期刊文献+

无线传感器网络自适应拓扑的入侵容忍概述

Overview of the Intrusion Tolerance Under the Adaptive Topology in Wireless Sensor Network
下载PDF
导出
摘要 提出了一种无线传感器网络中自适应拓扑的入侵容忍方法,在拓扑结构层次不分明的网络中,部分节点受到攻击不会导致网络瘫痪,采用隔离的手段可以容忍入侵对网络产生的安全威胁。而在分簇拓扑网络中,骨干节点受到攻击会对网络的正常运行造成影响,采用冗余的手段可以使网络能够容忍这种入侵。 This paper proposes a wireless sensor network intrusion tolerance approach with adaptive topology. By using dais approach, networks where topology layersare not clear may not be brought down whenpart of the nodes are attacked. The use of isolation can tolerate the intrusion. While in clustering topology networks, attack on backbone nodes will affect the normal operation of the network, redundancy can be used to tolerate the intrusion.
作者 王一帆 常亚
机构地区 重庆邮电大学
出处 《现代电信科技》 2013年第1期47-48,52,共3页 Modern Science & Technology of Telecommunications
关键词 无线传感网 WSN 自适应拓扑 入侵容忍 wireless sensor network, WSN, adaptivetopology, intrusion tolerance
  • 相关文献

参考文献4

二级参考文献49

  • 1黄建华,宋国新.入侵容忍技术在身份认证系统中的应用[J].华东理工大学学报(自然科学版),2005,31(3):350-353. 被引量:10
  • 2PAL P, WEBBER F, SCHANTZ R E, et al. Intrusion Tolerant Systems [ C ] //Proceedings of the IEEE Information Survivability Workshop (ISW-2000). Boston, Massachusetts: [ s. n. ], 2000: 24-26.
  • 3PAULO ESTEVES VERISSIM, NUNO FERREIRA NEVES, MIGUEL PUPO CORREIA. Intrusion-Tolerant Architectures: Concepts and Design [ C] //Architecting Dependable Systems. [ S.l. ]: Springer-Verlag, 2003: 3-36.
  • 4MICHAEL E WHITMAN,HERBERT J MATTORD.信息安全原理[M].第2版.北京:清华大学出版社,2006.
  • 5JAYNARAYAN H LALA. Intrusion Tolerant Systems [ C ] //Presentation on 2000 Pacific Rim International Symposium on Dependable Computing. Los Angeles, California: [s. n. ], 2000: 3.
  • 6PAULO SOUSA, ALYSSON NEVES BESSANI, MIGUEL CORREIA, et al. Resilient Intrusion Tolerance through Proactive and Reactive Recovery [ C] //Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing. Washington, DC, USA: IEEE Computer Society, 2007: 373-380.
  • 7DR FEIYI WANG, GONG FENGMIN, SARGOR C. SITAR: A Scalable Intrusion Tolerant Architecture for Distributed Services [ C] //Proceedings of 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop. New York: IEEE Press, 2001 : 1-8.
  • 8DAZHI WANG, BHARAT B MADAN, KISHOR S TRIVEDI. Security Analysis of SITAR Intrusion Tolerance System [ C ] //Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems: in Association with 10th ACM Conference on Computer and Communications Security 2003. New York, NY, USA: ACM, 2003 : 23-32.
  • 9WANG Xi, GUO Zhen-yu, LIU Xue-zeng, et al. Hang Analysis: Fighting Responsiveness Bugs [ C] //Proceedings of the 3rd ACM SIGOPS/European Conference on Computer Systems 2008. New York, NY, USA: ACM, 2008: 177-190.
  • 10ALYSSON NEVES BESSANI, EDUARDO PELISON ALCHIERI, MIGUEL CORREIA, et al. DepSpace: A Byzantine Fault- Tolerant Coordination Service [ C ]//Proceedings of the 3rd ACM SIGOPS/European Conference on Computer Systems 2008. New York, NY, USA: ACM, 2008: 163-176.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部