期刊文献+

移动Ad-Hoc网络叶节点簇降低能源节约入侵检测 被引量:8

Leaf Node Cluster Reduce Algorithm of Mobile Ad-hoc Network Based Energy Saving for Intrusion Detection
下载PDF
导出
摘要 针对传统含入侵检测(IDS)移动Ad-Hoc网络中,簇头(CHS)及簇划分存在叶节点独立簇,导致冗余簇不利于能耗节约的问题,提出一种移动Ad-Hoc网络叶节点簇降低能源节约入侵检测算法。首先,对传统的随机簇划分方法进行分析,发现这种方式容易产生冗余划分问题,提出一种从叶节点开始进行簇划分的新方法,试图解决簇划分的冗余问题,以降低能耗;其次,针对所提方法,对算法的实现进行了研究,构建单节点消除算法,并且通过简单算例给出了簇划分过程;最后,通过在创建的实验平台中,与已有算法进行仿真对比显示,所提算法在簇划分数量上要少于对比算法30%左右,有利于提高网络使用寿命。 Some cluster heads (CHS) and clustering in traditional intrusion detection (IDS) mobile ad hoc network are independent leaf nodes clusters, which results in that redundant clusters are not conducive to energy conservation, so the leaf node cluster reduce algorithm of mobile ad-hoc network for energy saving intrusion detection is proposed to solve this problem. Firstly, the traditional method of clustering is analyzed, it is found that this method is easy to generate redundant partition problem, and a new method is then proposed to divide clusters from the leaf node, which tries to solve the redundancy problem of cluster partition to reduce energy consumption. Secondly, according to the proposed method, realization of the algorithm is studied, and the single node elimination algorithm is constructed, then the clustering process is showed through a simple example. Finally, the simulation results show that the proposed algorithm is less than 30% in the number of clusters, which is beneficial to improve the service life of the network.
出处 《控制工程》 CSCD 北大核心 2016年第7期1137-1142,共6页 Control Engineering of China
基金 国家自然科学基金(No.60873068 No.61003003) 辽宁省自然科学基金资助项目(201202089)
关键词 云组件 性能保障 副本增删 资源竞争 非线性回归 Mobile Ad-hoc leaf node cluster reduction energy saving intrusion detection
  • 相关文献

参考文献13

  • 1Pushpa Lakshmi R, Kumar A V. Parallel key management scheme for mobile ad hoc network based on traffic mining[J]. IET Information Security, 2014, 9(1): 14-23. 被引量:1
  • 2Derr K, Manic M. Adaptive control parameters for dispersal of multi-agent mobile ad hoc network (MANET) swarms[J]. IEEE Transactions on Industrial Informatics, 2013, 9(4): 1900-1911. 被引量:1
  • 3李奕男,钱志鸿,刘影,张旭.基于博弈论的移动Ad hoc网络入侵检测模型[J].电子与信息学报,2010,32(9):2245-2248. 被引量:12
  • 4Nadeem A, Howarth M P. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks[J]. IEEE Communications Surveys & Tutorials, 2013, 15(4): 2027-2045. 被引量:1
  • 5Sneha S, Varshney U. A framework for enabling patient monitoring via mobile ad hoc network[J]. Decision Support Systems, 2013, 55(1): 218 -234. 被引量:1
  • 6Thipchaksurat S, Kirdpipat P. Position-based routing protocol by reducing routing overhead with adaptive request zone for mobile ad hoc networks[C]. //The 8th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Khon Kaen, IEEE, 2011, 389-392. 被引量:1
  • 7Jin X, Zhang Y X, Zhou Y Z. A novel IDS agent distributing protocol for MANETs[C].//The 5th International Conference, Atlanta, GA, USA, Springer, 2005, 502-509. 被引量:1
  • 8夏辉,贾智平,张志勇,Edwin H-M Sha.移动Ad Hoc网络中基于链路稳定性预测的组播路由协议[J].计算机学报,2013,36(5):926-936. 被引量:36
  • 9吴静,侯国照,赵蕴龙,田立勤.基于MANET的多层分级结构及其分群策略研究[J].计算机应用与软件,2014,31(2):136-139. 被引量:1
  • 10Biswas S, Misic J. A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs[J]. IEEE Transactions on Vehicular Technology, 2013, 62(5): 2182-2192. 被引量:1

二级参考文献33

  • 1Ryu Y U and Rhee H S.Evaluation of intrusion detection systems under a resource constraint.ACM Transactions on Information and Systems Security,2008,11(4):20.1-20.24. 被引量:1
  • 2Musman S and Flesher P.System or security managers' adaptive response tool[C].DARPA Information Survivability Conference and Exposition 2000,Hilton Head,USA,2000,Vol.2:1056-1060. 被引量:1
  • 3Carver C,Hill J M,and Surdu J R.A methodology for using intelligent agents to provide automated intrusion response[C].The IEEE Systems,Man,and Cybernetics Information Assurance and Security Workshop,West Point,NY,2000:110-116. 被引量:1
  • 4Ragsdale D,Carver C,and Humphries J,et al..Adaptation techniques for intrusion detection and intrusion response system[C].The IEEE Int'l Conf on Systems,Man,and Cybernetics at Nashville,Tennessee,2000:1398-1406. 被引量:1
  • 5Lee W,Fan W,and Miller M,et al..Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1/2):5-22. 被引量:1
  • 6Foo B,Wu Y,and Mao Y,et al..ADEPTS:adaptive intrusion response using attack graphs in an E-commerce environment[C].Int'l Conf on Dependable Systems and Networks (DSN'05),Washington,2005:139-146. 被引量:1
  • 7Lye K and Wing J M.Game strategies in network security[C].The 2002 IEEE Computer Security Foundations Workshop,Copenhagan,Denmark,2002:71-86. 被引量:1
  • 8Xu J and Lee W.Sustaining availability of Web services under distributed denial of service attacks[J].IEEE Transactions on Computer,2003,52(4):195-208. 被引量:1
  • 9[美] 艾里克·拉斯缪森.王晖等译.博弈与信息博弈论概论.北京:北京大学出版社,2003:385-417. 被引量:1
  • 10Ns2 network simulation[OL] http://www.isi.edu/nsnam/ns,2009. 被引量:1

共引文献46

同被引文献71

引证文献8

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部