首页 | 官方网站   微博 | 高级检索  
     

无线传感器网络内部攻击检测方法研究
引用本文:王良民,李菲,熊书明,张建明.无线传感器网络内部攻击检测方法研究[J].计算机科学,2011,38(4):97-99.
作者姓名:王良民  李菲  熊书明  张建明
作者单位:1. 江苏大学计算机科学与通信工程学院,镇江,212013;东南大学计算机科学与工程学院,南京,210096
2. 江苏大学计算机科学与通信工程学院,镇江,212013
基金项目:本文受国家自然科学基金项目(60703110),国家社科基金项目(09CTJ006)资助。
摘    要:随着无线传感器网络软硬件技术的发展,内部攻击逐渐成为无线传感器网络面临的主要安全威胁之一。综述了内部攻击检测技术的研究,根据攻击检测的对象将检测方法分为攻击行为检测、攻击节点检则和复件攻击检测,并指出了检测悖论、数目占优和中心模式等作为这些检测方法的安全假设制约了方法的性能。同时,概述了现有的关于移动无线传感器网络的攻击检测方法以及移动节点的加入给无线传感器网络解决内部攻击问题带来的变化,在此基础上,讨论了移动节点给内部攻击检测带来的机遇与挑战,指出了相关研究的未来发展方向。

关 键 词:无线传感器网络,内部攻击,移动节点,攻击检测

Research on Detection Methods for Insidious Attack of Wireless Sensor Networks
WANG Liang-min,LI Fei,XIONG Shu-ming,ZHANG Jian-ming.Research on Detection Methods for Insidious Attack of Wireless Sensor Networks[J].Computer Science,2011,38(4):97-99.
Authors:WANG Liang-min  LI Fei  XIONG Shu-ming  ZHANG Jian-ming
Affiliation:(School of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang 212013,China);(School of Computer Science and Technology,Southeast University,Nanjing 210096,China)
Abstract:Insidious attack becomes more and more important to the security question of wireless sensor network with the developments of its hardware and software. A comprehensive survey on the detection methods for this attack was presented in this paper. Firstly, these methods were introduced in 3 classes: detection on attack behaviors, compromised nodes and replica nodes. Then it was pointed out that the detection assumption of pre-known attack behavior, outnumtiered benign nodes or absolutely secure sink or base station bottlenecks the application of these methods. Furthermore,the issues about attack detection in the mobile wireless sensor networks were introduced, and then the challenges and advantages about mobile nodes over the attack detection for wireless sensor network were discussed. Finally, the possitile developments of methods for detecting insidious attack were presented.
Keywords:Wireless sensor networks  Insidious attack  Mobile nodes  Attack detection
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号