期刊文献+

一种检测被捕获节点的基于异常的算法研究 被引量:1

Research on an Anomaly-based Intrusion Detection Algorithm for Compromised Nodes in Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络在许多应用场合里需要采集较敏感的数据,因此安全问题至关重要。一旦传感器节点被捕获,且没有采取相应措施,节点的密钥信息易被泄露,攻击者完全可伪装成这些节点,向网络任意注入错误的信息,由此导致网络的安全性能急剧下降。提出了针对被捕获节点的一种基于异常的入侵检测算法,能有效识别无线传感器网络的被捕获节点。算法对传感器节点间关系进行抽象,采用传感器网络的事件驱动特性来确定某节点在固定时间间隔内是否在发生数据包,基站通过检测可疑节点的数据包发送时间的差异来加以确认。算法不依赖于任何被捕获节点如何行动和密谋的假设,能识别出偏离正常行为值的最大多数被捕获节点,而不会出现"假肯定"。 Wireless sensor network was widely used in many applications, and sensitive data was needed to collect, thus security was crucial. Once the sensor node was compromised, and did not take the appropriate measures, the node's key information was easily leaked. The attacker could masquerade as these nodes to inject arbitrarily erroneous information the network, which led to a sharp decline in network security. An anomaly-based intrusion detection algorithm for compromised nodes was proposed, which could effectively identify the compromised nodes in the wireless sensor networks. Algorithm abstracted the relationship between the sensor nodes, using Event-driven to determine if the node sent data packets in a fixed time interval. According to the time difference, the base station confirmed if suspicious node was really a compromised one. Algorithm did not rely on any assumption how the com- promised node acted and conspire to each other, and could identify the overwhelming majority of the compromised nodes which deviated from the normal behavior, without "false positives".
出处 《压电与声光》 CSCD 北大核心 2014年第6期1030-1034,1038,共6页 Piezoelectrics & Acoustooptics
基金 2012年湖北省教育厅科研计划基金资助项目(B20123102)
关键词 无线传感器网络 捕获 异常 入侵检测 算法 仿真 wireless sensor networks compromise anomaly intrusion detection algorithm simulation
  • 相关文献

参考文献13

  • 1LAW Y W,HAVINGA P J M.How to secure a wireless sensor network[C]//Vienna,Austria:Proceedings of the 2005 International Conference on Intelligent Sensors,Sensor Networks and Information Processing Conference,2005:89-95.
  • 2PERRIG A,STANKOVIC J,WAGNER D.Security in wireless sensor networks[J].Communications of the ACM,2009,47(6):53-57.
  • 3SHI E,PERRIG A.Designing secure sensor networks[J].IEEE Wireless Communications,2010,11 (6):38-43.
  • 4GUIMARAES G,SOUTO E,SADOK D,et al.Evaluation of security mechanisms in wireless sensor networks[C]//Brooklyn,USA:Proceedings of the 2011 Systems Communications,2011:428-433.
  • 5VOGT H,RINGWALD M,STRASSER M.Intrusion detection and failure recovery in sensor nodes[C]//Heidelberg,Germany:In Tagungsband Informatik 2008,Workshop Proceedings,LNCS,2008:49-54.
  • 6HARTUNG C,BALASALLE J,HAN R.Node compromise in sensor networks:the need for secure systems[C]//S.l.:Technical Report CU-CS-990-05,Department of Computer Science,University of Colorado at Boulder,2011:165-171.
  • 7MISHRA A,NADKARNI K,PATCHA A.Intrusion detection in wireless Ad Hoc networks[J].IEEE Wireless Communications,2012,11 (1):48-60.
  • 8LIU Donggang,NING Peng,DU Wenliang.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C]//Montreal,Quebec,Canada:Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'09)-Volume 0,2009:609-619.
  • 9ONAT I,MIRI I A.An intrusion detection system for wireless sensor networks[C]//Barcelona,Spain:IEEE International Conference on Wireless and Mobile Computing,Networking and Communications,WiMob' 2012,2012:253-259.
  • 10SESHADRI A,PERRIG A,DOORN L V,et al.SWATT:soft ware-based attestation for embedded devices[C]//San Francisco,California,USA:Proceedings of the 2012 IEEE Symposium on Security and Privacy,2012:272-282.

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部