期刊文献+

一种基于相似度计算的无线传感器网络入侵检测方法 被引量:8

A Method of Intrusion Detection in Wireless Sensor Network Based on Similarity Algorithm
下载PDF
导出
摘要 由于无线传感器网络的工作环境存在不可靠性,其安全问题越来越被研究者重视。虽然数据加密和身份认证技术的应用提高了无线传感器网络的安全性,但仍然无法及时有效地检测出已对无线传感器网络造成威胁的恶意入侵行为。为了解决这一问题,文章针对Zigbee无线传感器网络的应用层的感知数据篡改、网络层的RREQ泛洪攻击、链路层碰撞攻击和物理层的信道干扰4种入侵行为,提出了一种基于相似度计算的无线传感器网络实时入侵检测算法。该算法通过马氏距离计算入侵行为和正常行为之间的相似程度,并采用线性拟合算法对可疑行为进行趋势评估,以检测异常入侵行为。最后通过搭建真实的Zigbee网络入侵检测环境验证了该算法的可用性,并能达到预期的效果。 Wireless sensor network(WSN) security issues are getting more attention by researchers due to unreliable and untrusted circumstances. Even encryption and authentication are applied into WSN, and they cannot prevent the intrusion of malicious network when they have attacked the WSN successfully. In this paper, we describe an online, sequential intrusion detection algorithm for the intrusion of data temper in application layer, RREQ flooding in network layer, collision in link layer and jamming in physical layer. The proposed algorithm is based on the similarity algorithm and linear fitting algorithm, and raises an alarm of intrusion immediately upon encountering a deviation or countertrend from the previous data. Based on the experiments results of intrusion detection system(IDS) using this algorithm, we demonstrate that our online algorithm is effective and achieving its desired results.
出处 《信息网络安全》 2016年第2期22-27,共6页 Netinfo Security
基金 国家自然科学基金青年科学基金[61101108]
关键词 无线传感器网络 相似度 马氏距离 线性拟合 wireless sensor network similarity Mahalanobis distance linear fitting
  • 相关文献

参考文献10

  • 1黄海,谢冬青,宋一赞.WiFi-WiMAX异构无线网络认证机制研究[J].信息网络安全,2015(6):19-25. 被引量:6
  • 2BORAH S, CHETRY S P K, SINGH P K. Hashed-K-Means: A Proposed Intrusion Detection Algorithm[A].Computational Intelligence and Information Technology[M]. Heidelberg Berlin: Springer, 2011:855- 860. 被引量:1
  • 3MA Zhenghui, KABAN A. K-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection[C]// UKCI .Computational Intelligence 2013 13th UK Workshop on,September 9-11, 2013, Guildford, UK.Piscataway, NJ, USA: IEEE, 2013:266-271. 被引量:1
  • 4YI Yang, WU Jiansheng, XU Wei. Incremental SVM Based on Reserved Set for Network Intrusion Detection[J]. Expert Systems with Applications, 2011, 38(6):7698-7707. 被引量:1
  • 5TAN Zhiyuan, JAMDAGNI A, HE X, et al. Network Intrusion Detection Based on LDA for Payload Feature Selection[C]// IEEE. GLOBECOM Workshops (GC Wkshps), December 6-10, 2010. Piscataway, NJ, USA: IEEE, 2011:1545-1549. 被引量:1
  • 6SINGH S, SILAKARI S. An Ensemble Approach for Feature Selection of Cyber Attack Dataset[J]. International Journal of Computer Science and Information Security , 2009, 6 ( 2 ) : 297-302. 被引量:1
  • 7MAHALANOBIS P C. On the Generalized Distance in Statistics[J]. Proceedings of the National Institute of Sciences, 1936 ( 2 ) :49-55. 被引量:1
  • 8CHOU T S, YEN K K, LUO J. Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms[J]. International Journal of Computational Intelligence, 2008(3):196. 被引量:1
  • 9CHONG E L, MUN Y N, CHRISTOPHER L, et al. Intrusion Detection for Routing Attacks in Sensor Networks[J]. International Journal of Distributed Sensor Networks, 2006, 2(4):313-332. 被引量:1
  • 10戚名钰,刘铭,傅彦铭.基于PCA的SVM网络入侵检测研究[J].信息网络安全,2015(2):15-18. 被引量:38

二级参考文献21

  • 1Network Working Group.WiMAX Forum[EB/OL].http:// www. wimaxforum. Org, 2011-11-12. 被引量:1
  • 2RFC 5191.ProtocolforCarryingAuthentication for Network Access (PANA) [SI. 2008. 被引量:1
  • 3Sun H M,chen M S,chen Y.Secnre and Efficient Handover Schemes For Heterogeneous Networks[C]//IEEE Asia-Pacific Services Computing Conf)rence (APSCC) 2(1t08: 205-210. 被引量:1
  • 4Hou L M, Miao K X. A pre-authentication architecture in WiFi&WiMAX integrated system. [C]//ChinaCOM ,2009: 1-5. 被引量:1
  • 5IEEE Standard for Information technology, teleconnnunications and information exchange between systems, local and metropolitan area networks, specific requirements (1EEE 802.11-2007)[S]. IEEE: 2007. 被引量:1
  • 6P,.FC 3748. Extensible Authentication Protocol(EAP) [S]. 2004. 被引量:1
  • 7WONG D S. Security analysis of two anonymous authentication pro- tocols for distributed wireless networks[C]// PerCom 2005 Work-shops. Kauai Island, Hawaii, 211/15. 被引量:1
  • 8IEEE Standard for Informationtechnologw, Telecommunications and information exchange between systems, Local and metropolitan area networks, Specific requirements Part 11 (IEEE802.11-20071 [S]. IEEE: 2007. 被引量:1
  • 9Stoicay I, Morrisz 1~, Liben -Nowellz 1), et al. Chord : A scalablepeer-to-peer lookup protocol for lnternet applications[J].IEEE/ ACM Transactions on Networking, 2003, 11 ( 1 ) : 17-32. 被引量:1
  • 10IEEE Standard for local and metorpolition area networks Part 16(IEEE 802.16e-20061[S] . IEEE: 2007. 被引量:1

共引文献42

同被引文献51

引证文献8

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部