检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]曲阜师范大学实验教学中心,山东日照276826 [2]曲阜师范大学软件学院,山东曲阜273165
出 处:《通信技术》2017年第9期2045-2054,共10页Communications Technology
摘 要:无线传感器网络部署的开放性使它容易遭到攻击。攻击者可以从妥协节点中提取密钥一类的重要信息,所以检测一个节点是否被攻破非常重要。于是,提出了Com Det(Compromised Nodes Detection)方法——一种能够准确确认无线传感器网络中妥协节点的轻量级入侵检测系统。实验结果表明,Com Det有以下优点:不容易遭受诽谤攻击;检出率和误报率要优于现有的检测方法;能够运行在多数无线传感器网络中,并能在传感器节点不具有周期性的传输时调整检测行为;只需要较小的内存和较低的计算、通信开销。因此,它能够适用于大规模网络。The openness of wireless sensor networks makes itself vulnerable to attacks.Attackers may extract important information from the compromised node,so it is important to detect whether a node is compromised.Consequently,Com Det(Compromised,Nodes,and Detection) method is proposed,which could accurately confirm the lightweight intrusion detection system of compromised nodes in wireless sensor networks.Experimental results indicate its following advantages:not vulnerable to slander attacks;detection rate and false positive rate superior to the existing detection methods;running in most wireless sensor networks and adjustable detection behavior when the sensor nodes have no periodic transmission;requiring fairly small memory,low computation and communication overhead.And thus it could be applicable to large-scale networks.
关 键 词:无线传感器网络 入侵检测 ComDet 网络攻击
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.28