期刊文献+

无线传感器网络的身份认证体系研究

Research on the Identity Authentication System of Wireless Sensor Network
下载PDF
导出
摘要 针对传统的BP神经网络所具有的算法收敛速度慢、容易陷入局部极小等固有缺陷,文章提出了一种优化改进算法的BP神经网络,并利用其构建了分布式入侵检测模型。通过仿真实验证明,该入侵检测模型不仅具有良好的全局搜索能力,而且算法收敛速度较快,具有极佳的入侵检测效果。 Research found that the traditional BP neural networks, the algorithm adopted by the slow convergence speed and easy to fall into local minimum inherent defects. This paper proposes a optimization algorithm for BP neural networks, and create a distributed intrusion detection model. Through the simulation experiments show that this model not only has good global search ability, and the algorithm convergence speed faster, intrusion detection has excellent effect.
作者 徐振华
出处 《无线互联科技》 2016年第3期11-12,28,共3页 Wireless Internet Technology
关键词 BP神经网络 分布式入侵检测模型 构建 BP neural networks distributed intrusion detection model construction
  • 相关文献

参考文献3

二级参考文献59

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2肖德琴,冯健昭,杨波,张焕国.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87. 被引量:11
  • 3杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2010.
  • 4LUK M, PERRIG A, WHILLOCK B. Seven cardinal properties of sensor network broadcast authentication [ C]// SASN'06: Proceed- ings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2006: 147-156.
  • 5PERRIG A, SZEWCZYK R, TYGAR J D, et al. SPINS: security protocols for sensor networks [ J]. Wireless Networks, 2002, 8(5) : 521 -534.
  • 6WATRO R, KONG D, CUTI S-F, et al. TinyPK: securing sensor networks with public key technology [ C]// Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004:59-64.
  • 7MALAN D J, WELSH M, SMITH M D. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography [ C] // Proceedings of the 1 st IEEE International Conference on Sen- sor and Ad Hoc Communications and Networks. Piscataway: IEEE Press, 2004:71-80.
  • 8BAUER K, LEE H. A distributed authentication scheme for a wire- less sensing system [ J]. ACM Transactions on Information and Sys- tem Security, 2008, 11(3): 1-35.
  • 9di PIETRO R, SORIENTE C, SPOGNARDI A, et al. Collaborative authentication in unattended WSNs [ C]//WiSec'09: Proceedings of the Second ACM Conference on Wireless Network Security. New York: ACM Press, 2009:237-244.
  • 10BONEH D, FRANKLIN M. Identity-based encryption from the Well pairing [ C]/! Proceedings of the 21st Annual International Cryptolo- gy Conference on Advances in Cryptology. Berlin: Springer-Verlag, 2001:213-229.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部