|本期目录/Table of Contents|

[1]黄 干,刘 涛*.无线传感器网络入侵检测研究[J].绵阳师范学院学报,2015,(02):66-70.
 HUANG Gan,Liu Tao*.On Intrusion Detection for Wireless Sensor Networks[J].Journal of Mianyang Normal University,2015,(02):66-70.
点击复制

无线传感器网络入侵检测研究(PDF)
分享到:

《绵阳师范学院学报》[ISSN:1672-612X/CN:51-1670/G]

卷:
期数:
2015年02期
页码:
66-70
栏目:
计算机与网络技术
出版日期:
2015-02-15

文章信息/Info

Title:
On Intrusion Detection for Wireless Sensor Networks
文章编号:
1672-612x(2015)02-0066-05
作者:
黄 干刘 涛*
安徽工程大学计算机与信息学院,安徽省芜湖市 241000
Author(s):
HUANG Gan Liu Tao*
School of Computer and Information, Anhui Polytechnic University, Anhui, Wuhu 241000
关键词:
无线传感器网络 入侵检测 安全威胁 网络安全
Keywords:
wireless sensor networks(WSNs) intrusion detection security threat network security
分类号:
TP393
DOI:
-
文献标志码:
A
摘要:
在无线传感器网络中,入侵检测因能够识别恶意节点和潜在的网络攻击,以及在恶劣条件下控制检测数据的质量,从而进一步提高无线传感器网络的安全性.在分析影响入侵检测方法设计的关键因素基础上,对现存的主要入侵检测方法进行了归纳与评估,并指出了一些需要解决的问题和将来可能的研究方向.
Abstract:
In wireless sensor networks(WSNs), intrusion detection can identify malicious nodes and potential network attacks, and under the inclement conditions it can control the quality of the testing data, so as to further enhance the security of wireless sensor networks. Based on the analysis of soem key factors affecting the design of intrusion detection method, the existing major intrusion detection methods are assessed and summarized in this paper, and some problems to be solved and some potential directions for future study are also pointed out.

参考文献/References:

[1] 杨黎斌, 慕德俊, 蔡晓妍. 无线传感器网络入侵检测研究[J].计算机应用研究, 2008, 25(11): 3204-3208.
[2] 周贤伟, 王培, 覃伯平, 等. 一种无线传感器网络异常检测技术研究[J].传感技术学报, 2007, 20(8): 1870-1874.
[3] 易晓梅,吴鹏,刘丽娟,等.基于PSO-RBF无线传感器网络入侵检测技术研究[J].传感器与微系统,2011(9):9-11.
[4] Shin S, Kwon T, Jo G Y, et al. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks[J].Industrial Informatics, IEEE Transactions on,2010, 6(4): 744-757.
[5] Chen A, Kumar S, Lai T H. Local barrier coverage in wireless sensor networks[J].Mobile Computing, IEEE Transactions on,2010,9(4):491-504.
[6] Challal Y, Ouadjaout A, Lasla N, et al. Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks[J].Journal of Network and Computer Applications,2011, 34(4): 1380-1397.
[7] Bankovic' Z, Moya J M, Araujo Á, et al. Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps[J].Integrated Computer-Aided Engineering,2010,17(2): 87-102.
[8] Fan G, Wang R, Huang H, et al. Coverage-guaranteed sensor node deployment strategies for wireless sensor networks[J].Sensors,2010, 10(3): 2064-2087.
[9] Shamshirband S, Anuar N B, Kiah M L M, et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique[J].Engineering Applications of Artificial Intelligence,2013, 26(9): 2105-2127.
[10] Karenos K, Kalogeraki V. Traffic management in sensor networks with a mobile sink[J].Parallel and Distributed Systems, IEEE Transactions on,2010, 21(10): 1515-1530.
[11] Farooqi A H, Khan F A. A survey of intrusion detection systems for wireless sensor networks[J].International Journal of Ad Hoc and Ubiquitous Computing,2012, 9(2): 69-83.
[12] Stafrace S K, Antonopoulos N. Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks[J].Computer Communications,2010, 33(5): 619-638.
[13] Sharmila S, Umamaheswari G. Node ID based detection of Sybil attack in mobile wireless sensor network[J].International Journal of Electronics,2013, 100(10): 1441-1454.
[14] Wu, Renyong, et al."Trust-based anomaly detection in wireless sensor networks." Communications in China(ICCC), 2012 1st IEEE International Conference on. IEEE, 2012.
[15] Yager R R, Filev D P. Essentials of fuzzy modeling and control[J].New York,1994.
[16] 孙全, 叶秀清, 顾伟康. 一种新的基于证据理论的合成公式[J]. 电子学报, 2000, 28(8): 117-119.
[17] 胡志鹏, 魏立线, 申军伟, 等. 基于核 Fisher 判别分析的无线传感器网络入侵检测算法[J]. 传感技术学报, 2012, 25(2): 246-250.
[18] 李映, 焦李成. 基于核 Fisher 判别分析的目标识别[J]. 西安电子科技大学学报, 2003, 30(2): 179-182.
[19] 傅蓉蓉, 郑康锋, 芦天亮, 等. 基于危险理论的无线传感器网络入侵检测模型[J]. 通信学报, 2012, 33(9): 31-37.
[20] Salmon H M, de Farias C M, Loureiro P, et al. Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques[J].International journal of wireless information networks,2013, 20(1): 39-66.
[21] 吴中博,王敏,吴钊,袁磊. 基于分簇的传感器网络异常检测算法[J].华中科技大学学报(自然科学版),2013,41(12):251-254.
[22] Huang J Y, Liao I E, Chung Y F, et al. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining[J].Information Sciences,2013, 231: 32-44.
[23] Wu L, Shi P, Gao H. State estimation and sliding-mode control of Markovian jump singular systems[J].Automatic Control, IEEE Transactions on,2010, 55(5): 1213-1219.
[24] Branch J W, Giannella C, Szymanski B, et al. In-network outlier detection in wireless sensor networks[J].Knowledge and information systems,2013, 34(1): 23-54.

相似文献/References:

备注/Memo

备注/Memo:
基金项目:国家自然科学基金(61300170); 安徽省教育厅重点资助项目( KJ2013A040); 安徽省自然科学基金(1308085MF88); 安徽工程大学青年基金(2013YQ28,2012YQ31)
作者简介:黄干(1990-),男,安徽滁州人,硕士研究生,研究方向:网络安全.
*通讯作者:刘涛(1973-),女,安徽六安人,硕士,副教授,研究方向:网络安全.
更新日期/Last Update: 2015-02-15