期刊文献+

基于支持向量机的无线传感器网络的入侵检测系统 被引量:9

Intrusion detection system for WSNs based on SVM
下载PDF
导出
摘要 无线传感器网络入侵检测方法是目前的研究热点。在介绍支持向量机(SVM)原理、无线传感器网络的入侵类型以及不同类型所具有的数据特性的基础上,提出了一种基于SVM的无线传感器网络的入侵检测系统,该系统把网络拓扑分为簇成员、簇头和Sink三层结构,每层均能根据SVM的训练结果进行入侵检测的判断。实验结果表明:该检测系统具有较高的检测率和较低的能量消耗。 Intrusion detection method for wireless sensor networks (WSNs) is current research hot spot. On the basis of introductions of the principle of support vector machine( SVM), WSNs intrusion types and characteristics of different types of data, an intrusion detection system for WSNs based on SVM is put forward. This system divides network topology into three layers structure, which are cluster members, cluster header and Sink node, and each layer can execute judgment of intrusion detection according to SVM training results. The experimental results show that the detection system has characteristics of higher detection rate and low energy consumption.
作者 汪淑丽
出处 《传感器与微系统》 CSCD 北大核心 2012年第7期73-76,共4页 Transducer and Microsystem Technologies
关键词 无线传感器网络 支持向量机 入侵检测 分层结构 wireless sensor networks ( WSNs ) support vector machine (SVM) intrusion detection hierarchical layer
  • 相关文献

参考文献9

  • 1Leonardo M, Alfredo N. Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks [ J ]. International Journal on Distributed Sensor Networks,2008,4(2) :83-109.
  • 2Wang Yun,Wang Xiaodong, Xie Bin, et al. Intrusion detection in homogeneous and heterogeneous wireless sensor networks [ J ]. IEEE Transaction on Mobile Computing,2008,7 ( 6 ) : 698 -711.
  • 3祝琦,宋如顺,姚永仙.无线传感器网络中基于SVM的合作型入侵检测系统[J].计算机应用研究,2010,27(4):1489-1492. 被引量:6
  • 4王骐,王殊,孟中楼.无线传感器网络中一种基于接收功率异常的入侵检测算法[J].计算机科学,2009,36(3):34-37. 被引量:6
  • 5Vapnie V. Statistical learning theory [ M ]. New York : Wiley, 1998 : 16 -31.
  • 6萧嵘,王继成,张福炎.支持向量机理论综述[J].计算机科学,2000,27(3):1-3. 被引量:35
  • 7Chong E L,Mun Y N,Christopher L,et al. Intrusion detection for routing attacks in sensor networks [ J ]. International Journal on Distributed Sensor Networks,2006,2 (4) :313 -332.
  • 8A library for support vector machines [ E B/OL]. [ 2011-10-05 ]. http://www, csie. ntu. edu. tw/ -cjlin/libsvm/index. html.
  • 9Wendi B H, Anantha P C, Hari B. An application-sepcific protocol archietecture for wireless microsensor networks [ J ]. IEEE Transactions on Wireless Communications ,2002,1 (4) :660 -670.

二级参考文献37

  • 1覃伯平,周贤伟,杨军.无线传感器网络路由协议的攻击检测模型[J].计算机工程,2007,33(2):117-119. 被引量:3
  • 2Chee Y, Rabaey J, Niknejad A. A class A/B low power amplifier for wireless sensor networks[C]//Proceedings of the 2004 International Symposium on Circuits and Systems. 2004, 4: 409- 412
  • 3Karlof C , Wagner D. Secure routing in wireless sensor net - works:Attacks and countermeasures[C] // Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications. May 2003:113-127
  • 4Huang Y A , Lee W. A cooperative intrusion detection system for ad hoc networks[C]//Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM Press, 2003:135-147
  • 5Vigna G, Gwalani S, Srinivasan K, et al. An intrusion detection tool for AODV-based ad hoc wireless networks[C]///Proceedings of the 20th Annual Computer Security Applications Conference. 2004 : 16-27
  • 6Xu Y, Heidemann J, Estrin D. Geography-informed Energy Conservation for Ad-hoc Routing[C]//Proc. of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking. 2001 : 70-84
  • 7Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks[J]. Communications of the ACM, 2005,47 (6)
  • 8Lamport L,Shostak R, Pease M. The Byzantine Generals Problem[J]. ACM Transaction Programming Languages and Systems, 1982,4(3) : 382-401
  • 9Chan H , Perrig A , Song D. Random Key Predistribution Sch emes for Sensor Networks[C]//IEEE Symposium on Research in Security and Privacy. May 2003
  • 10Zhang Y, Lee W, Huang Y A. Intrusion detection techniques for mobile wireless networks [J]. Wireless Networks, 2003,9 (5) : 545-556

共引文献44

同被引文献64

引证文献9

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部