检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王良民[1,2] 李菲[1] 熊书明[1] 张建明[1]
机构地区:[1]江苏大学计算机科学与通信工程学院,镇江212013 [2]东南大学计算机科学与工程学院,南京210096
出 处:《计算机科学》2011年第4期97-99,129,共4页Computer Science
基 金:国家自然科学基金项目(60703115);国家社科基金项目(09CTJ006)资助
摘 要:随着无线传感器网络软硬件技术的发展,内部攻击逐渐成为无线传感器网络面临的主要安全威胁之一。综述了内部攻击检测技术的研究,根据攻击检测的对象将检测方法分为攻击行为检测、攻击节点检测和复件攻击检测,并指出了检测悖论、数目占优和中心模式等作为这些检测方法的安全假设制约了方法的性能。同时,概述了现有的关于移动无线传感器网络的攻击检测方法以及移动节点的加入给无线传感器网络解决内部攻击问题带来的变化,在此基础上,讨论了移动节点给内部攻击检测带来的机遇与挑战,指出了相关研究的未来发展方向。Insidious attack becomes more and more important to the security question of wireless sensor network with the developments of its hardware and software.A comprehensive survey on the detection methods for this attack was presented in this paper.Firstly,these methods were introduced in 3 classes:detection on attack behaviors,compromised nodes and replica nodes.Then it was pointed out that the detection assumption of pre-known attack behavior,outnumbered benign nodes or absolutely secure sink or base station bottlenecks the application of these methods.Furthermore,the issues about attack detection in the mobile wireless sensor networks were introduced,and then the challenges and advantages about mobile nodes over the attack detection for wireless sensor network were discussed.Finally,the possible developments of methods for detecting insidious attack were presented.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.28