期刊文献+

面向移动传感网的攻击风险监测系统 被引量:2

Security Risk Monitor System of Mobile Sensor Network
下载PDF
导出
摘要 提出基于稳定性、安全性、簇大小选择和簇首节点合理选择的方法,从逻辑上对整个网络进行了簇的划分并选出最佳簇首节点,引入基于自回归模型的间隙性异常识别,实现了在簇首节点上执行自动检测网络流量异常和自动报警的功能。实验证明了该方法的有效性。 This paper proposed an approach based on stability,security,cluster size selection and rational cluster head node choice,which divides the entire network into clusters logically and selects the best head node.With a intermittent anomaly identification based on the auto-regressive(AR)model,it achieves automatic detection of network traffic anomalies on the head node of the cluster and automatic alarm.Experiments show the effectiveness of the proposed method.
出处 《计算机科学》 CSCD 北大核心 2015年第3期144-147,共4页 Computer Science
基金 江苏省自然科学重大研究项目:无线传感网的安全感知与全域安全控制(BK2011023) 江苏省自然科学基金:无线传感网安全风险的全域感知 评估与控制(BK2011370) 国家自然科学基金:信息系统的安全风险跟踪评价与动态预测(6090302)资助
关键词 攻击风险监测 簇移动传感网 自回归 Monitoring program on risk of attack Cluster Mobile sensor network Auto-regressive
  • 相关文献

参考文献12

  • 1Zhang Yong-guang, et al. Intrusion Detection in Wireless Ad hoc Networks[C]//Proe. of the 6th Annual ACM/ IEEE Interna- tional Conference on Mobile Computing and Networking. Bos- ton: ACM Press, 2000 : 275-283.
  • 2Kaehirski O,Guha R. Effective Intrusion Detection Using Multi- pie Sensors in Wireless Sensor Networks [C]//Proe. of the 36th Hawaii International Conference on System Science. Hawaii, 2003:102-110.
  • 3Venkatraman I., Aagrawal D P. Strategies for Enhancing Rou- ting Security in Protocols for Mobile Ad hoc Networks[J]. Jour- nal of Parallel and Distributed Computing, 2003,63 (2) : 214-227.
  • 4Gomez J,Campbell A T. PARO:Supporting dynamic power con trolled routing in wireless Ad Hoc networks[J]. ACM/Kluwer J. Wireless Networks, 2003,9 (5) : 448-460.
  • 5Toh C-K. Maximum battery life routing to support ubiquitous mobile computing in wireless Ad hoc networks[J]. IEEE Com- municating Magazine, 2001 ( 6 ) : 2-11.
  • 6Rodoplu V, Meng T. Minimum energy mobile wireless networks [J]. IEEE Journal on Selected Areas in Communications, 1999, 17(8) : 1333-1344.
  • 7Wattenhofer T. Distributed topology control for power efficient operation in multihop Ad Hoc networks [C]//Proc. IEEE IN- FOCM Conf: 2001:1388-1397.
  • 8Rappaport S. Wireless communications: principles and practice [M]//Upper Saddle River. NJ: Prentice Hall, 1995 : 72-75.
  • 9Bae S H, Lee S J, Su W, et al. The design, implementation and performance evaluation of the on demand multicast routing pro- tocols in multihop wireless networks[J]. IEEE Network, 2000, 14(1) :70 77.
  • 10Li Qian-mu. Multiple QoS Constraints Finding Paths Algorithm in TMN[J]. Journal of Information,2011,14(3) :223-231.

二级参考文献24

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2易平,蒋嶷川,钟亦平,张世永.移动Ad hoc网络路由协议安全研究[J].计算机科学,2005,32(6):37-40. 被引量:6
  • 3Yi Ping,Hou Yafei,Zhong Yiping,Zhang Shiyong,Dai Zhoulin.Flooding attack and defence in Ad hoc networks[J].Journal of Systems Engineering and Electronics,2006,17(2):410-416. 被引量:5
  • 4Corson S, Macker J. Mobile Ad hoc Networking(MANET): Routing Protocol Performance Issues and Evaluation Considerations[S]. RFC 2501. January 1999.
  • 5Ramkumar M, Memon N. An Efficient Key Predistribution Scheme for Ad Hoc Network Security[J]. IEEE Journal on Selected Areas of Communication, 2005,23 (3) : 611-621.
  • 6Zhu Sencun, Xu Shouhuai, Setia S, et al. LHAP: A lightweight network access control protocol for ad hoc networks[J]. Ad Hoc Networks, 2006,4(5): 567-585.
  • 7Argyroudis P G, O' Mahony D. Secure routing for mobile ad hoc networks [J]. IEEE Communications Surveys & Tutorials, 2005,7(3) :2-21.
  • 8Zhou Lidong, Haas Z J. Securing ad hoc networks [J]. IEEE Networks Special Issue on Network Security, November/December 1999.
  • 9Capkun S, Nuttyan L, Hubaux J-P. Self-organized public-key Management for mobile ad hoc networks[J]. IEEE Transactions on mobile computing, 2003,2 (1).
  • 10Papadirnitratos P, Haas Zo Secure routing for mobile ad hoc networks[C] //Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference. San Antonio,TX,January 2002.

共引文献2

同被引文献13

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部