期刊文献+

基于核Fisher判别分析的无线传感器网络入侵检测算法 被引量:8

An Intrusion Detection Algorithm for WSN Based on Kernel Fisher Discriminant
下载PDF
导出
摘要 无线传感器网络能量有限、计算能力有限,传统网络中的入侵检测方法不适用于无线传感器网络。提出了一种基于核Fisher判别分析的无线传感器网络入侵检测算法,利用核Fisher判别分析对比传感器节点数据和已建立的入侵行为特征来判断是否存在入侵行为。理论分析和仿真实验表明,该方法能有效的检测入侵行为,并且具有低能耗、计算量小的特点,适用于计算能力有限、能量紧缺的无线传感器网络入侵检测。 As the energy and computing ability are limited in wireless sensor networks,so almost all of the traditional network intrusion detection schemes cannot be applied efficiently.In order to overcome the weaknesses,a intrusion detection algorithm for WSN based on Kernel Fisher Discriminant(KFDA)is proposed.The method exploits KFDA by comparing the sensor node data and established behavioral characteristics to determine whether there is intrusion.Theoretical analysis and simulation results show that the proposed scheme not only can detect intrusions effectively,but also can apply to intrusion detection for WSN which require computing ability and limited energy less than others.
出处 《传感技术学报》 CAS CSCD 北大核心 2012年第2期246-250,共5页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(60842006)
关键词 无线传感器网络 入侵检测 核FISHER判别分析 模式识别 WSN intrusion detection Kernel Fisher Discriminant pattern recognition
  • 相关文献

参考文献12

二级参考文献34

  • 1Akyildiz I, Su W, Sankarasubramaniam Y. Wireless Sensor Networks: a Survey[J]. Computer Networks, 2002, 38(4) 393-422.
  • 2Doumit S, Agrawal D. Self-Organized Criticality & Stochastic Learning Based Intrusion Detection System for Wireless Sensot Network[C]// IEEE Military Communications Conference, Monterey, CA, USA, 2003: 609-614.
  • 3Su W, Chang K, Kuo Y. eHIP: An energy-efficient Hybrid Intrusion Prohibition System for Cluster-Based Wireless Sensor Networks[J]. Computer Networks, 2007, 51(4): 1151- 1168.
  • 4Agah A, Das S, Basu K. Intrusion Detection in Sensor Networks: a Non-cooperative Game Approach[C]//IEEE International Symposium on Network Computing and Applications Los Alamitos, CA, USA, 2004:343-346.
  • 5Silva A, Martins M, Rocha B. Decentralized Intrusion Detection in Wireless Sensor Networks[C]// ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Montreal, QB, Canada, 2005:16-23.
  • 6Liu F, Cheng X, Chen D. Insider Attacker Detection in Wireless Sensor Networks[C]//IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007: 1937-1945.
  • 7Meka A, Singh A. Distributed Spatial Clustering in Sensor Networks[J]. Lecture Notes in Computer Science, 2006, 3896 : 980-1000.
  • 8Maronna R, Martin R, Yohai V. Robust Statistics: Theory and Methods[M]. Wiley Publisher. 2006: 175-227.
  • 9Hodge V, Austin J. A Survey of Outlier Detection Methodologies[J]. Artificial Intelligence Review, 2004, 22 (2):85-126.
  • 10DOUMIT S,AGRAWAL D P.Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network[C]//Proc of the IEEE Military Communications Conference.2003:609-614.

共引文献58

同被引文献75

  • 1郝永志,陈俊杰.基于数据压缩的无线传感器网络节能方法[J].华中科技大学学报(自然科学版),2008,36(S1):232-234. 被引量:5
  • 2蒋杰,方力,张鹤颖,窦文华.无线传感器网络最小连通覆盖集问题求解算法[J].软件学报,2006,17(2):175-184. 被引量:90
  • 3高建良,徐勇军,李晓维.基于加权中值的分布式传感器网络故障检测(英文)[J].软件学报,2007,18(5):1208-1217. 被引量:38
  • 4雷霖,代传龙,王厚军.基于Rough set理论的无线传感器网络节点故障诊断[J].北京邮电大学学报,2007,30(4):69-73. 被引量:23
  • 5Kichun Jo. Interacting Multiple Model Filter-Based Sensor Fusion of GPS With In-Vehicle Sensors for Real-Time Vehicle Positioning [ J ]. 1EEE Transactions on Intelligent Transportation Systems, 2012,13( 1 ) :329-343.
  • 6Want R, Hopper A, Falco V. The Active Badge Location System [ J]. ACM Transactions on information Systems, 1992, i0( 1 ):91 -102.
  • 7Priyantha N B, Chakraborty A, Balakrishnan H. The Cricket Location-Support System[ C ]//Proceedings of the 6th Annual In- ternational Conference on Mobile Computing and Networking ( MobiCom' 00 ) , Boston, USA: IEEE Mobile Computing and Networking, 2000 : 32 -43.
  • 8Moustafa Youssef, Matthew Mah, Ashok Agrawala. Challenges: Device-Free Passive Localization for Wireless Environments [ C l// Proceedings of the 13th Annual ACM international Conference on Mobile Computing and Networking ( MobiCom' 07 ), Montreal, Canada:IEEE Mobile Computing and Networking,2007:222-229.
  • 9Moussa M, Youssef M. Smart Devices for Smart En'Jirnnments: Device-Free Passive Detection in Real Environments [ C ]//IEEE International Conference on Pervasive Computing and Communications ( PerCom 2009 ), Galveston, America: IEEE Pervasive Computing and Communications,2009:1-6.
  • 10Jie Yang,Yong Ge ,Hui Xiong. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments [ C ]// Proceedings of IEEE Infocom 2010, San Diego, CA : IEEE lnfocom, 2010:1-9.

引证文献8

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部