期刊文献+

无线传感器网络入侵检测研究 被引量:12

Study on intrusion detection for wireless sensor network
下载PDF
导出
摘要 首先分析了无线传感器网络的主要特点;然后对无线传感器网络中的入侵检测方案进行分类论述,着重阐述了典型的入侵检测算法并作了详细的分析比较;最后对无线传感器网络中的入侵检测技术进行总结,并指出了一些亟待解决的问题。 This paper first analyzed the main features of the wireless sensor network ; then set forth the most common intrusion detection architectures of wireless sensor network; and studied typical algorithms emphatically, as well as presented their advantages and disadvantages in detail. Finally, addressed some valuable directions for further research.
出处 《计算机应用研究》 CSCD 北大核心 2008年第11期3204-3208,共5页 Application Research of Computers
基金 国防基础科研资助项目(C2720061361)
关键词 无线传感器网络 网络安全 入侵检测 wireless sensor network(WSN) network security intrusion detection
  • 相关文献

参考文献2

二级参考文献21

  • 1John A. Stankovic, Tarek F. Abdelzaher, Chenyang Lu et al. Real-time communication and coordination in embedded sensor networks[C]. Procedings of the IEEE, 2003, 91(7):1002-1022.
  • 2Chris Karlof, Naveen Sastry ,Umesh Shankar et al. TinySec: Tiny OS Link Layer Security Proposal - version 1.0[EB/OL]. http://webs.cs.berkeley.edu/tos.
  • 3Qi Xue,Aura Ganz. Runtime security composition for sensor networks[R]. Multimedia Networks Lab ECE Department, University of Massachusetts.
  • 4Sasha Slijepcevic,Vlasios Tsiatsis, Scott Zimbeck. On communication security in wireless Ad-Hoc sensor networks[C].Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), 2002.
  • 5Adrian Perrig, Robert Szewczyk, Victor Wen et al. SPINS: security protocols for sensor networks[C]. In:Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001.
  • 6Liu, P. Ning. Efficient distributed of key chain commitments for broadcast authentication in distributed sensor networks[C]. To appear in NDSS'03, 2003.
  • 7Jajodia S. LEAP: efficient security mechanisms for large-ScaleDistributed sensor networks[C]. To appear in the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., October, 2003.
  • 8Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei .Random key assignment for secure wireless sensor networks[C]. 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03) October 31, 2003 George W. Johnson Center at George Mason University, Fairfax, VA, USA, 2003.
  • 9Haowen Chan, Adrian Perrig, Dawn Song. Random key predistribution schemes for sensor networks[C]. In:Proceedings of the IEEE Symposium on Security andPrivacy, Oakland, California-USA, 2003, 97-213.
  • 10Lin Xue-yan, Zhang Lin. Modern cellular and molecular immunology[M]. Beijing: Science Press, 2000.

共引文献28

同被引文献65

引证文献12

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部