期刊文献+

一种基于无线传感器网络的入侵检测技术

An Intrusion Detection Technology Based on Wireless Sensor Networks
下载PDF
导出
摘要 描述了关于WSN(无线传感器网络)入侵检测的基本方法,并依据该方法建立了对应的数学模型。详细分析并归纳了基于WSN运行的网络关键特性,同时设计了一个通用的入侵检测模型,该模型具有耗能小、检测速度快等优点。 This paper described the basic methods on WSN( Wireless Sensor Networks) intrusion detection technology, and the corresponding mathematical model was established according to the method. The key features of network-based WSN run were detailedly analyzed and summarized; meanwhile a common intrusion detection model was designed, which had advantages of low energy consumption and fast testing speed.
作者 穆瑞辉
出处 《新乡学院学报》 2016年第3期33-36,共4页 Journal of Xinxiang University
关键词 WSN 入侵检测 网络特性 WNS intrusion detection network features
  • 相关文献

参考文献6

二级参考文献92

  • 1PERRIG A,SZEWCZYK R,WEN V et al.SPINS:security protocols for sensor networks[J].Wireless Networks Journal,2002,8(5):521-534.
  • 2KARLOF C,SASTRY N,WAGNER D.TinySec:a link layer security architecture for wireless sensor networks.in ACM sen-sys[C].2004.
  • 3LIU D,NING P,DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C].In the 25th International Conference on Distributed Computing Systems,2005.
  • 4MALAN D J,WELSH M,SMITH M.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C].In IEEE SECON,2004:71-80.
  • 5PRZYDATEK B,SONG D,PERRIG A.SIA:secure information aggregation in sensor networks[C].In Proceedings of ACM Sen-Sys,2003:255-265.
  • 6ZHU S.An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks[C].IEEE Symposium on Security and Privacy,2004.
  • 7DENG J.A performance evaluation of intrusion-tolerant routing in wireless sensor networks[C].California:In 2nd International Workshop on Information Processing in Sensor Networks (IPSN 03),2003.
  • 8DENG J,HAN R,MISHRA S.Countermeasures against traffic analysis attacks in wireless sensor networks[R].Technical report,CU-CS-987-04,2004.
  • 9ESCHENAUER L,GLIGOR V D.A key-management scheme for distributed sensor networks[C].New York:In ACM Conference on Computer and Communications Security,ACM Press,2002:41-47.
  • 10CHAN H,PERRIG A,SONG D.Random key pre-distribution schemes for sensor networks[C].IEEE Symposium on Security and Privacy,2003:197-213.

共引文献1724

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部