:1927-1932.
  • 8Oleg Kachirski,Ratan Guha.Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks[C]//IEEE Workshop on Knowledge Media Networking(KMN'02).Kyoto,JAPAN,2002:153-158.
  • 9Guy Helmer,Johnny s.k.Wong,Vasant Honavar,Les Miller,Yanxin Wang.Lightweight Agents for Intrusion Detection[J].The Journal of Systems and Software,2003,(67):109-122.
  • 10J.Kennedy and R.C.Eberhart,A New Optimizer Using Particles Swarm Theory[C].Sixth International Symposium on Micro Machine and Human Science,Nagoya,Japan,1995.

共引文献12

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部