首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 359 毫秒
1.
博弈模型在传感器网络安全中的应用   总被引:1,自引:0,他引:1  
入侵检测是传感器网络安全的重要研究内容,论文基于博弈论中的非合作模型提出了一种新型传感器网络入侵检测方案。该方案用一种只有两个参与者(攻击者和传感器网络)的非零非合作博弈模型来描述传感器网络中入侵检测问题,并证明了这个博弈模型可以达到纳什均衡,据此可以制定一个防御策略有效地提高入侵被检测到的概率。模拟试验证明这一模型是有效可行的。  相似文献   

2.
针对无线传感器网络中资源受限的入侵检测系统策略优化问题,该文提出一种多阶段动态入侵检测博弈模型。该模型利用贝叶斯规则修正下一阶段外部节点为恶意节点的后验概率,通过分析推导给出最易遭受攻击的节点集合。以建立的模型和节点集合为依据,求解了满足完美贝叶斯均衡条件的入侵检测最优策略。在此基础上,设计了入侵检测最优策略方案。仿真实验结果表明,该方案在提高簇形结构检测防御成功率方面有明显优势。  相似文献   

3.
为了解决无线传感器网络中的拒绝服务攻击问题,利用传感器节点能耗特征,提出了基于能耗特征的无线传感器网络入侵检测模型.采用能耗检测的方式,利用马尔科夫模型为节点建立能耗预测模型,并且对节点能耗变化进行相关性检测,综合判断节点行为是否存在异常.仿真结果表明,该模型对节点的入侵行为具有较好的检测效果.  相似文献   

4.
《现代电子技术》2016,(24):39-43
在多Agent的创新网络中,容易出现周期性漏洞和链路反馈溢出,为网络病毒的入侵提供了时隙。通过多Agent的创新网络入侵进行有效检测,可以实现对病毒的拦截和识别,提高网络安全性能。提出一种基于局部特征尺度的多Agent下创新网络入侵检测方法,分析网络结构和网络入侵节点分布特征,构建多Agent的创新网络入侵信号模型,进行入侵信号的滤波抗干扰处理,采用局部特征尺度匹配方法进行网络入侵的匹配滤波检测,实现网络入侵检测算法的改进。仿真实验结果表明,采用该方法进行网络入侵检测,准确检测概率高于传统方法,并具有较好的幅值响应性能,有效抑制了多Agent的创新网络中的旁瓣干扰,在网络安全防御中具有较好的应用价值。  相似文献   

5.
针对无线传感器网络中能量有限和安全问题,本文提出了一种基于能耗均衡的无线传感器的入侵检测机制.首先在无线传感器现有的分簇模型上划分若干Sector,然后在某些节点上部署IDS,提出入侵检测的算法,利用仿真验证了本文所提出的模型与算法,结果表明可使网络节点的能耗得到有效的降低,同时提高了检测错误数据和异常节点的准确率.  相似文献   

6.
基于等概率路由模型的传感器网络负载均衡研究   总被引:1,自引:0,他引:1  
无线传感器网络的能耗效率与流量负载分布密切相关。论文从微观角度研究了无线传感器网络的负载均衡问题。基于等概率路由模型,分析了拓扑传输结构对于感知数据流量的分流作用。根据分析结果,提出了多对一传输模式下任意节点负载密度的定义和算法。分析了节点的负载密度与传感器网络生命期的关系,进一步论证了在多对一的多跳传感器网络中不能实现完全的负载均衡,但是通过设计合理的拓扑结构可以实现准负载均衡。仿真结果说明,从微观角度得到的节点负载密度可以准确描述无线传感器网络的流量负载分布,由此得到的准负载均衡条件也能实现绝大多数节点的负载均衡。  相似文献   

7.
提出了一种无线传感器网络的分簇算法,用于协助基于簇的入侵检测方案检测网络中的各种恶意攻击行为.它将整个网络划分成若干个簇,使得簇内各传感器节点物理位置临近,并且采集的数据值接近.这一特性使得识别异常节点非常容易,并且保证入侵检测方案具有较高的检测精度和较低的误报率.该算法也使得网内数据处理变得异常简单,从而能够有效节省传感器节点的能量,延长网络的寿命.  相似文献   

8.
无线传感网络覆盖控制直接反应了传感器网络的感知能力。移动目标检测概率和发现移动目标时间长短直接反应了覆盖质量的好坏。而在环境恶劣、传感器网络采用随机部署方式的情况下,目标区域内的节点分布杂乱无章,传感器网络不能很好地满足覆盖的要求。针对传感器网络随机部署的不足,文章在部署中引入RCCM移动模型,并分析了移动目标检测率、检测时间与节点运行速度、节点数量的关系。  相似文献   

9.
针对无线传感器网络中恶意节点产生的选择性转发攻击行为,该文提出一种有效的攻击检测方法。该方法将简化云模型引入信任评估中,结合改进的K/N投票算法确定目标节点的信任值,将目标节点信任值与信任阈值比较,进行选择性转发攻击节点的判定。仿真结果表明,当信任阈值为0.8时,经过5个时间段后,该方法能够有效地检测出网络中的选择性转发攻击节点,具有较高的检测率和较低的误检率。  相似文献   

10.
研究了校园网络中快速确定异常入侵位置的方法,提出区域入侵关联概率检测方法.以网络节点间的相互关系为基础,根据被入侵区域与其附近区域互相依存的关联程度,估计被异常入侵区域的关联概率.运用概率决策思维迭代锁定被入侵区域.实验证明,该方法能够提高获取校园网络中异常入侵位置的效率,从而保证了校园网络的安全.  相似文献   

11.
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little research has been performed about intrusion detection in the areas of mobile ad hoc networks and wireless sensor networks. In this article, first we briefly introduce mobile ad hoc networks and wireless sensor networks and their security concerns. Then, we focus on their intrusion detection capabilities. Specifically, we present the challenge of constructing intrusion detection systems for mobile ad hoc networks and wireless sensor networks, survey the existing intrusion detection techniques, and indicate important future research directions.  相似文献   

12.
周奇 《通信技术》2012,45(4):34-37
针对聚类无线传感器网络安全的问题,将移动代理技术与分布式入侵检测技术相结合,提出了一种基于移动代理的无线传感器网络分布式入侵检测方案,采用了多个代理模块进行分布式协作,运用一种基于聚类的分布式入侵检测算法,从节点上收集和处理数据,减少网络负载、促进效率平衡,能够满足WSNs的要求和限制。从而达到提高无线传感器网络的安全性、可靠性,降低入侵检测能量消耗的目的。  相似文献   

13.
Intrusion detection is prominently important for civil and military applications in wireless sensor networks (WSNs). To date, related works address the problem by assuming a straight‐line intrusion path and a Boolean sensing model. However, a straight‐line intrusion path is often not the case in reality, and the Boolean sensing model cannot resemble a real‐world sensor precisely. Results based on these assumptions are therefore not applicable with desirable accuracy in practice. In view of this, we propose a novel sine‐curve mobility model that can simulate different intrusion paths by adjusting its features (amplitude, frequency, and phase) and can be integrated into the random WSN model for intrusion detection analysis. It can also be applied to different sensor models and makes influencing factors tractable. With the model, we examine the effects of different intrusion paths on the intrusion detection probability in a random WSN, considering both Boolean and realistic Elfes sensing models. Further, we investigate the interplays between network settings and intruder's mobility patterns and identify the benefits and side effects of the model theoretically and experimentally. Simulation outcomes are shown to match well with the theoretical results, validating the modeling, analysis, and conclusions. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

14.
Anomaly detection in wireless sensor networks is an important challenge for tasks such as fault diagnosis, intrusion detection, and monitoring applications. The algorithms developed for anomaly detection have to consider the inherent limitations of sensor networks in their design so that the energy consumption in sensor nodes is minimized and the lifetime of the network is maximized. In this survey article we analyze the state of the art in anomaly detection techniques for wireless sensor networks and discuss some open issues for research.  相似文献   

15.
In recent years, Wireless Sensor Networks (WSNs) have demonstrated successful applications for both civil and military tasks. However, sensor networks are susceptible to multiple types of attacks because they are randomly deployed in open and unprotected environments. It is necessary to utilize effective mechanisms to protect sensor networks against multiple types of attacks on routing protocols. In this paper, we propose a lightweight intrusion detection framework integrated for clustered sensor networks. Furthermore, we provide algorithms to minimize the triggered intrusion modules in clustered WSNs by using an over‐hearing mechanism to reduce the sending alert packets. Our scheme can prevent most routing attacks on sensor networks. In in‐depth simulation, the proposed scheme shows less energy consumption in intrusion detection than other schemes. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

16.
崔捷  许蕾  王晓东  肖鸿 《电子科技》2011,24(11):144-146
无线传感器网络与传统网络存在较大差异,传统入侵检测技术不能有效地应用于无线传感器网络。文中分析了无线传感器网络面临的安全威胁;总结了现有的无线传感器网络入侵检测方案;在综合现有无线传感器网络入侵检测方法的基础上,提出了一种分等级的入侵检测系统,该入侵检测体系结构通过减少错报能检测到大多数的安全威胁。  相似文献   

17.

The traditional method uses terminal network monitoring method to estimate the security probability of multi-track segmentation network, but the detection performance is unsatisfactory. A security probability estimation and intrusion detection algorithm for multi-track segmentation networks in network attack environment based on fuzzy reasoning is proposed. The security probability estimation model of multi-track segmentation network in network attack environment is constructed. Fuzzy reasoning and probability density feature detection method are combined to evaluate the security data of multi-track segmentation network. The infection membership characteristics of multi-track segmentation network intrusion data are extracted, and the security probability calculation and virus attack detection of multi-track segmentation network are realized. The results show that the proposed algorithm has higher accuracy in calculating the security probability of multi rail segmented network, realizes the security probability calculation and data detection of multi rail segmented network, and enhances the security defense of multi rail segmented network.

  相似文献   

18.
The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. The quality of deterministic deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range, transmission range, and node density that impact overall system performance. The major question is centred around the quality of intrusion detection in WSN, how we can guarantee that each point of the sensing area is covered by at least one sensor node, and what a sufficient condition to guarantee the network connectivity? In this paper, we propose an appropriate probabilistic model which provides the coverage and connectivity in k-sensing detection of a wireless sensor network. We have proved the capability of our approach using a geometric analysis and a probabilistic model.  相似文献   

19.
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号