[1]董峰,张秋霞. 一种恶意节点攻击的无线传感器网络入侵检测方法[J].计算机技术与发展,2017,27(02):86-89.
 DONG Feng,ZHANG Qiu-xia. An Intrusion Detection Method for Wireless Sensor Network of Malicious Node Attack[J].,2017,27(02):86-89.
点击复制

 一种恶意节点攻击的无线传感器网络入侵检测方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年02期
页码:
86-89
栏目:
安全与防范
出版日期:
2017-02-10

文章信息/Info

Title:
 An Intrusion Detection Method for Wireless Sensor Network of Malicious Node Attack
文章编号:
1673-629X(2017)02-0086-04
作者:
 董峰张秋霞
 黄河科技学院现代教育技术中心
Author(s):
 DONG FengZHANG Qiu-xia
关键词:
 无线传感器聚类算法移动节点检测
Keywords:
 wireless sensorclustering algorithmmobile nodedetection
分类号:
TP393
文献标志码:
A
摘要:
 无线传感器节点通常被随机部署在没有基础网络设施的场所,当传感器节点位置暴露在恶意攻击环境时,攻击者会攻击网络覆盖漏洞,节点易受到未知攻击从而导致定位错误,无线传感器网络很难在没有人工参与的情况下安全运行.针对此问题,设计了一种基于无线传感器网络节点的入侵检测算法.该算法能解决无法识别的未知攻击问题,通过聚类技术检测攻击产生的异常值,并在理论上证明了该算法的正确性.通过测试和实验手段,验证了该算法在保护传感器网络的前提下,完成了对未知攻击的检测、修复和定位.
Abstract:
 Wireless sensor nodes are usually random deployment in the absence of infrastructure network.When the sensor node position exposed to malicious attacks environment,the attacker will attack the network coverage holes,and nodes are vulnerable to unknown attacks leading to positioning error.Wireless sensor networks is difficult to operate safely in no case of human involvement.To solve this problem,an intrusion detection algorithm based on wireless sensor network node is designed,which can solve the problem of unrecognized unknown attacks.The outliers generated by attacks are detected through clustering techniques,and the correctness of the algorithm is proved theoretically.Test and experiment means that the algorithm on the premise of protecting the sensor network completes the unknown attack detection,repair and positioning.

相似文献/References:

[1]杨永雷 朱军.无线传感器网络中异步成簇算法的研究[J].计算机技术与发展,2010,(02):145.
 YANG Yong-lei,ZHU Jun.Research on Asynchronous Clustering Algorithm in Wireless Sensor Network[J].,2010,(02):145.
[2]刘春涛 陆建德 王月平.一个新型分布式无线传感器分层路由协议[J].计算机技术与发展,2010,(04):35.
 LIU Chun-tao,LU Jian-de,WANG Yue-ping.A New Distributed WSN Cluster- Based Routing Protocol[J].,2010,(02):35.
[3]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(02):1.
[4]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(02):5.
[5]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(02):13.
[6]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(02):21.
[7]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(02):25.
[8]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(02):29.
[9]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(02):34.
[10]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(02):38.
[11]杨帆[],刘冰[],沈来信[][]. 基于Tree-Lib的徽州民居特征采集库[J].计算机技术与发展,2014,24(08):246.
 YANG Fan[],LIU Bing[],SHEN Lai-xin[][]. Feature Collecting Database of Huizhou Residences Based on Tree-Lib[J].,2014,24(02):246.
[12]鲁蔚锋,尚春雷. 一种基于攻击概率的分布式传感网密钥管理方案[J].计算机技术与发展,2016,26(09):129.
 LU Wei-feng,SHANG Chun-lei. A Key-management Scheme with Node Compromise Probability in Wireless Sensor Network[J].,2016,26(02):129.
[13]张昱[],曹伟[],邵世祥[]. 低功耗无线传感网节点的混合监听休眠方法[J].计算机技术与发展,2016,26(10):196.
 ZHANG Yu[],CAO Wei[],SHAO Shi-xiang[]. A Hybrid Monitor Sleep Method of Low-power Wireless Sensor Network Nodes[J].,2016,26(02):196.

更新日期/Last Update: 2017-05-11