[1]赵建华 刘宁.基于Agent的无线传感器网络入侵检测系统[J].计算机技术与发展,2011,(07):165-167.
 ZHAO Jian-hua,LIU Ning.An Intrusion Detection System for Wireless Sensor Network Based on Agent[J].,2011,(07):165-167.
点击复制

基于Agent的无线传感器网络入侵检测系统()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年07期
页码:
165-167
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
An Intrusion Detection System for Wireless Sensor Network Based on Agent
文章编号:
1673-629X(2011)07-0165-03
作者:
赵建华 刘宁
商洛学院计算机科学系
Author(s):
ZHAO Jian-huaLIU Ning
School of Computer Science,Shangluo University
关键词:
无线传感器网络入侵检测代理二次诊断
Keywords:
wireless sensor network intrusion detection system agent second diagnosis
分类号:
TP393.08
文献标志码:
A
摘要:
为了提高分簇无线传感器网络的安全性,设计了一个基于Agent的轻量级入侵检测系统。系统由监测Agent,检测Agent,响应Agent和控制Agent等四个Agent组成,它们之间进行相互协作,共同完成检测任务。为了节省能量,簇头节点选取簇内具有高能量、高信誉度的节点作为巡查节点,在预设的时间片段中,巡查节点监测簇内节点通信行为,其他节点处于休眠状态;为了减小误检率,巡查节点检测出信誉度为零的恶意节点后,需要簇头节点对其进行二次诊断。仿真实验表明,系统具有良好的检测率和较低的能耗
Abstract:
To improve the security of clustering-based wireless sensor network(WSN),designed a lightweight intrusion detection system(IDS) based on agent.It was made up of four agents-monitor agent,detection agent,response agent and control agent,the four agents worked together to accomplish detection.To reduce energy consumption,cluster head chose one node with highest energy and credibility as monitor node.In the allotted time,the monitor node monitored communication behavior while others were sleep.To reduce false alarm rate,the cluster head carries out second diagnosis mechanisms for malicious after the monitor node found out it.Simulation result showed that the system had good detection rate and low energy consumption

相似文献/References:

[1]李雷 付东阳.基于分层模型的无线传感器网络分簇路由算法[J].计算机技术与发展,2010,(01):132.
 LI Lei,FU Dong-yang.Clustering Protocol Algorithm of Wireless Sensor Networks Based on Level Model[J].,2010,(07):132.
[2]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(07):143.
[3]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(07):151.
[4]魏烨嘉 王汝传[] 李伟伟 黄海平[] 孙力娟[].基于普适计算环境的三维空间RSSI位置感知研究[J].计算机技术与发展,2010,(04):183.
 WEI Ye-jia,WANG Ru-ehuan[],LI Wei-wei,et al.Research on RSSI- Based Location- Aware in Three- Dimensional Space for Pervasive Computing Environment[J].,2010,(07):183.
[5]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(07):148.
[6]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
 DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(07):159.
[7]杜鹏雷 吴晓 杨丽平 江涌.面向精准农业的感知节点传感器驱动与控制[J].计算机技术与发展,2010,(06):233.
 DU Peng-lei,WU Xiao,YANG Li-ping,et al.Drive and Control of Sensor Node Facing Precision Agriculture[J].,2010,(07):233.
[8]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(07):254.
[9]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(07):162.
[10]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(07):170.
[11]高建斌 娄渊胜.面向主动防御的无线传感器网络安全框架[J].计算机技术与发展,2012,(09):228.
 GAO Jian-bin,LOU Yuan-sheng.Security Framework Oriented Active Defense for Wireless Sensor Network[J].,2012,(07):228.

备注/Memo

备注/Memo:
陕西省教育科学自然科学研究基金(09JK424); 商洛学院教研教改项目(09jyjx03012,09jyjx03015)赵建华(1982-),男,工学硕士,CCF会员,研究方向为无线传感器网络、网络安全
更新日期/Last Update: 1900-01-01