期刊文献+

无线传感器网络安全与入侵检测研究 被引量:3

Wireless Sensor Networks Security and Intrusion Detection Research
下载PDF
导出
摘要 分析了影响无线传感器网络安全的因素和特点,比较了典型攻防策略,研究了无线传感器网络入侵检测模型,比较、分析了典型入侵检测算法,讨论了无线传感器网络安全待解决的问题及发展方向. The influence elements and features of wireless sensor networks security are analyzed. Typical case attack and defense strategy are compared. Intrusion detection model of wireless sensor networks is researched, typical case intrusion detection algorithms are compared and analyzed. And problems to be solved and development direction of wireless sensor networks security are discussed.
出处 《新乡学院学报》 2013年第2期126-130,共5页 Journal of Xinxiang University
基金 安徽省高校自然科学基金项目(jk2012z281) 滁州学院自然科学基金项目(2011kj005B 2011kj006B)
关键词 无线传感器网络 安全 入侵检测 wireless sensor networks security intrusion detection
  • 相关文献

参考文献15

  • 1ESTRIN D, GOVINDAN R, HEIDEMANN J. Next Century Challenges: Scalable Coordination in Sensor Networks[C] /lProc of the 5 th Annual International Conference on Mobile Computing and Networks, 1999: 263-270.
  • 2AGRG J, CLARE L. An Integrated Architecture for Cooperative Sensing Networks[J]. IEEE Computer Magazine, 2000, 33(5): 106-108.
  • 3CHAN H W, PERRING A. Security and Privacy in Sensor Networks[J]. IEEE Computer, 2003, 36(10): 103 -105.
  • 4DENNING D E. An Intrusion Detetion Model[J]. IEEE Transon Software Engineering, 1987, 13(2): 222-232.
  • 5AKYILDIZ IF, SU W, SANKARASUBRAMANIAM Y, et al. A Survey on Sensor Networks[J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
  • 6KAVITHA T, SRIDHARAM D. Security Vulnerabilities in Wireless Sensor Networks: A Survey[J]. Journal of Informati?on Assurance and Security, 2010(5): 031-044.
  • 7曹晓梅,韩志杰,陈贵海.基于流量预测的传感器网络拒绝服务攻击检测方案[J].计算机学报,2007,30(10):1798-1805. 被引量:33
  • 8ZHANG Q H, WANG P, REEVES D S, et al. Defending Against Sybil Attacks in Sensor Networks[C]/I In Proc. of the 25th IEEE International Conference on Distributed Computing Systems Workshops. USA: IEEE Press, 2005: 185-191.
  • 9DELGOSHA F, FEKRI F. Key Pre-distribution on Wireless Sensor Networks Using Multivariate Polynomials[C]. /lIEEE Commun Soc Conf Sensor and Ad Hoc Commun and Networks (SECON'05). USA: IEEE Press, 2005: 118-129.
  • 10ONAT I, MIRI A. An Intrusion Detection System for Wireless Sensor Networks[C]IIProc of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications(WMi OB2005), 2005: 253-259.

二级参考文献32

  • 1曾鹏,梁韡,王军,于海斌.一种基于生物免疫原理的无线传感器网络安全体系[J].小型微型计算机系统,2005,26(11):1907-1910. 被引量:10
  • 2俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 3张重庆,李明禄,伍民友.数据收集传感器网络的负载平衡网络构建方法[J].软件学报,2007,18(5):1110-1121. 被引量:29
  • 4Onat I,Miri A.An Intrusion Detection System for Wireless Sensor Networks[C] ∥Proc of the IEEE Int'l Conf on Wireless and Mobile Computing,Networking and Communications,2005:253-259.
  • 5Loo C E,Ng M Y,Leckie C,et al.Intrusion Detection for Routing Attacks in Sensor Networks[J].International Journal of Distributed Sensor Networks,2006,2(4):313-332.
  • 6Rajasegarar S,Leckie C,Palaniswami M,et al.Distributed Anomaly Detection in Wireless Sensor Networks[C] ∥Proc of the 10th IEEE Singapore Int'l Conf on Communication System,2006:1-5.
  • 7Doumit S,Agrawal D P.Self-Organized Criticality and Stochastic Learning Based Intrusion Detection System for Wireless Sensor Networks[C] ∥Proc of the IEEE Military Communications Conf,2003:609-614.
  • 8Deng J,Han R,Mishra S.Defending Against Path-Based DoS Attacks in Wireless Sensor Networks[C] ∥Proc of the 3rd ACM on the Security of Ad Hoc and Sensor Networks,2005:89-96.
  • 9Agah A,Das S K,Basu K,et al.Intrusion Detection in Sensor Networks:A Non-Cooerative Game Approach[C] ∥Proc of the 3rd IEEE Int'l Symp on Network Computing and Application,2004:343-346.
  • 10Demirkol I,Alagoz F,Delic H,et al.Wireless Sensor Networks for Intrusion Detection:Packet Traffic Modeling[J].IEEE Communications Letters,2006,10(1):22-24.

共引文献43

同被引文献37

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2余成波,李洪兵,陶红艳.无线传感器网络实用教程[M].北京:清华大学出版社.2012.
  • 3雷吉成.物联网安全技术[M].北京:电子工业出版社,2012:34-35.
  • 4杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2011.
  • 5Tan C C, Sheng B, and Li Q. Secure and severless RFID authen- tication and search protocols[ C ] //Proc of the 5th Annual IEEE International Conference on Pervasive Computing and Communi- cations, New York :IEEE ,2007:24 -29.
  • 6Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, etal. Se- cure tag search in RFID systems using mobile readers [ J ]. IEEE Transactions on Dependable and Secure Computing ,2014, (99) :.
  • 7Juels A,Pappu R. Squealing Euros:Privacy Protection in RFID- Enabled Banknotes [ C ]. Financial Cryptography. Springer Ber- lin Heidelberg,2003 : 103 -121.
  • 8Go|le P, Jakobsson M, Juels A. Syverson universal re-eneryption for mixnets [ C ]//The Cryptographers' Track at the RSA Confe- rence 2004, San Francisco, CA, USA ,2004 : 163 -178.
  • 9Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hos- seinzadeh. A novel mutual RFID authentication protocol with low complexity and high security[J]. International Journal of Modem Education and Computer Science ( IJMECS ) , 2014,6 ( 1 ) : 17 - 24.
  • 10Hua Man, Li Yanling. Security authentication protocol analysis and security issue of RFID [ C ]Jj2011 2nd International Confe- rence on Management Science and Engineering, MSE 2011, En- gineering Technology ,2011.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部