期刊文献+

无线传感器网络中基于统计异常的入侵检测 被引量:2

Statistic Anomaly Intrusion Detection in Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 无线传感器网络与传统网络存在较大差异,传统入侵检测技术不能有效地应用于无线传感器网络。结合无线传感器网络的特点,提出一种基于统计异常的入侵检测。入侵检测为传感器节点在正常工作状态下的某些系统特征建立行为模式,并通过统计观测值对正常行为模式的偏离程度来判断是否存在入侵。理论分析及仿真实验表明,提出的入侵检测技术可有效检测入侵,检测算法简洁高效,利于节能,适用于供能紧张的无线传感器网络。 Wireless sensor networks are different from traditional networks, so traditional intrusion detection cannot be applied efficiently to them. According to the characteristics of wirelss sensor networks, the paper presents a intrusion detection based on statistic anomaly in wireless sensor networks. This intrusion detection establishs models for some system characteristics in normal state of the sensor nodes, and detects the intrusion through the deviation degree of observed values to normal model. Theory and simulation results indicate that the proposed intrusion detection can detect intrusion effectively, and its algorithm is highly efficient for the energy conservation to fit demand of enegy restriction in wireless sensor networks.
出处 《火力与指挥控制》 CSCD 北大核心 2009年第7期129-132,共4页 Fire Control & Command Control
基金 中南林业科技大学青年科学基金资助项目(2008031B)
关键词 无线传感器网络 入侵检测 统计异常 wireless sensor networks ,intrusion detection ,statistic anomaly
  • 相关文献

参考文献10

  • 1Akyildiz I F,Su W,Sankarasubramaniam Y,et al.Wireless Sensor Networks:A Survey on Sensor Networks[J].IEEE Communications Magazine,2002,40(8):102-114.
  • 2任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 3Parno B,Perrig A,Gligor V.Distributed Detection of Node Replication Attacks in Sensor Networks[C]//In:IEEE Security and Privacy Symposium.Oakland,2005.
  • 4Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[C]//In:First IEEE International Workshop on Sensor Network Protocols and Applications.Anchorage,2003.
  • 5Zhang Y,Lee W,Huang Y.Intrusion Detection Techniques for Mobile Wireless Networks[J].ACM WINET,2003,9(5):545-556.
  • 6Agah A,Das S K,Basu K.Intrusion Detection in Sensor Networks:A Non-cooperative Game Approach[C]//In:the 3rd IEEE International Symposium on Network Computing and Applications.Cambridge,2004.
  • 7Ruiz L,Wong H.Decentralized Intrusion Detection in Wireless Sensor Networks[C]//In:Proceedings of the 1st ACM International Workshop on.Quality of Service & Security in Wireless and Mobile Networks.Newyork,2005.
  • 8Onat I,Miri A.A Real-time Node-based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks[C]//In:Proceedings of Systems Communications.Boston,2005.
  • 9Shnayder V,Hempstead M,Welsh M.Simulating the Power Consumption of Large-scale Sensor Network Applications[C]//In:Proceedings of the 2nd Int'l Conf on Embedded Networked Sensor Systems.Los Angeles,2004.
  • 10Paul B.SYSC 5701-Operating System Methods for Real-Time Application[Z].Real-Time Communication and Coordination in Wireless Embedded Sensor Networks.

二级参考文献32

  • 1ALERT. http://www.altersystem.org.
  • 2Bonnet P, Gehrke J, Seshadri P. Querying the physical world. IEEE Personal Communication, 2000,7(5):10-15.
  • 3Noury N, Herve T, Rialle V, Virone G, Mercier E. Monitoring behavior in home using a smart fall sensor. In: Proceedings of the IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Lyon: IEEE Computer Society, 2000.607~610.
  • 4Sensor Webs. http://sensorwebs.jpl.nasa.gov/.
  • 5Shill E, Cho S, Ickes N, Min R, Sinha A, Wang A, Chandrakasan A. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In: Proceedings of the ACM MobiCom 2001. Rome: ACM Press, 2001. 272-286.
  • 6Akyildiz I.F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38(4):393~422.
  • 7Asada G, Dong M, Lin TS, Newberg F, Pottle .G, Kaiser WJ, Marcy HO. Wireless integrated network sensors (WINS) for tactical information systems. In: Proceedings of the 1998 European Solid State Circuits Conference. New York: ACM Press, 1998. 15-20.
  • 8Sohrabi K, Pottie GJ. Performance of a novel self-organization protocol for wireless Ad hoc sensor networks. In: Proceedings of the IEEE 50th Vehicular Technology Conference. Amsterdam, 1999. 1222~1226.
  • 9Sinhua A, Chandrakasan A. Dynamic power management in wireless sensor network. IEEE Design and Test of Computer, 2001,18(2):62~74.
  • 10Lm C, Kim H, Ha S. Dynamic voltage scheduling technique for low-power multimedia application using buffers. In: Proceedings of the International Symposium on Low Power Electronics and Design. California: ACM Portal Press, 2001. 34~39.http://eeserver.korea.ac.kr/-bk21/arch/bk21 conf/26.pdf.

共引文献1708

同被引文献24

  • 1胡向东,魏琴芳,向敏.物联网安全[M].北京:科学出版社,2012.
  • 2曹晓梅,韩志杰,陈贵海.基于流量预测的传感器网络拒绝服务攻击检测方案[J].计算机学报,2007,30(10):1798-1805. 被引量:33
  • 3Murad A, RassamM A, MaarofAnazida Zainal. A Survey of Intrusion Detection Schemes in Wireless Sensor Networks[ J]. American Journal of Applied Sciences,2013,9(10) :1 -9.
  • 4Pooja, GuptaDr, Naveen, et al. Security Issues in Wireless Sensor Net- work : A Review [ J ]. International Journal of Engineering Sciences & Research Technology ,2013,2 (5) :342 - 350.
  • 5Shilpa S, Patil P, Khanagoudar S. Intrusion Detection Based Security Solution for Cluster Based WSN[ J]. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) ,2013,1 (4) :123 -132.
  • 6Ponomarchuk, Yulia, Seo. Intrusion Detection Based on Traffic Analysis in Wireless Sensor Networks [ J ]. Dae-Wha Dept of Electrical Engi- neering and Computer Science Kyungpook National University Daegu, Republic of Kores ,2010,24 ( 8 ) :64 - 72.
  • 7NIST/SEMATEC e-Handbook of Statistical Methods [ EB/OL ]. 2010. http ://www. itl. nist. gov/div898/handbook/index, htm.
  • 8Heinzelman W B, Chandrakasan A P, Balakrishnan H. An application specific protocol architecture for wireless microsensor networks [ J ]. 1EEE Transaction on Wireless Communication, 2002, 1 ( 4 ) : 660 - 670.
  • 9Yang X, Zhang Y, Zhao R. Study and design of home intelligent system based on embedded internet[C]//Embedded Software and Systems Symposia, 2008. ICESS Symposia' 08. International Conference on. IEEE. 2008:344-349.
  • 10Usman M, Muthukkumarasamy V, Wu X W, et al. Wireless smart home sensor networks: mobile agent based anomaly detection[C]//Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. EEE, 2012 322-329.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部