期刊文献+

移动自组网中基于任务分配的入侵检测

Intrusion Detection in Mobile Ad hoc Networks Based on Allocated Tasks
下载PDF
导出
摘要 移动自组网具有传统计算机网络及无线通信网络两方面的复杂性。提出移动自组网中基于任务分配的网络入侵检测方案,并描述各主要功能模块的实现,通过模拟实验对方案进行验证。实验结果显示,该方案除了能基本实现传统移动自组网络IDS的功能之外,还能有效节约网络系统的资源,提高网络移动节点的可用性。 Mobile Ad hoc network is a crossbred of computer network and wireless communication. A new Intrusion Detection System(IDS) scheme based on allocated tasks of IDS functions is proposed, and the main functional modules implementation is provided. Experimental result shows that new IDS scheme not only satisfies the basic requirements same as the traditional IDS, but also saves the network resources effectively with eahancing the availability of mobile nodes in Ad hoc networks.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第21期120-122,共3页 Computer Engineering
基金 上海市优秀青年教师科研基金资助项目(hzf-07008)
关键词 移动自组网 网络安全 入侵检测 mobile Ad hoc networks network security intrusion detection
  • 相关文献

参考文献5

  • 1宦娟,鞠时光.移动自组网入侵检测综述[J].计算机工程与设计,2007,28(13):3066-3069. 被引量:2
  • 2Capkun S, Hamdi M, Hubaux J P. GPS-free Positioning in Mobile Ad-hoc Networks[J]. Cluster Computing, 2002, 5(2): 118-124.
  • 3Amis A D, Prakash R, Vuong T H P, et al. Max-min D-cluster Formation in Wireless Ad Hoc Networks[C]//Proc. of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies. New York, USA: [s. n.], 2000: 32-41.
  • 4覃伯平,周贤伟,杨军.无线传感器网络路由协议的攻击检测模型[J].计算机工程,2007,33(2):117-119. 被引量:3
  • 5Liu Yu, Li Yang, Man Hong. A Distributed Cross-layer Intrusion Detection System for Ad hoc Networks[C]//Proc. of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 418-420.

二级参考文献19

  • 1Akyildiz L F,Su W L,Sankarasubramaniam Y,et al.A Survey on Sensor Networks[J].IEEE Communications Magazine,2002,40(8):102-114.
  • 2Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[J].Ad Hoc Networks,2003,(1),293-315.
  • 3Zhang Y,Lee W.Intrusion Detection Techniques for Wireless Networks[J].ACM/Kluwer Wireless Networks Journal,2003,9(5):545-556.
  • 4Rajgopal K,Sarangi S,Sibabrata R,et al.Minimal Sensor Integrity:Measuring the Vulnerability of Sensor Grids[J].Information Processing Letters,2003,24(86):49-55.
  • 5Ray s,Starobinski D,Trachtenberg A,et al.Robust location Detection with Sensor Networks[J].IEEE Journal on Selected Areas in Communications,2004,22(6):1016-1024.
  • 6Jolly V,Kimura N,Latifi S,et al.Loop Detection in MPLS for Wireless Sensor Networks[J].Microprocessors & Microsystems,2004,28(8):439-445.
  • 7Krishnamachari B,Lyengar S.Distributed Bayesian Algorithms for Fault-tolerant Event Region Detection in Wireless Sensor Networks[J].IEEE Transactions on Computers,2004,53(3):241-250.
  • 8Douceur J R.The SYBIL Attack[C].Proc.of the First International Workshop on Peer-to-Peer Systems,2002.
  • 9Marti S,Giuli T J,Lai K,et al.Mitigating routing misbehavior in mobile Ad Hoc networks[C].Boston,MA:Proceedings of the 6th Annual International Conference on Mobile Computing and Networking,2000:255-265.
  • 10Zhang Y,Lee W,Huang Y.Intrusion detection techniques for mobile wireless networks[J].ACM/Kluwer Wireless Networks Journal,2003,9(5):1-16.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部