期刊文献+

无线传感器网络路由协议的攻击检测模型 被引量:3

Attack Detection Model Based on Routing Protocol in Wireless Sensor Networks
下载PDF
导出
摘要 针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。该模型利用灰理论建模所需数据较少的特点,结合各节点分担检测任务的方法,可节约检测攻击行为所需耗能。通过各节点的数据采集、分析和节点间的联合检测与响应,预测攻击行为的发生,建立适合无线传感器网络特性的攻击行为预测模型,提高了路由协议的安全性,给出了检测模型框架和建模算法具体步骤,仿真实验证明该模型是有效的。 To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory(GADM). Utilizing features of grey theory that less data is needed in model construction, and method that each node undertakes detection tasks, this model will save energy consumed in attack detection. Through data collection and analysis on each node and combined detection and response between nodes, attack behavior can be forecasted and a forecasting model on attacks for wireless network is constructed, therefore security of routing protocols is effectively improved. It provides frameworks of the attack detection model and specific process of formulation for constructing the model. An emulation experiment proves the affectivity of the model.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第2期117-119,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60573050)
关键词 无线传感器网络 路由协议 攻击检测 模型 灰论 Wireless sensor networs Routing protocol Attack detection Model Grey theory
  • 相关文献

参考文献12

  • 1Akyildiz L F,Su W L,Sankarasubramaniam Y,et al.A Survey on Sensor Networks[J].IEEE Communications Magazine,2002,40(8):102-114. 被引量:1
  • 2李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展[J].软件学报,2003,14(10):1717-1727. 被引量:622
  • 3马祖长,孙怡宁,梅涛.无线传感器网络综述[J].通信学报,2004,25(4):114-124. 被引量:463
  • 4Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[J].Ad Hoc Networks,2003,(1),293-315. 被引量:1
  • 5蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 6Zhang Y,Lee W.Intrusion Detection Techniques for Wireless Networks[J].ACM/Kluwer Wireless Networks Journal,2003,9(5):545-556. 被引量:1
  • 7Rajgopal K,Sarangi S,Sibabrata R,et al.Minimal Sensor Integrity:Measuring the Vulnerability of Sensor Grids[J].Information Processing Letters,2003,24(86):49-55. 被引量:1
  • 8Ray s,Starobinski D,Trachtenberg A,et al.Robust location Detection with Sensor Networks[J].IEEE Journal on Selected Areas in Communications,2004,22(6):1016-1024. 被引量:1
  • 9Jolly V,Kimura N,Latifi S,et al.Loop Detection in MPLS for Wireless Sensor Networks[J].Microprocessors & Microsystems,2004,28(8):439-445. 被引量:1
  • 10Krishnamachari B,Lyengar S.Distributed Bayesian Algorithms for Fault-tolerant Event Region Detection in Wireless Sensor Networks[J].IEEE Transactions on Computers,2004,53(3):241-250. 被引量:1

二级参考文献76

  • 1Ganesan D, Govindan R, Shenker S, Estrin D. Highly-Resilient, energy-efficient multipath muting in wireless sensor networks.Mobile Computing and Communications Review, 2002,1(2):295-298. 被引量:1
  • 2Braginsky D, Estrin D. Rumor routing algorithm for sensor networks. In: Raghavendra CS, ed. Proceedings of the 1st Workshop on Sensor Networks and Applications. New York: ACM Press, 2002. 被引量:1
  • 3Girod L, Bychkovskiy V, Elson J, Estrin D. Locating tiny sensors in time and space: A case study. In: Manoli Y, Kim KS, eds.Proceedings of the International Conference on Computer Design. Piscataway: IEEE Press, 2002. 195-204. 被引量:1
  • 4Bulusu N, Estrin D, Girod L, Heidemann J. Scalable coordination for wireless sensor networks: Self-Configuring localization systems. 2001. http://lecs.cs.ucla.edu/-bulusu/papers/Bulusu01c.html. 被引量:1
  • 5Cerpa A, Estrin D. ASCENT: Adaptive self-configuring sensor networks topologies. In: Kermani P, ed. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2002.101-111 被引量:1
  • 6Elson J. Time synchronization services for wireless sensor networks. In: Kumar V, ed. Proceedings of the 15th International Parallel & Distributed Processing Symposium. 2001. Los Alamitos: IEEE Computer Press, 2001. 1965-1970. 被引量:1
  • 7Ye W, Heidemann J, Estrin D. An energy-efficient MAC protocol for wireless sensor networks. In: Kermani P, ed. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press,2002.91-100. 被引量:1
  • 8Heidemann J, Silva F, Intanagonwiwat C. Building efficient wireless sensor networks with low level naming. In: Marzullo K, ed.Proceedings of the 18th ACM Symposium on Operating System Principles. New York: ACM Press, 2001. 146-159. 被引量:1
  • 9Intanagonwiwat C, Govindan R, Estrin D, Heidemann J, Silva F. Directed diffusion for wireless sensor networking. ACM/IEEE Transactions on Networking, 2002, 11(1):2-16. 被引量:1
  • 10Liu J, Cheung P, Ouibas L, Zhao F. A dual-space approach to tracking and sensor management in wireless sensor networks. In:Reghavendrv CS, ed. Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications. New York:ACM Press, 2002. 162-173. 被引量:1

共引文献1422

同被引文献24

  • 1郭渊博,马建峰.基于博弈论框架的自适应网络入侵检测与响应[J].系统工程与电子技术,2005,27(5):914-917. 被引量:9
  • 2周大铨,苗辉,何晓东.博弈模型在传感器网络安全中的应用[J].信息安全与通信保密,2006,28(11):148-150. 被引量:1
  • 3常卫东,王正华,鄢喜爱.基于集成神经网络入侵检测系统的研究与实现[J].计算机仿真,2007,24(3):134-137. 被引量:29
  • 4Chee Y, Rabaey J, Niknejad A. A class A/B low power amplifier for wireless sensor networks[C]//Proceedings of the 2004 International Symposium on Circuits and Systems. 2004, 4: 409- 412 被引量:1
  • 5Karlof C , Wagner D. Secure routing in wireless sensor net - works:Attacks and countermeasures[C] // Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications. May 2003:113-127 被引量:1
  • 6Huang Y A , Lee W. A cooperative intrusion detection system for ad hoc networks[C]//Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM Press, 2003:135-147 被引量:1
  • 7Vigna G, Gwalani S, Srinivasan K, et al. An intrusion detection tool for AODV-based ad hoc wireless networks[C]///Proceedings of the 20th Annual Computer Security Applications Conference. 2004 : 16-27 被引量:1
  • 8Xu Y, Heidemann J, Estrin D. Geography-informed Energy Conservation for Ad-hoc Routing[C]//Proc. of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking. 2001 : 70-84 被引量:1
  • 9Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks[J]. Communications of the ACM, 2005,47 (6) 被引量:1
  • 10Lamport L,Shostak R, Pease M. The Byzantine Generals Problem[J]. ACM Transaction Programming Languages and Systems, 1982,4(3) : 382-401 被引量:1

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部